Disclosure of Invention
Based on the above problems, the application provides a method and a device for authenticating user information, so as to conveniently and simply acquire and authenticate the user information.
The application discloses a method for authenticating user information, which comprises the following steps:
responding to an authentication request from a user, and sending a 5G authentication message containing a face recognition hyperlink to the user;
responding to the operation of the user on the face recognition hyperlink, and calling the face recognition function of the mobile phone end of the user to acquire the face information of the user;
and receiving the face information from the user for authentication.
Optionally, the step of calling the face recognition function of the mobile phone end of the user to obtain the face information of the user includes:
the face recognition function of the mobile phone end of the user is aroused to acquire the face information of the user, and the coding algorithm module of the mobile phone end of the user is aroused to generate a random transaction code; the random transaction code is used for assisting in authentication of the face information.
Optionally, the receiving the face information from the user performs authentication, including:
receiving the face information and the random transaction code from the user;
and when the face information is consistent with the face information of the user in the database and the random transaction code can be decoded by a preset key, judging that the authentication is passed.
Optionally, the sending, in response to an authentication request from a user, a 5G authentication message including a face recognition hyperlink to the user includes:
requesting the user to input related information through a 5G message in response to an authentication request from the user; the related information comprises a building, a house number and an identity card number;
receiving the related information from the user, and verifying whether the related information meets authentication requirements; the authentication requirement comprises that the identity card number is matched with the building and the house number;
and after passing verification, sending a 5G authentication message containing a face recognition hyperlink to the user.
Optionally, the step of calling the face recognition function of the mobile phone end of the user to obtain the face information of the user includes:
when the user authorization allows the external link to call the face recognition function, the face recognition function is called to acquire the face information of the user;
and when the user does not authorize the external link to call the face recognition function, requesting the user to authorize the external link to call the face recognition function until the user authorizes the external link to call the face recognition function.
Based on the above method for authenticating user information, the application also discloses a device for authenticating user information, comprising: an authentication message sending unit, a face recognition evoking unit and an authentication unit;
the authentication message sending unit is used for responding to an authentication request from a user and sending a 5G authentication message containing a face recognition hyperlink to the user;
the face recognition calling unit is used for responding to the operation of the user on the face recognition hyperlink and calling the face recognition function of the mobile phone end of the user so as to acquire the face information of the user;
the authentication unit is used for receiving the face information from the user for authentication.
Optionally, the face recognition evoking unit includes:
the random transaction code generation subunit is used for calling the face recognition function of the mobile phone end of the user to acquire the face information of the user and calling the coding algorithm module of the mobile phone end of the user to generate a random transaction code; the random transaction code is used for assisting in authentication of the face information.
Optionally, the authentication unit includes:
an information receiving subunit, configured to receive the face information and the random transaction code from the user;
and the information authentication subunit is used for judging that the authentication is passed when the face information is consistent with the face information of the user in the database and the random transaction code can be decoded by a preset key.
Optionally, the authentication message sending unit includes:
an information request subunit, configured to request, in response to an authentication request from a user, the user to input related information through a 5G message; the related information comprises a building, a house number and an identity card number;
an information verification subunit, configured to receive the related information from the user, and verify whether the related information meets an authentication requirement; the authentication requirement comprises that the identity card number is matched with the building and the house number;
and the message sending subunit is used for sending a 5G authentication message containing the face recognition hyperlink to the user after the authentication is passed.
Optionally, the face recognition evoking unit includes:
an authorization evoked subunit, configured to evoke the face recognition function to obtain face information of the user when the user authorization allows an external link to evoke the face recognition function;
and the authorization request subunit is used for requesting the user to authorize the external link to call the face recognition function until the user authorizes the external link to call the face recognition function when the user does not authorize the external link to call the face recognition function.
The application discloses a method and a device for authenticating user information. Can be applied to the financial field or other fields. And responding to an authentication request from a user, sending a 5G authentication message containing a face recognition hyperlink to the user, responding to the operation of the user on the face recognition hyperlink, calling a face recognition function of a mobile phone end of the user to acquire face information of the user, and receiving the face information from the user for authentication. The method of the application supports the completion of the demand through message transmission, supports the transmission of multi-form information, and reduces the steps of account verification and login. The online business handling without downloading and entering the webpage operation is realized, the user experience is improved, and the user information can be acquired and authenticated more conveniently and simply.
