Movatterモバイル変換


[0]ホーム

URL:


CN111951019B - Authentication method and device - Google Patents

Authentication method and device
Download PDF

Info

Publication number
CN111951019B
CN111951019BCN202010883046.8ACN202010883046ACN111951019BCN 111951019 BCN111951019 BCN 111951019BCN 202010883046 ACN202010883046 ACN 202010883046ACN 111951019 BCN111951019 BCN 111951019B
Authority
CN
China
Prior art keywords
identity information
information
verification
identity
bank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010883046.8A
Other languages
Chinese (zh)
Other versions
CN111951019A (en
Inventor
田宝文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Software Co Ltd
Original Assignee
Inspur Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Software Co LtdfiledCriticalInspur Software Co Ltd
Priority to CN202010883046.8ApriorityCriticalpatent/CN111951019B/en
Publication of CN111951019ApublicationCriticalpatent/CN111951019A/en
Application grantedgrantedCritical
Publication of CN111951019BpublicationCriticalpatent/CN111951019B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention provides an identity verification method and device, the method comprises the steps of reading identification information of a bank card held by a current user, obtaining identity information matched with the identification information, wherein the identity information is used for representing information of a cardholder of the bank card, sending the identity information to an external bank verification module so that the bank verification module can verify the identity information and return a verification result of the identity information, determining whether the verification result represents that the identity information passes verification, if so, reading the current weight of an article placed in a target area by the current user, and otherwise, outputting prompt information used for representing that the identity information does not pass verification. The scheme can improve the reliability of identity verification.

Description

Identity verification method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an identity verification method and apparatus.
Background
In the process of purchasing organic grains in a large scale, in order to ensure the organic traceability of purchasing organic grains, the identity authentication verification of the user who orders and sell needs to be carried out. At present, authentication of a user is often realized by checking identification materials such as an identification card provided by the user by a staff member.
Aiming at the user identity verification mode, the condition that the user is inconsistent with the identity verification material is easy to occur by adopting manual verification, so that the reliability of the identity verification is lower.
Disclosure of Invention
The invention provides an identity verification method and an identity verification device, which can improve the reliability of identity verification.
In a first aspect, an embodiment of the present invention provides an authentication method, including:
reading the identification information of the bank card held by the current user;
acquiring identity information matched with the identification information, wherein the identity information is used for representing information of a cardholder of the bank card;
the identity information is sent to an external bank verification module, so that the bank verification module verifies the identity information and returns a verification result of the identity information;
determining whether the verification result represents the identity information to pass verification;
if yes, reading the current weight of the object placed in the target area by the current user;
Otherwise, outputting prompt information for representing that the identity information fails verification.
In one possible design, the obtaining the identity information matched with the identification information includes:
determining whether identity information matched with the identification information exists in the stored data;
if yes, executing the step of sending the identity information to an external bank verification module;
If not, receiving the identity information corresponding to the identification information, which is input from the outside, storing the identity information, and executing the step of sending the identity information to an external bank verification module.
In one possible design, after the sending the identity information to an external bank verification module, the method further includes:
Determining whether feedback information which is returned by the bank verification module and used for representing successful receipt of the identity information is received or not;
if the feedback information is not received, acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the acquired identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In one possible design, the determining whether feedback information returned by the bank verification module for indicating that the identity information is successfully received includes:
a1, determining a first time point corresponding to the identity information sent to the bank verification module;
A2, determining a current time point;
a3, judging whether the time interval between the determined current time point and the first time point is larger than a preset first threshold value, if so, executing A4, otherwise, executing A2;
a4, recording an abnormal record for representing communication abnormality with the bank verification module;
A5, determining whether the number of times of the abnormal records aiming at the identity information record is larger than a preset second threshold value, if so, executing A7, otherwise, executing A6;
A6, executing the step of sending the identity information to an external bank verification module, and returning to the step A1;
and A7, determining that feedback information which is returned by the bank verification module and used for representing successful receiving of the identity information is not received.
In one possible design, after the sending the identity information to an external bank verification module, the method further includes:
Receiving verification information fed back by the bank verification module, wherein the verification information is information stored by the bank verification module and used for verifying the identity information;
deleting the identity information and storing the verification information as the identity information.
In one possible design, after determining that the verification result characterizes the identity information as verified, further comprising:
When the identification information of the bank card held by the current user is read currently, determining a second time point corresponding to the currently read identification information;
Determining a third time point corresponding to the time when the history identification information is read for the bank card, wherein the history identification information is the identification information read before the identification information which is currently read, and the time interval between the third time point and the second time point is shortest;
Determining whether a time interval between the second time point and the third time point is less than a preset third threshold;
if yes, reading target identity information corresponding to the identification information in the stored data;
acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the read target identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In a second aspect, the embodiment of the invention also provides an identity verification device, which comprises an acquisition unit, a sending unit and a determining unit;
The acquisition unit is used for reading the identification information of the bank card held by the current user and acquiring the identity information matched with the identification information, wherein the identity information is used for representing the information of the cardholder of the bank card;
The sending unit is used for sending the identity information acquired by the acquiring unit to an external bank verification module so that the bank verification module can verify the identity information and return a verification result of the identity information;
and the determining unit is used for determining whether the verification result sent by the sending unit represents that the identity information passes verification, if so, reading the current weight of the object placed in the target area by the current user, and if not, outputting prompt information for representing that the identity information does not pass verification.
In one possible design of the device,
The acquisition unit is used for executing the following processing:
determining whether there is identity information in the stored data that matches said identification information,
If yes, acquiring identity information matched with the identification information from the stored data;
If not, receiving identity information corresponding to the identification information and input from outside, and storing the identity information.
In one possible design of the device,
The determining unit is further configured to perform the following processing:
Determining whether feedback information which is returned by the bank verification module and used for representing successful receipt of the identity information is received or not;
if the feedback information is not received, acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the acquired identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In one possible design of the device,
The determining unit is further configured to perform the following processing:
Determining whether feedback information which is returned by the bank verification module and used for representing successful receipt of the identity information is received or not;
if the feedback information is not received, acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the acquired identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In one possible design of the device,
The determining unit is further configured to perform the following processing:
a1, determining a first time point corresponding to the identity information sent to the bank verification module;