Detailed Description
The method and the device for authenticating the user information can be used in the financial field or other fields, for example, can be used in a house guarantee payment scene in the financial field. Other fields are any field other than the financial field, for example, the data processing field. The foregoing is merely exemplary, and is not intended to limit the application field of the method and apparatus for user information authentication provided by the present application.
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Embodiment one: the application discloses a user information authentication method.
Specifically, referring to fig. 1, a method for authenticating user information disclosed in the present embodiment includes the following steps:
step 101: and responding to the authentication request from the user, and sending a 5G authentication message containing a face recognition hyperlink to the user.
In the method of this embodiment, both communication devices need to have a 5G communication chip and open a 5G message service, and the areas where both communication devices are located need to be within the coverage of the 5G communication.
In the method described in this embodiment, as an alternative method, when the user needs to transact the service, the request information may be sent, and the form of the information may be a phone call, a short message, or a 5G message, which is not specifically limited herein, and the requested party may receive the request information. For example, when the user needs to pay the house deposit, a short message may be used to send a request for authentication to the bank to pay the house deposit. The user is requested to input related information through a 5G message in response to an authentication request from the user. The related information comprises a building, a house number and an identity card number. At this time, the user can input related information in the message input page through the 5G message, and the form of the information can be text, voice, image, position and the like, and the form of the related information is not particularly limited and can be sent to the information receiver. For example, a user may provide building and house number information by locating a location, provide an identification card photograph, and provide an identification card number.
In the method of this embodiment, after receiving the related information from the user, it is necessary to verify whether the related information meets an authentication requirement. The authentication requirement includes the identification card number matching the building and the house number. As an example, when paying a house deposit, it is necessary to verify that the building, the house number, and the identification number are actually present, and the user represented by the identification number is indeed the owner of the house number in the building.
In the method of this embodiment, after verification is passed, a 5G authentication message including a face recognition hyperlink is sent to the user, so as to perform subsequent operations according to the face information of the user. As an alternative method, the 5G authentication message also includes request information requesting the user to input a bank card number for subsequent operations according to the contract. The user can input the card number first and then click the hyperlink to conduct face recognition, or click the hyperlink to conduct face recognition first and then input the card number. The order of inputting the card number and clicking the hyperlink is not particularly limited, and both the face information and the card number can be obtained.
Step 102: and responding to the operation of the user on the face recognition hyperlink, and calling the face recognition function of the mobile phone end of the user to acquire the face information of the user.
In the method of this embodiment, when the user authorization allows the external link to evoke the face recognition function, the face recognition function is evoked to acquire face information of the user. And when the user does not authorize the external link to call the face recognition function, requesting the user to authorize the external link to call the face recognition function. When the user refuses the authorization to allow the external link to call the face recognition function, the user is reminded that the face authentication operation cannot be performed if the external link is not allowed to call the face recognition function. As an alternative method, the user is also requested to authorize the external link to call the camera, and when the user refuses to authorize the external link to call the camera, the user is reminded that the face recognition function cannot be started if the external link is not allowed to call the camera.
In the method of this embodiment, a face recognition function of the mobile phone end of the user is evoked to obtain face information of the user, and an encoding algorithm module of the mobile phone end of the user is evoked to generate a random transaction code; the random transaction code is used for assisting in authentication of the face information. The encoding algorithm module is arranged at the mobile phone end of the user in advance in a plug-in mode, and can generate a random transaction code according to the 5G message, and the random transaction code can be decoded through a key preset by a bank and is used for guaranteeing the safety of information authentication. For example, when the random transaction code cannot be decoded by the bank through the key, the encoding algorithm module generates the random transaction code according to the 5G message sent by the non-bank, and the service cannot be handled.
Step 103: and receiving the face information from the user for authentication.
In the method of this embodiment, the face information and the random transaction code from the user are received, and when the face information is consistent with the face information of the user in the database, and the random transaction code can be decoded by a preset key, it is determined that authentication is passed. When one of the comparison of the face information and the decoding of the random transaction code fails, judging that the authentication fails, and returning a message that the user authentication fails. And when the authentication is passed, performing business operation according to the content of the contract and the card number provided by the user. As an example, when a house deposit is paid, a user's bank card is queried through a card number, and the house deposit in the bank card is frozen by an amount specified by a contract.
As an alternative method, the face information may be compared with the face information of the user in the database, and then the random transaction code may be decoded by using a preset key. As another alternative method, the random transaction code may be decoded by a preset key while comparing the face information with the face information of the user in the database. The sequence of the face information and decoding operation is not specifically limited, and a comparison result and a decoding result can be obtained.