A2, determining a current time point;
a3, judging whether the time interval between the determined current time point and the first time point is larger than a preset first threshold value, if so, executing A4, otherwise, executing A2;
a4, recording an abnormal record for representing communication abnormality with the bank verification module;
A5, determining whether the number of times of the abnormal records aiming at the identity information record is larger than a preset second threshold value, if so, executing A7, otherwise, executing A6;
A6, executing the step of sending the identity information to an external bank verification module, and returning to the step A1;
and A7, determining that feedback information which is returned by the bank verification module and used for representing successful receiving of the identity information is not received.
In one possible design of the device,
The acquisition unit is further configured to receive verification information fed back by the bank verification module, delete the acquired identity information, and store the verification information as identity information, where the verification information is information stored by the bank verification module and used to verify the identity information.
In one possible design of the device,
The determining unit is further configured to perform the following processing:
after determining that the verification result characterizes the identity information as verified,
When the identification information of the bank card held by the current user is read currently, determining a second time point corresponding to the currently read identification information;
Determining a third time point corresponding to the time when the history identification information is read for the bank card, wherein the history identification information is the identification information read before the identification information which is currently read, and the time interval between the third time point and the second time point is shortest;
Determining whether a time interval between the second time point and the third time point is less than a preset third threshold;
if yes, reading target identity information corresponding to the identification information in the stored data;
acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the read target identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In a third aspect, the embodiment of the invention also provides a smart device, which comprises at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
The at least one processor is configured to invoke the machine readable program to perform the authentication method provided by the first aspect or any of the possible implementations of the first aspect.
In a fourth aspect, embodiments of the present invention also provide a computer-readable medium,
The computer readable medium has stored thereon computer instructions which, when executed by a processor, cause the processor to perform the authentication method provided by the first aspect or any of the possible implementations of the first aspect.
According to the technical scheme, the identity verification method provided by the invention obtains the identity information which is matched with the identification information and used for representing the information of the card holder of the bank card by reading the identification information of the bank card held by the current user, and after the identity information is sent to the bank verification module, whether the identity information passes verification is determined according to the verification result returned by the bank verification module. In summary, the bank verification module is utilized to verify the identity information, namely, the digital verification mode is adopted to perform online verification, so that the efficiency of the identity verification is improved, and the identity information is verified through the bank verification module, so that the verification result of the identity verification is more accurate, the error rate of the identity verification is reduced, and the reliability of the identity verification is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an authentication method according to one embodiment of the present invention;
FIG. 2 is a schematic diagram of an apparatus in which an authentication device according to an embodiment of the present invention is located;
FIG. 3 is a schematic diagram of an authentication device according to an embodiment of the present invention;
Fig. 4 is a flow chart of another authentication method according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments, and all other embodiments obtained by those skilled in the art without making any inventive effort based on the embodiments of the present invention are within the scope of protection of the present invention.
As shown in fig. 1, an embodiment of the present invention provides an authentication method, which may include the following steps:
step 101, reading identification information of a bank card held by a current user;
102, acquiring identity information matched with the identification information;
Step 103, sending the identity information to an external bank verification module so that the bank verification module verifies the identity information and returns a verification result of the identity information;
step 104, determining whether the verification result represents that the identity information passes verification, if so, executing step 105, otherwise, executing step 106;
Step 105, reading the current weight of the object placed in the target area by the current user, and ending the current flow;
and 106, outputting prompt information for representing that the identity information fails to pass verification.
In the embodiment of the invention, the identity verification method provided by the invention obtains the identity information which is matched with the identification information and used for representing the information of the card holder of the bank card by reading the identification information of the bank card held by the current user, and after the identity information is sent to the bank verification module, whether the identity information passes verification is determined according to the verification result returned by the bank verification module. In summary, the bank verification module is utilized to verify the identity information, namely, the digital verification mode is adopted to perform online verification, so that the efficiency of the identity verification is improved, and the identity information is verified through the bank verification module, so that the verification result of the identity verification is more accurate, the error rate of the identity verification is reduced, and the reliability of the identity verification is improved.
It should be noted that, in the embodiment of the present invention, the identification information of the bank card may be, for example, a bank card number, or other information for characterizing the uniqueness of the bank card. The identity information matched with the identification information of the bank card may include, but is not limited to, a bank card number, a bank card holder name, and a bank card holder identification card number. It will be appreciated that the identity information that matches the identification information of the bank card may include identification information that is identical to the identification information of the bank card.
In one embodiment of the present invention, based on the authentication method shown in fig. 1, step 102 obtains identity information matched with the identification information, including:
Determining whether identity information matched with the identification information exists in the stored data;
if yes, the identity information is sent to an external bank verification module;
If not, receiving the identity information corresponding to the identification information, which is input from the outside, storing the identity information, and executing the step of sending the identity information to an external bank verification module.
In the embodiment of the invention, the preset storage data stores the identity information of a plurality of users, wherein the identity information comprises the information such as the names, the identification card numbers, the identification information of the bank cards and the like of the users. When it is determined that the identity information matched with the read identification information does not exist in the preset storage data, the identity information of the user needs to be stored in the storage data, then the identity information matched with the identification information is acquired from the storage data, and the identity information is sent to an external bank verification module. If the identity information matched with the identification information exists in the database, the identity information matched with the identification information is directly obtained from preset storage data, and the identity information is sent to an external bank verification module. By the arrangement, the preset storage data can be expanded, and the data of the user is more comprehensive, so that the identity verification efficiency is improved.
In one embodiment of the present invention, after the identity information is sent to the external bank verification module in step 103 based on the authentication method shown in fig. 1, the method further includes:
determining whether feedback information which is returned by the bank verification module and used for representing successful receiving of the identity information is received or not;
if the feedback information is not received, acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the acquired identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In the embodiment of the invention, after the identity information is sent to an external bank verification module, if the bank verification module does not receive feedback information for representing the successfully received identity information, current identity information for representing a bank card holder is obtained, and the current identity information is verified by using the identity information obtained from the stored data, namely, the current identity information is verified by a local verification mode. If the current identity information is matched with the identity information, the identity information is proved to pass the verification, otherwise, the identity information is proved to not pass the verification. Therefore, when the external bank verification module cannot be connected or communication with the bank verification module is abnormal, the identity information can be verified in a local verification mode, the efficiency of the identity verification is improved, and the follow-up grain vending can be smoothly carried out.
It can be appreciated that in the embodiment of the present invention, the authentication may also be performed by means of manual authentication. For example, when the user uses the same bank card to sell grains for a plurality of times within a preset time range, the identity verification is performed by a manual verification mode, so that the efficiency of the identity verification can be further improved.
It should be noted that, in the embodiment of the present invention, the identity information is sent to an external bank verification module through a relay. A relay is a transmission path between two switching centers. A trunk is a physical connection carrying multiple logical links. With the development of technology, the concept of relay is widely applied to the fields of wireless communication and the like. The relay includes three types of analog relay, digital relay, and IP relay.
In one embodiment of the present invention, based on the authentication method shown in fig. 1, it is determined whether feedback information for indicating successful receipt of the identity information returned by the bank verification module is received, and the method specifically includes the following steps:
A1, determining a first time point corresponding to the identity information sent to a bank verification module;
a2, determining a current time point;
step A3, judging whether the time interval between the determined current time point and the first time point is larger than a preset first threshold value, if so, executing the step A4, otherwise, executing the step A2;
a4, recording an abnormal record for representing communication abnormality with a bank verification module;
step A5, determining whether the number of times of abnormal records of the identity information record is larger than a preset second threshold value, if so, executing step A7, otherwise, executing step A6;
step A6, the identity information is sent to an external bank verification module, and the step A1 is returned;
And step A7, determining that feedback information which is returned by the bank verification module and used for representing successful receiving of the identity information is not received.
In the embodiment of the invention, after the identity information is sent to the bank verification module, if the feedback information which is returned by the bank verification module and used for representing that the identity information is successfully received is not received within a preset first threshold, an abnormal record which is used for representing that the communication is abnormal is recorded once, whether the abnormal record corresponding to the identity information is within a preset second threshold is judged, if yes, the identity information is sent to the bank verification module again until the abnormal record corresponding to the identity information exceeds the preset second threshold or the feedback information which is returned by the bank verification module and used for representing that the identity information is successfully received is received within the preset second threshold, otherwise, the identity information is determined to be not successfully received by the bank verification module. By means of the arrangement, on one hand, delay in receiving the identity information by the bank verification module caused by unsmooth network can be avoided, and on the other hand, occupation of a transmission path can be reduced by presetting the first threshold value and the second threshold value, so that the efficiency of identity verification is improved.
In one embodiment of the present invention, after the identity information is sent to the external bank verification module in step 103 based on the authentication method shown in fig. 1, the method further includes:
Receiving verification information fed back by a bank verification module, wherein the verification information is information stored by the bank verification module and used for verifying identity information;
Deleting the identity information and storing the verification information as the identity information.
In the embodiment of the invention, the identity information is sent to an external bank verification module, and feedback information for representing that the identity information is successfully received is received from the bank verification module, namely, when the communication with the bank verification module is normal, verification information sent from the bank verification module is received, wherein the verification information is stored in the bank verification module and is used for verifying the identity information, the identity information corresponding to the identification information of the bank card stored in the stored data is deleted, and the verification information is stored as the identity information. By the arrangement, the identity information stored in the stored data can be synchronously updated, so that the verification result obtained by local verification is more accurate, and the reliability of the identity verification is improved.
In one embodiment of the present invention, based on the authentication method shown in fig. 1, after determining whether the verification result characterizes the identity information to pass the authentication in step 104, the method further includes:
When the identification information of the bank card held by the current user is read currently, determining a second time point corresponding to the currently read identification information;