The preset secret key can be set by different service types or different banks, the classification of the preset secret key is not limited specifically, and whether the random transaction code is correct or not can be verified through decoding.
In the method described in this embodiment, during the transmission of the 5G message, the sender encrypts the ciphertext of the data of the 5G message, and the receiver decrypts the encrypted 5G message when receiving it. The 5G messages in the transmission process are all in the ciphertext form, so that the safety of the client information can be ensured.
The method of the embodiment supports the completion of the requirement through message transmission, supports the transmission of multi-form information, and reduces the steps of account verification and login. The user information can be obtained only through 5G message sending and receiving without downloading or entering a webpage operation, and face recognition authentication is carried out through hyperlinks, so that online business handling is completed. The random transaction code authentication is added, the security of information authentication is enhanced, and meanwhile, the 5G information coming and going is converted into ciphertext for transmission so as to maintain the security of user information. The user experience is improved, and the user information can be acquired and authenticated more conveniently, simply and safely.
Embodiment two: the method of the embodiment is introduced for information interaction between the user and the bank in a house payment insurance policy scene. Fig. 2 is a timing chart of a method for authenticating user information according to an embodiment of the present application, as shown in fig. 2:
the user sends a request for authentication to the bank for information to pay the house principal, i.e., authentication request 201. The bank responds to the authentication request 201 and returns a related information input request 202 requesting the user to input the floor, house number and identification card number. After receiving the relevant information input request 202, the user sends relevant information 203 to the bank.
The bank verifies the relevant information 203 and after the verification is passed, sends authentication information 204 containing the face recognition hyperlink and the card number input request to the user. The user clicks the face recognition hyperlink to acquire face information, and the coding algorithm module automatically generates a random transaction code. The acquired face information, the random transaction code and the input card number are used as a payment authentication request 205 and sent to a bank. The bank responds to the payment authentication request 205, and after the authentication is passed, the bank freezes the house guarantee according to the contract and the card number.
The method of the embodiment supports the requirement of acquiring and authenticating user information through the transceiving of 5G messages, and supports the transmission of multi-form (such as hyperlinks) information. The method does not need to download or enter a webpage operation, and reduces the steps of account verification and login. And the random transaction code authentication is added, so that the security of information authentication is enhanced. The user experience is improved, and the user information can be acquired and authenticated more conveniently, simply and safely.
Based on the method for authenticating user information disclosed in the above embodiment, the present embodiment correspondingly discloses a device for authenticating user information. Referring to fig. 3, the apparatus for authenticating user information includes: an authentication message transmission unit 301, a face recognition evoking unit 302, and an authentication unit 303;
the authentication message sending unit 301 is configured to send, to a user, a 5G authentication message including a face recognition hyperlink in response to an authentication request from the user;
the face recognition arousing unit 302 is configured to arouse a face recognition function of a mobile phone end of the user to acquire face information of the user in response to the operation of the user on the face recognition hyperlink;
the authentication unit 303 is configured to receive the face information from the user for authentication.
Optionally, the face recognition evoking unit 302 includes:
the random transaction code generation subunit is used for calling the face recognition function of the mobile phone end of the user to acquire the face information of the user and calling the coding algorithm module of the mobile phone end of the user to generate a random transaction code; the random transaction code is used for assisting in authentication of the face information.
Optionally, the authentication unit 303 includes:
an information receiving subunit, configured to receive the face information and the random transaction code from the user;
and the information authentication subunit is used for judging that the authentication is passed when the face information is consistent with the face information of the user in the database and the random transaction code can be decoded by a preset key.
Optionally, the authentication message sending unit 301 includes:
an information request subunit, configured to request, in response to an authentication request from a user, the user to input related information through a 5G message; the related information comprises a building, a house number and an identity card number;
an information verification subunit, configured to receive the related information from the user, and verify whether the related information meets an authentication requirement; the authentication requirement comprises that the identity card number is matched with the building and the house number;
and the message sending subunit is used for sending a 5G authentication message containing the face recognition hyperlink to the user after the authentication is passed.
Optionally, the face recognition evoking unit 302 includes:
an authorization evoked subunit, configured to evoke the face recognition function to obtain face information of the user when the user authorization allows an external link to evoke the face recognition function;
and the authorization request subunit is used for requesting the user to authorize the external link to call the face recognition function until the user authorizes the external link to call the face recognition function when the user does not authorize the external link to call the face recognition function.
The embodiments in this specification are described in a progressive manner. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
It is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The features described in the embodiments of the present specification may be interchanged or combined to enable those skilled in the art to make or use the application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.