Determining a third time point corresponding to the time when the history identification information is read for the bank card, wherein the history identification information is the identification information read before the currently read identification information, and the time interval between the third time point and the second time point is the shortest;
determining whether a time interval between the second time point and the third time point is smaller than a preset third threshold value;
if yes, reading target identity information corresponding to the identification information in the stored data;
acquiring current identity information for representing the identity of a cardholder of a bank card;
Determining whether the current identity information is matched with the read target identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In the embodiment of the invention, when the identification information of the bank card held by the current user is read currently, the current time point is obtained as a second time point, a third time point which is used for reading the identification information again and has the shortest time interval with the second time point after the verification result corresponding to the identification information is obtained is determined, and whether the time interval between the second time point and the third time point is larger than a preset third threshold value is judged. If so, a local verification mode is adopted, specifically, target identity information corresponding to the identification information in the stored data is read, current identity information used for representing the identity of the bank card holder is obtained, whether the target identity information is matched with the current identity information or not is judged, if so, the identity information is confirmed to pass the verification, and otherwise, the identity information is confirmed to not pass the verification. If not, adopting an online verification mode, namely sending the target identity information to a bank verification module for verification. In conclusion, by setting the effective time limit of verification and adopting a dual verification mode of combining local verification and online verification, the operation of online verification is prevented from being too frequent, the efficiency of identity verification is improved, and the reliability of the identity verification result is also improved.
For example, assuming that the third threshold is 24 hours, when Wang Mou holds a bank card 11:00 on month 1 of 2020, it is determined that the identity information is verified by online verification. If the time when the identification information of the bank card held by Wang Mou is 15:00 from the year 2020, 1 month and 2 days, the acquired identification information needs to be verified by adopting an online verification mode. If the time when the identification information of the bank card held by Wang Mou is read again is 18:00 of 1 st of 2020, the acquired identification information is verified only by adopting a local verification mode.
As shown in fig. 2 and 3, an embodiment of the present invention provides an authentication device. The embodiment of the authentication device can be realized by software, hardware or a combination of the hardware and the software. In terms of hardware, as shown in fig. 2, a hardware structure diagram of a device where the authentication device is located according to an embodiment of the present invention is shown, where in addition to the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 2, the device where the device is located in the embodiment may generally include other hardware, such as a forwarding chip responsible for processing a packet, and so on. Taking a software implementation as an example, as shown in fig. 3, the device in a logic sense is formed by reading corresponding computer program instructions in a nonvolatile memory into a memory by a CPU of a device where the device is located for operation.
As shown in fig. 3, the authentication apparatus provided in this embodiment includes an acquisition unit 301, a transmission unit 302, and a determination unit 303;
an obtaining unit 301, configured to read identification information of a bank card held by a current user, and obtain identity information matched with the identification information, where the identity information is information of a cardholder characterizing the bank card;
a sending unit 302, configured to send the identity information acquired by the acquiring unit 301 to an external bank verification module, so that the bank verification module verifies the identity information and returns a verification result of the identity information;
a determining unit 303, configured to determine whether the verification result sent by the sending unit 302 indicates that the identity information passes verification, if so, read the current weight of the article placed in the target area by the current user, and otherwise output prompt information for indicating that the identity information does not pass verification.
In one embodiment of the invention, based on the authentication device shown in figure 3,
An acquisition unit 301 for performing the following processing:
Determining whether there is identity information in the stored data that matches the identification information,
If yes, acquiring identity information matched with the identification information from the stored data;
If not, receiving the identity information corresponding to the identification information and which is input externally, and storing the identity information.
In one embodiment of the invention, based on the authentication device shown in figure 3,
The determining unit 303 is further configured to perform the following processing:
determining whether feedback information which is returned by the bank verification module and used for representing successful receiving of the identity information is received or not;
if the feedback information is not received, acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the acquired identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In one embodiment of the invention, based on the authentication device shown in figure 3,
The determining unit 303 is further configured to perform the following processing:
determining whether feedback information which is returned by the bank verification module and used for representing successful receiving of the identity information is received or not;
if the feedback information is not received, acquiring current identity information for representing the identity of a cardholder of the bank card;
determining whether the current identity information is matched with the acquired identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
In one embodiment of the invention, based on the authentication device shown in figure 3,
The determining unit 303 is further configured to perform the following processing:
a1, determining a first time point corresponding to the identity information sent to a bank verification module;
A2, determining a current time point;
A3, judging whether the time interval between the determined current time point and the first time point is larger than a preset first threshold value, if so, executing A4, otherwise, executing A2;
a4, recording an abnormal record for representing communication abnormality with the bank verification module;
a5, determining whether the number of times of abnormal records of the identity information record is larger than a preset second threshold value, if so, executing A7, otherwise, executing A6;
a6, sending the identity information to an external bank verification module, and returning to the A1;
And A7, determining that feedback information which is returned by the bank verification module and used for representing successful receipt of the identity information is not received.
In one embodiment of the invention, based on the authentication device shown in figure 3,
The obtaining unit 301 is further configured to receive verification information fed back by the bank verification module, delete the obtained identity information, and store the verification information as identity information, where the verification information is information stored by the bank verification module and used to verify the identity information.
In one embodiment of the invention, based on the authentication device shown in figure 3,
The determining unit 303 is further configured to perform the following processing:
after determining that the verification result characterizes the identity information as verified,
When the identification information of the bank card held by the current user is read currently, determining a second time point corresponding to the currently read identification information;
Determining a third time point corresponding to the time when the history identification information is read for the bank card, wherein the history identification information is the identification information read before the currently read identification information, and the time interval between the third time point and the second time point is the shortest;
determining whether a time interval between the second time point and the third time point is smaller than a preset third threshold value;
if yes, reading target identity information corresponding to the identification information in the stored data;
acquiring current identity information for representing the identity of a cardholder of a bank card;
Determining whether the current identity information is matched with the read target identity information;
if yes, determining that the identity information passes verification;
otherwise, determining that the identity information is not verified.
It should be noted that the structure illustrated in the embodiment of the present invention does not constitute a specific limitation on the authentication device. In other embodiments of the invention, the authentication device may comprise more or less components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The content of information interaction and execution process between the modules in the device is based on the same conception as the embodiment of the method of the present invention, and specific content can be referred to the description in the embodiment of the method of the present invention, which is not repeated here.
In order to more clearly illustrate the technical solution and advantages of the present invention, the following describes in detail the authentication method provided in the embodiment of the present invention, as shown in fig. 4, the method may include the following steps:
Step 401, reading identification information of a bank card held by a current user.
In this step, the identification information of the bank card may be information for characterizing the uniqueness of the bank card, for example, may be a bank card number, or may be other information for characterizing the uniqueness of the bank card.
Step 402, determining whether identity information matched with the identification information exists in the stored data, if so, executing step 404, otherwise, executing step 403.
In this step, the preset storage data stores identity information of a plurality of users, where the identity information includes names, identification numbers, identification information, and the like of bank card holders. The identification information must be included in the stored data in the identity information that matches the identification information.
Step 403, obtaining and storing the identity information corresponding to the identification information which is input from the outside.
In this step, if the identity information corresponding to the read identification information is not included in the preset storage data, the identity information corresponding to the identification information input from the outside is acquired, and the identity information is stored in the preset storage data.
And step 404, transmitting the acquired identity information matched with the identification information to an external bank verification module.
In this step, in order to ensure the reliability of the authentication of the identity information, after the identity information is acquired, the identity information needs to be sent to an external bank verification module, so that the authentication of the identity information is performed through the bank verification module with authority.
Step 405, determining whether feedback information which is returned by the bank verification module and used for representing that the identity information is successfully received is received, if yes, executing step 408, otherwise, executing step 406.
In this step, the method specifically includes the following steps:
A1, determining a first time point corresponding to the identity information sent to a bank verification module;
a2, determining a current time point;
step A3, judging whether the time interval between the determined current time point and the first time point is larger than a preset first threshold value, if so, executing the step A4, otherwise, executing the step A2;
a4, recording an abnormal record for representing communication abnormality with a bank verification module;
step A5, determining whether the number of times of abnormal records of the identity information record is larger than a preset second threshold value, if so, executing step A7, otherwise, executing step A6;
step A6, the identity information is sent to an external bank verification module, and the step A1 is returned;
And step A7, determining that feedback information which is returned by the bank verification module and used for representing successful receiving of the identity information is not received.
In the step, whether the identity information is received by the bank verification module is determined, if so, the identity information is verified by the bank verification module with authority, otherwise, the identity information is verified by adopting a local verification mode. By presetting the first threshold value and the second threshold value, the delay of the bank verification module on the receiving of the identity information caused by unsmooth network can be avoided, and the occupation of a transmission path can be reduced, so that the efficiency of the identity verification is improved.
Step 406, obtaining current identity information for characterizing the identity of the cardholder of the bank card.
In this step, if the acquired identity information is not successfully sent to the bank verification module, local verification of the identity information is required. The information used for representing the identity of the bank card holder is obtained as the current identity information, and specifically, the mode of obtaining the current identity information comprises scanning identification and/or identity information input from the outside. Wherein the current identity information may include the name of the bank card holder, the identification card number, identification information, etc.
Step 407, determining whether the current identity information is matched with the acquired identity information, if so, executing step 411, otherwise, executing step 410.
In this step, it is determined whether the acquired current identity information is identical to the information in the acquired identity information, and if so, step 410 is performed, otherwise, step 411 is performed.
Step 408, the received verification information is stored as the identity information corresponding to the bank card, and the acquired identity information is deleted.
In this step, after the bank verification module receives the identity information, the bank verification module returns verification information for verifying the identity information, which is acquired from the stored data. And receiving the verification information, deleting the acquired identity information, and storing the verification information as the identity information corresponding to the bank card so as to update the identity information, thereby improving the accuracy of the local verification result.
Step 409, receiving the verification result from the bank verification module, and determining whether the verification result represents that the identity information passes the verification, if yes, executing step 411, otherwise, executing step 410.
In this step, after the bank verification module verifies the identity information by using the obtained verification information, a verification result is generated and returned, the verification result corresponding to the identity information is received, and it is determined whether the verification result characterizes the identity information to pass the verification, if yes, step 411 is executed, otherwise, step 410 is executed.
Step 410, outputting prompt information for representing that the identity information fails verification, and ending the current flow.
In the step, if the identity information is determined to be not verified, the prompt information for representing that the identity information is not verified is output, so that the information of the held bank card is further confirmed by the current user.
Step 411, reading the current weight of the item currently placed in the target area by the user.
In the step, after the identity information is confirmed to pass verification, the current weight of the articles placed in the target area by the current user is read, and subsequent grain vending operation is carried out.
Step 412, when the identification information of the bank card held by the current user is read currently, determining a second time point corresponding to the currently read identification information.
In this step, when the identification information of the bank card is read again, the time point at this time is determined as a second time point.
Step 413, determining a third time point corresponding to the time when the history identification information is read for the bank card.
In this step, the history identification information is the identification information read before the identification information currently read, and the time interval between the third time point and the second time point is the shortest.
For example, assume that the second time point is 11:00 on 1 month and 2 days in 2020, and the time when the identification information of the bank card is read before the second time point is 9:00 on 1 month and 2 days in 2020, 19:00 on 1 month and 1 day in 2020, and 7:00 on 1 month and 1 day in 2020, respectively. Then 9:00 on 1/2/2020 was taken as the third time point.
Step 414 is to determine whether the time interval between the second time point and the third time point is less than a preset third threshold, if yes, step 415 is performed, otherwise step 404 is performed.
In this step, assuming that the third threshold is 24 hours, it is determined whether the time interval between the second time point (11:00 on 1 month and 2 days in 2020) and the third time point (9:00 on 1 month and 2 days in 2020) is less than 24 hours, if yes, step 415 is executed, otherwise step 404 is executed.
Step 415, reading the target identity information corresponding to the identification information in the stored data.
In this step, the target identity information corresponding to the identification information in the stored data is verification information returned when the last online verification of the bank verification module is performed.
Step 416, obtaining current identity information characterizing the identity of the cardholder of the bank card.
In this step, information representing the identity of the bank card holder, which is input from the outside, is received as current identity information, wherein the current identity information includes the name of the bank card holder, an identification card number, identification information, and the like. In particular, the manner in which the current identity information is obtained includes scanning identification and/or identity information entered externally. Wherein the current identity information comprises the name of the bank card holder, the number of the identity card, identification information and the like.
Step 417, determining whether the current identity information matches the read target identity information, if so, executing step 418, otherwise, executing step 419.
In this step, it is determined whether the current identity information is completely identical to the read target identity information, and if so, step 418 is performed, otherwise, step 419 is performed.
Step 418, reading the current weight of the object placed in the target area by the current user, and ending the current flow.
In the step, after the identity information is confirmed to pass verification, the current weight of the articles placed in the target area by the current user is read, the subsequent grain vending operation is carried out, and the current flow is ended.
Step 419, outputting prompt information for representing that the identity information fails verification.
In the step, if the identity information is determined to be not verified, the prompt information for representing that the identity information is not verified is output, so that the information of the held bank card is further confirmed by the current user.
The embodiment of the invention also provides intelligent equipment, which comprises at least one memory and at least one processor;
the at least one memory for storing a machine readable program;
The at least one processor is configured to invoke the machine-readable program to perform the authentication method of any of the embodiments of the present invention.
Embodiments of the present invention also provide a computer readable medium having stored thereon computer instructions which, when executed by a processor, cause the processor to perform the authentication method of any of the embodiments of the present invention.
In this case, the program code itself read from the storage medium may realize the functions of any of the above-described embodiments, and thus the program code and the storage medium storing the program code form part of the present invention.
Examples of storage media for providing program code include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs, DVD+RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer by a communication network.
Further, it should be apparent that the functions of any of the above-described embodiments may be implemented not only by executing the program code read out by the computer, but also by causing an operating system or the like operating on the computer to perform part or all of the actual operations based on the instructions of the program code.
Further, it is understood that the program code read out by the storage medium is written into a memory provided in an expansion board inserted into a computer or into a memory provided in an expansion module connected to the computer, and then a CPU or the like mounted on the expansion board or the expansion module is caused to perform part and all of actual operations based on instructions of the program code, thereby realizing the functions of any of the above embodiments.
It should be noted that not all the steps and units in the above flowcharts and the system configuration diagrams are necessary, and some steps or units may be omitted according to actual needs. The execution sequence of the steps is not fixed and can be adjusted as required. The system structure described in the above embodiments may be a physical structure or a logical structure, that is, some modules may be implemented by the same physical entity, or some modules may be implemented by multiple physical entities, or may be implemented jointly by some components in multiple independent devices.
In the above embodiments, the hardware module may be mechanically or electrically implemented. For example, a hardware module may include permanently dedicated circuitry or logic (e.g., a dedicated processor, FPGA, or ASIC) to perform the corresponding operations. The hardware modules may also include programmable logic or circuitry (e.g., a general-purpose processor or other programmable processor) that may be temporarily configured by software to perform the corresponding operations. The particular implementation (mechanical, or dedicated permanent, or temporarily set) may be determined based on cost and time considerations.
While the invention has been illustrated and described in detail in the drawings and in the preferred embodiments, the invention is not limited to the disclosed embodiments, and it will be appreciated by those skilled in the art that the code audits of the various embodiments described above may be combined to produce further embodiments of the invention, which are also within the scope of the invention.

Claims (4)

CN202010883046.8A2020-08-282020-08-28 Authentication method and deviceActiveCN111951019B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010883046.8ACN111951019B (en)2020-08-282020-08-28 Authentication method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010883046.8ACN111951019B (en)2020-08-282020-08-28 Authentication method and device

Publications (2)

Publication NumberPublication Date
CN111951019A CN111951019A (en)2020-11-17
CN111951019Btrue CN111951019B (en)2024-12-06

Family

ID=73366963

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010883046.8AActiveCN111951019B (en)2020-08-282020-08-28 Authentication method and device

Country Status (1)

CountryLink
CN (1)CN111951019B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112723072A (en)*2020-12-282021-04-30上海贝思特电气有限公司Elevator control method and device, electronic equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110414197A (en)*2019-08-062019-11-05中国工商银行股份有限公司The bank-user auth method and device of Behavior-based control feature

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1760904A (en)*2005-11-172006-04-19张晔Charging system based on validation of fingerprint
CN103236002B (en)*2013-04-162016-08-17中国工商银行股份有限公司Businessman is to client's B2C messaging device system and method
GB2517775B (en)*2013-08-302016-04-06Cylon Global Technology IncApparatus and methods for identity verification
CN105591745A (en)*2014-11-072016-05-18中国银联股份有限公司Method and system for performing identity authentication on user using third-party application
CN105897721B (en)*2016-05-032019-01-25广州广电运通金融电子股份有限公司Verify the method and device of fiscard user identity reliability
EP3564886A4 (en)*2017-01-252020-03-11Huawei Technologies Co., Ltd. METHOD AND DEVICE FOR ADDING A BANK CARD
CN108183924A (en)*2018-03-012018-06-19深圳市买买提信息科技有限公司A kind of login validation method and terminal device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110414197A (en)*2019-08-062019-11-05中国工商银行股份有限公司The bank-user auth method and device of Behavior-based control feature

Also Published As

Publication numberPublication date
CN111951019A (en)2020-11-17

Similar Documents

PublicationPublication DateTitle
CN109087090B (en)Method and apparatus for tracking targets using trusted account book
US10509924B2 (en)Systems and methods for electronic device point-of-sale activation
CN112801646B (en)Data processing method and device
US9697298B2 (en)ID tag authentication system and method
CN107196842B (en)Method and device for realizing message anti-counterfeiting
CN112231673A (en) Bank statement acquisition method, device, device and storage medium combining RPA and AI
EP4030367B1 (en)Sign-bill collection method and apparatus based on blockchain, and device and readable storage medium
WO1998056129A1 (en)System and method for processing transaction messages
EP3553722A1 (en)Systems and methods for point-to-point encryption compliance
CN106648643A (en)Method and device for generating channel package, terminal and server
JP2007527173A (en) Ordering method for mobile radio network users
CN111951019B (en) Authentication method and device
CN113435862A (en)Bill processing method and device based on mailbox
JP2019504545A (en) Method and apparatus for recognizing service request for changing mobile phone number
JP2006343790A (en) Event hash creation method, event history storage method, event information verification method, and event information processing system
CN110363457A (en)Method and system based on express delivery odd numbers matching express company's title
CN108230130B (en)Method and device for verifying daily cutting data and electronic equipment
CN113239398A (en)Service processing method and device
JP6019187B1 (en) Company information matching apparatus and company information matching program
US7639144B2 (en)System and method of validating asset tracking codes
US20210342780A1 (en)Initiating delivery by mail using pre-generated barcode
CN105868380A (en)Heterogenous data reading method and electronic equipment
CN111241082B (en)Data correction method and device
US20230185610A1 (en)Electronic communication and transaction processing
US20230289415A1 (en)Fingerprint card implementation method and fingerprint card

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
CB02Change of applicant information

Country or region after:China

Address after:No. 527 Dongyue Street, Daiyue District, Tai'an City, Shandong Province, 271000

Applicant after:INSPUR SOFTWARE Co.,Ltd.

Address before:No. 1036, Shandong high tech Zone wave road, Ji'nan, Shandong

Applicant before:INSPUR SOFTWARE Co.,Ltd.

Country or region before:China

CB02Change of applicant information
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp