Movatterモバイル変換


[0]ホーム

URL:


CN117172786A - Identity authentication method, device, equipment, medium and program product - Google Patents

Identity authentication method, device, equipment, medium and program product
Download PDF

Info

Publication number
CN117172786A
CN117172786ACN202311117611.XACN202311117611ACN117172786ACN 117172786 ACN117172786 ACN 117172786ACN 202311117611 ACN202311117611 ACN 202311117611ACN 117172786 ACN117172786 ACN 117172786A
Authority
CN
China
Prior art keywords
user
verification
identity authentication
characteristic
authentication method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311117611.XA
Other languages
Chinese (zh)
Inventor
张悦
刘航宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBCfiledCriticalIndustrial and Commercial Bank of China Ltd ICBC
Priority to CN202311117611.XApriorityCriticalpatent/CN117172786A/en
Publication of CN117172786ApublicationCriticalpatent/CN117172786A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

The present disclosure provides an identity authentication method, which can be applied to the technical field of information security and the technical field of finance. The identity authentication method comprises the following steps: acquiring a media access control address corresponding to user login equipment; address verification is carried out on the user login equipment based on the media access control address; under the condition that address verification passes, verifying an international mobile equipment identification code of user login equipment; and under the condition that the international mobile equipment identification code passes verification, verifying the biological identification characteristic of the user. The present disclosure also provides an identity authentication apparatus, device, storage medium and program product.

Description

Identity authentication method, device, equipment, medium and program product
Technical Field
The present disclosure relates to the field of information security technologies, and more particularly, to an identity authentication method, apparatus, device, medium, and program product.
Background
Currently, with the development of globalization and information communication technologies, the existing traditional banking systems and financial markets are being changed into automated banking systems, the traditional banking operation modes are improved, and the business which is handled by a computer at a banking counter is mostly performed by self-service through a mobile banking network. However, internet security is more complex than computer security, and there are often hackers attempting to steal private information such as personal identification information, personal bank account numbers, etc. over the network. Compared with banking outlets, the electronic bank performs business operation through the mobile phone screen, and the electronic transaction is completely based on the online bank, so that the electronic bank has more autonomy in position. Therefore, the defense of the internet banking software, i.e., the software security, mainly depends on the security of the electronic bank.
When the existing electronic bank login system is used for registering, a user name, a login password, a payment password and the like are required to be set, a complicated password is easy to forget for a client, so that transaction matters are influenced, on the other hand, the password is used for logging, the possibility that the password is peeped by other people exists, the network security is threatened, and the security risk is increased.
Disclosure of Invention
In view of the foregoing, the present disclosure provides identity authentication methods, apparatuses, devices, media, and program products that improve user transaction security.
According to a first aspect of the present disclosure, there is provided an identity authentication method, comprising: acquiring a media access control address corresponding to user login equipment; address verification is carried out on the user login equipment based on the media access control address; under the condition that address verification passes, verifying an international mobile equipment identification code of user login equipment; and under the condition that the international mobile equipment identification code passes verification, verifying the biological identification characteristic of the user.
According to an embodiment of the present disclosure, before verifying an international mobile equipment identity of a user login device, the method includes: acquiring account information of a user based on an identity authentication request of the user; acquiring a user identification card serial number corresponding to the account information based on the account information; verifying the serial number of the user identification card; and under the condition that the serial number of the user identification card passes verification, acquiring an international mobile equipment identification code corresponding to the user login equipment.
According to an embodiment of the present disclosure, before verifying a biometric feature of a user, the method includes: acquiring authorization of a user to enter a biometric feature; the biometric characteristic is entered after the authorization of the user to enter the biometric characteristic is obtained, wherein the biometric characteristic comprises a combination of one or more of a fingerprint characteristic, a facial characteristic, an iris characteristic, a retina characteristic, a sound characteristic, a gait characteristic, a keystroke dynamics characteristic, a gaze gesture characteristic, and a signature characteristic of the user.
According to an embodiment of the present disclosure, obtaining a media access control address corresponding to a user login device includes: acquiring authorization of a user to enter basic information; inputting basic information after obtaining authorization of inputting the basic information by the user; acquiring account information corresponding to the user identity based on the basic information; and acquiring a media access control address corresponding to the user login equipment based on the basic information and the account information.
According to an embodiment of the present disclosure, the identity authentication method further includes: and under the condition that the biometric characteristic passes verification, verifying the dynamic password.
In accordance with an embodiment of the present disclosure, in the event that biometric feature verification passes, verifying the dynamic password includes: acquiring authorization of a user for inputting a dynamic password; and inputting the dynamic password after the authorization of the user to input the dynamic password is obtained, wherein the dynamic password comprises an authentication code.
According to an embodiment of the present disclosure, the identity authentication method further includes: and under the condition that the dynamic password passes verification, the server edits personal account information of the user according to the user requirement and/or completes transaction matters.
According to an embodiment of the present disclosure, the identity authentication method further includes: after the server edits personal account information of the user according to the user requirements and/or completes transaction matters, the user logs out.
A second aspect of the present disclosure provides an identity authentication device, comprising: the acquisition module is used for acquiring the media access control address corresponding to the user login equipment; the first verification module is used for performing address verification on the user login equipment based on the media access control address; the second verification module is used for verifying the international mobile equipment identification code of the user login equipment under the condition that the address verification is passed; and the third verification module is used for verifying the biological identification characteristics of the user under the condition that the international mobile equipment identification code passes verification.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the identity authentication method described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described authentication method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above-described authentication method.
According to the identity authentication method, device, equipment, medium and program product, a multi-factor authentication mode, namely a multi-stage encryption frame authentication mode combining medium access control address authentication, international mobile equipment identification code authentication and biological identification feature authentication is adopted, wherein the medium access control address can verify whether a network card address stored by a user is correct, the international mobile equipment identification code authentication can verify whether a mobile phone card is installed on common login equipment or not, and the biological identification feature authentication can verify whether the mobile phone card is operated by the user or not, so that the transaction environment of the user is safer, the user can finish authentication without inputting a user name and a password, potential safety hazards caused by password memorizing of the user are avoided, and the operation is more convenient.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of an identity authentication method according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of an identity authentication method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flowchart for obtaining an International Mobile Equipment identity of a user login device in an identity authentication method according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a flowchart for acquiring biometric characteristics of a user in an authentication method according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart for obtaining a dynamic password in an identity authentication method according to an embodiment of the present disclosure;
FIG. 6 schematically illustrates a flowchart of acquiring a media access control address corresponding to a user login device in an authentication method according to an embodiment of the present disclosure;
FIG. 7 schematically illustrates an interaction schematic diagram of a user login device client and a server in an identity authentication method according to an embodiment of the present disclosure;
FIG. 8 schematically illustrates a block diagram of an identity authentication device according to an embodiment of the present disclosure; and
Fig. 9 schematically illustrates a block diagram of an electronic device adapted to implement an identity authentication method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
It should be noted that, the method and the device for authenticating identity in the present disclosure may be used in the case of authenticating identity of a user in the financial field, and may also be used in the case of authenticating identity of a user in any field other than the financial field, and the application field of the method and the device for authenticating identity in the present disclosure is not limited.
In the technical scheme of the invention, the related user information (including but not limited to user personal information, user image information, user equipment information, such as position information and the like) and data (including but not limited to data for analysis, stored data, displayed data and the like) are information and data authorized by a user or fully authorized by all parties, and the processing of the related data such as collection, storage, use, processing, transmission, provision, disclosure, application and the like are all conducted according to the related laws and regulations and standards of related countries and regions, necessary security measures are adopted, no prejudice to the public welfare is provided, and corresponding operation inlets are provided for the user to select authorization or rejection.
The embodiment of the disclosure provides an identity authentication method, which comprises the following steps: acquiring a media access control address corresponding to user login equipment; address verification is carried out on the user login equipment based on the media access control address; under the condition that address verification passes, verifying an international mobile equipment identification code of user login equipment; and under the condition that the international mobile equipment identification code passes verification, verifying the biological identification characteristic of the user. According to the identity authentication method, device, equipment, medium and program product, a multi-factor authentication mode, namely a multi-stage encryption frame authentication mode combining medium access control address authentication, international mobile equipment identification code authentication and biological identification feature authentication is adopted, wherein the medium access control address can verify whether a network card address stored by a user is correct, the international mobile equipment identification code authentication can verify whether a mobile phone card is installed on common login equipment or not, and the biological identification feature authentication can verify whether the mobile phone card is operated by the user or not, so that the transaction environment of the user is safer, the user can finish authentication without inputting a user name and a password, potential safety hazards caused by password memorizing of the user are avoided, and the operation is more convenient.
Fig. 1 schematically illustrates an application scenario diagram of an identity authentication method according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that, the identity authentication method provided in the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the identity authentication device provided in the embodiments of the present disclosure may be generally disposed in the server 105. The identity authentication method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the identity authentication apparatus provided by the embodiments of the present disclosure may also be provided in a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The identity authentication method of the disclosed embodiment will be described in detail with reference to fig. 2 to 7 based on the scenario described in fig. 1.
In this embodiment, for example, the user wants to log in the electronic banking system by using the identity authentication method of the embodiment of the present disclosure, so as to complete the transaction.
Before logging in an electronic banking system according to an embodiment of the present disclosure, a user needs to perform the following operations:
Firstly, a user opens a bank account, when the bank account is opened, the user is required to register personal information in a bank website, wherein the personal information comprises the name, the identification card number, the birth date, the sex, the ethnicity, the household address, the current residence address and the mobile phone number of the user, and meanwhile, the biological recognition characteristics of the user are acquired, wherein the biological recognition characteristics comprise one or more combinations of fingerprint characteristics, facial characteristics, iris characteristics, retina characteristics, voice characteristics, gait characteristics, keystroke dynamic characteristics, gazing gesture characteristics and signature characteristics of the user, after the user information is acquired, the bank website can audit the personal information of the user, and the user passing the audit can be allocated with a bank account, and the bank account is unique.
Next, a media access control address (network card address) and an international mobile equipment identification code of the user login device are registered according to the bank account and the account holder name.
Finally, the user registers an identification card serial number (SSN) and a mobile phone number according to the personal information. All the information provided by the user is stored in the bank server, when the user seeks to enter their server, their information is checked in the server, for example, if it matches its stored data, and after verification the user is allowed to enter the bank server, if they do not match, the user is rejected by the system.
Fig. 2 schematically illustrates a flow chart of an identity authentication method according to an embodiment of the present disclosure.
As shown in fig. 2, the identity authentication method of this embodiment includes operations S210 to S240, and the identity authentication method may be performed in a server.
In operation S210, a media access control address corresponding to the user login device is acquired.
The media access control address (Media Access Control Address), i.e. the MAC address, also known as the lan address, is an address used to identify the location of the network device, each device in the network having a unique network identification, which is written inside the hardware when produced by the manufacturer of the network device. The media access control address is used to uniquely identify a network card in the network, and if one or more network cards exist in a device, each network card needs and has a unique media access control address. In this embodiment, the login device of the user may be, for example, a smart phone or a palm computer.
In operation S220, address verification is performed on the user login device based on the media access control address.
According to the embodiment of the disclosure, since the media access control address can be used as the unique identifier of the network connection of the user login device, the media access control address corresponding to the user login device is acquired, and whether the network card address is the network card address stored by the user before can be verified.
In operation S230, in case the address authentication passes, the international mobile equipment identification code of the user login device is authenticated.
The international mobile equipment identification code (International Mobile Equipment Identity, IMEI), which is commonly called a mobile phone serial number and a mobile phone 'serial number', is used for identifying each independent mobile communication device such as a mobile phone in a mobile phone network, and is equivalent to an identity card of the mobile phone, the serial number is 15-17 digits in total, the first 8 digits are model approval numbers, are codes for distinguishing the brand and the model of the mobile phone, the middle 2 digits are assembly numbers, represent the final assembly place codes, the last 6 digits are serial numbers, and represent production sequence numbers. The international mobile equipment identification code is generally attached to the back of the body and the outer package, and is also stored in the memory of the mobile phone, and can be queried by inputting the #06# in the dialing keyboard of the mobile phone.
According to the embodiment of the disclosure, the user inputs the login device account to verify the international mobile equipment identification code to judge whether the card of the login device is installed on the common login device.
In operation S240, in case that the international mobile equipment identity verification is passed, the biometric characteristic of the user is verified.
Through the verification of the media access control address and the verification of the international mobile equipment identification code, the network card address of the user login equipment can be determined, the mobile phone card is ensured to be normally installed on the login equipment, and under the condition that the verification is passed, the user is verified to be biological identification features, in the embodiment, for example, the facial information of the user can be collected to verify the biological identification features of the user in a face identification mode.
According to the embodiment of the disclosure, the multi-factor authentication mode, namely the multi-stage encryption frame authentication mode combining the media access control address authentication, the international mobile equipment identification code authentication and the biological identification feature authentication, is adopted, wherein the media access control address can verify whether the network card address stored by the user is correct, the international mobile equipment identification code authentication can verify whether the mobile phone card is installed on the common login equipment, and the biological identification feature authentication can verify whether the mobile phone card is operated by the user, so that the transaction environment of the user is safer, the user can finish authentication without inputting a user name and a password, the potential safety hazard brought by the user due to password memorizing is avoided, and the operation is more convenient.
Fig. 3 schematically illustrates a flowchart for acquiring an international mobile equipment identification code of a user login device in an identity authentication method according to an embodiment of the present disclosure.
As shown in fig. 3, the identity authentication method of this embodiment includes operations S310 to S340.
In operation S310, account information of the user is acquired based on the user' S authentication request.
According to the embodiment of the present disclosure, after the user completes the information collection work, the user may start to access the electronic bank, the user opens the electronic bank to connect to a server of the bank, general information about the bank and banking services may be obtained, but the user may not perform transaction matters involving money at this step. When the user tries to access a page involving a money transaction, the server will check the media access control address of the user's mobile phone, which means that the server will verify whether this media access control address is stored in the server, and whether the browsing request comes from the verified user, if the media access control addresses of the user's mobile phone match, the account information of the user is entered for the next verification, which in this embodiment may be the user's phone number, for example.
In operation S320, a serial number of the subscriber identity card corresponding to the account information is obtained based on the account information.
According to the embodiment of the disclosure, after receiving account information input by a user, a bank server obtains a user identification card serial number according to the account information, then checks the identification card serial number stored in the bank server, and then the bank server requests an operator server to perform further authentication, wherein all information about the mobile phone and the user is stored in the operator server.
In operation S330, the user identification card serial number is verified.
According to an embodiment of the present disclosure, the carrier server will check the information identification card serial number about the login device.
In operation S340, in case that the user identification card serial number verification is passed, an international mobile equipment identification code corresponding to the user login device is acquired.
According to the embodiment of the disclosure, in the case that the verification of the serial number of the user identification card is passed, the international mobile equipment identification code corresponding to the user login equipment is further verified.
According to the embodiment of the disclosure, the bank server verifies whether the international mobile equipment identification code is matched, and it is required to state that the account information of the user, the serial number of the identification card and the international mobile equipment identification code can be verified step by step in the verification process, namely, the account information of the prior card and the serial number of the identification card are verified again, and finally, the international mobile equipment identification code is verified, or the international mobile equipment identification code can be verified simultaneously.
In the case of simultaneous verification of the user's account information, identification card serial number and international mobile equipment identity, if the operator server detects that the account information, identification card serial number and international mobile equipment identity all match the reservation information, it will forward a receipt to the bank server. For matched data, the carrier server will send a positive reply showing "all data matches", whereas for negative replies, i.e. not all data is matched, the carrier server will send a reply to the bank server showing "all data matches, except for X", where "X" represents the personal digital data of the user stored in the carrier server, such as the account information of the user, the identification card serial number and the international mobile equipment identification code.
Fig. 4 schematically illustrates a flowchart for acquiring a biometric feature of a user in an authentication method according to an embodiment of the present disclosure.
As shown in fig. 4, the identity authentication method of this embodiment includes operations S410 to S420.
In operation S410, authorization of the user to enter the biometric feature is obtained.
According to the embodiment of the disclosure, when account information, an identification card serial number and an international mobile equipment identification code of a user are all verified, a bank server can acquire access rights of logging in equipment of the user, and biological identification characteristics of the user are acquired.
In operation S420, biometric characteristics are entered after being authorized for the user to enter biometric characteristics, wherein the biometric characteristics include a combination of one or more of fingerprint characteristics, facial characteristics, iris characteristics, retina characteristics, voice characteristics, gait characteristics, keystroke dynamics characteristics, gaze gesture characteristics, signature characteristics of the user.
According to an embodiment of the present disclosure, the biometric characteristic of the user may be, for example, one or more of a fingerprint characteristic, a facial characteristic, an iris characteristic, a retina characteristic, a voice characteristic, a gait characteristic, a keystroke dynamic characteristic, a gaze gesture characteristic, and a signature characteristic, and it is stated that the biometric characteristic may be used for identification verification by one of them, or may be used for identification verification by a combination of multiple features thereof. In this embodiment, the bank server may collect face information of the user according to the access authority, for example, to perform identification verification.
According to the embodiment of the disclosure, the bank server performs matching with the face information of the user stored in the database according to the collected face information to prove that the user performs corresponding operation, and a specific matching mode can be identified by adopting a face identification technology, for example.
According to an embodiment of the present disclosure, the identity authentication method of this embodiment further includes operation S430.
In operation S430, in the case that the biometric characteristic verification is passed, the dynamic password is verified.
According to the embodiment of the disclosure, the bank server identifies the facial information of the user according to the face recognition technology, if the identification is passed, the bank server generates a reply of 'face recognition passed', and sends a dynamic password to the mobile phone of the user, otherwise, if the identification is not passed, the bank server displays 'face recognition failed'.
Fig. 5 schematically illustrates a flowchart of acquiring a dynamic password in an identity authentication method according to an embodiment of the present disclosure.
As shown in fig. 5, the identity authentication method of this embodiment includes operations S510 to S530.
In operation S510, a user' S authorization to enter a dynamic password is obtained.
Dynamic passwords (Dynamic Password) are combinations of random numbers that are unpredictable to generate according to a specific algorithm, and each Password can only be used once. The dynamic password is used as one of the safest identity authentication technologies, has been applied by more and more industries, and as the dynamic password is used conveniently and is platform-independent, the dynamic password technology has become the main stream of the identity authentication technology along with the development of the mobile internet, and is widely applied to the fields of enterprises, network games, finance and the like, and the enterprises engaged in the relevant research and development and production of the dynamic password at home and abroad are more and more, and the dynamic password has the advantages of fast and seamless interoperation with various business systems, the completely autonomous research and development of the dynamic password identity authentication software system is stable and efficient, and supports various authentication modes, the solution can serve enterprises with different scales, and the main stream is used for generating a dynamic password terminal and has four types of hardware tokens, short message passwords, mobile phone tokens and software tokens.
In operation S520, a dynamic password is input after being authorized by the user to input the dynamic password, wherein the dynamic password includes an authentication code.
According to embodiments of the present disclosure, the dynamic password may be, for example, an authentication code, which is sent to the user's mobile phone after authentication by the server of the bank and the carrier company, and the user does not need to always remember and use the same password, and the password is dynamic and valid for a short time, which is why no one can use the password once it is used, so using the authentication code instead of the password can provide more security for the user's bank transaction.
According to the embodiment of the present disclosure, after the user inputs the verification code, the bank server verifies the verification code, which is the last authentication procedure of the authentication method of the present embodiment.
According to an embodiment of the present disclosure, the identity authentication method of this embodiment further includes operation S530.
In case the dynamic password authentication is passed, the server edits personal account information of the user according to the user' S requirement and/or completes transaction matters in operation S530.
According to the embodiment of the disclosure, under the condition that the verification code passes verification, the user completes the last gateway, at this time, the user can log in the mobile banking client to edit personal account information or complete related transaction matters, such as inquiring account balance, transferring money, purchasing financial products and the like.
According to an embodiment of the present disclosure, the identity authentication method of this embodiment further includes operation S540.
In operation S540, after the server edits the personal account information of the user according to the user' S needs and/or completes the transaction, the user logs out.
According to the embodiment of the disclosure, after logging in the electronic banking system to perform related operations, the user completes the self-demand service, and at this time, the user is logged out. Logging out after transaction is completed, so that the user needs to re-authenticate when logging in next time, and the situation that the user steals personal identity information by a hacker due to long-time online client is avoided.
Fig. 6 schematically illustrates a flowchart of acquiring a media access control address corresponding to a user login device in an authentication method according to an embodiment of the present disclosure.
As shown in fig. 6, the identity authentication method of this embodiment includes operations S610 to S640.
In operation S610, authorization of the user to enter the basic information is acquired.
According to the embodiment of the disclosure, before the identity authentication method according to the embodiment, the basic information of the user needs to be acquired, where the basic information is consistent with the personal information of the user, that is, corresponds to a link of opening a bank account before the user logs in the electronic bank system through the identity authentication method of the embodiment of the disclosure, and is not described herein again.
In operation S620, the basic information is entered after being authorized by the user to enter the basic information.
According to the embodiment of the disclosure, the user inputs own basic information including the name, the identification card number, the birth date, the sex, the ethnicity, the household address, the living address and the mobile phone number of the user, and simultaneously, the user also has the biological identification characteristic information, and the bank server can store all relevant information after inputting the basic information.
In operation S630, account information corresponding to the user identity is acquired based on the basic information.
According to the embodiment of the disclosure, the account information of the user is extracted from the user basic information, and in this embodiment, the account information of the user may be, for example, a telephone number of the user.
In operation S640, a media access control address corresponding to the user login device is acquired based on the basic information and the account information.
According to the embodiment of the disclosure, after the user basic information and the account information are obtained, the network card address, namely the media access control address, of the user mobile phone is registered according to the basic information and the account information.
Fig. 7 schematically illustrates an interaction schematic diagram of a user login device client and a server in an identity authentication method according to an embodiment of the present disclosure.
As shown in fig. 7, in the identity authentication method of this embodiment, the interaction principle between the client and the server of the user login device is as follows:
and in the beginning stage, the server completes a secure transport layer protocol, establishes a secure session with the client, verifies the media access control address of the user login device based on the secure session, inputs a telephone number further to the client, verifies the telephone number, the identification card serial number and the international mobile equipment identification code according to the data certificate, stops the process if any one of the telephone number, the identification card serial number and the international mobile equipment identification code fails to pass the verification, inputs face information to the client if all the identification card serial number and the identification card serial number fails to pass the verification, performs face identification verification on the face information by the server, and further verifies the input verification code after the face identification verification passes, and if the verification code passes the verification, the user logs in the electronic banking system.
Based on the identity authentication method, the disclosure also provides an identity authentication device. The device will be described in detail below in connection with fig. 8.
Fig. 8 schematically shows a block diagram of an identity authentication device according to an embodiment of the present disclosure.
As shown in fig. 8, the identity authentication device 800 of this embodiment includes an acquisition module 810, a first verification module 820, a second verification module 830, and a third verification module 840.
The obtaining module 810 is configured to obtain a media access control address corresponding to a user login device. In an embodiment, the obtaining module 810 may be configured to perform the operation S210 described above, which is not described herein.
The first verification module 820 is configured to perform address verification on the user login device based on the media access control address. In an embodiment, the first verification module 820 may be used to perform the operation S220 described above, which is not described herein.
The second verification module 830 is configured to verify the international mobile equipment identification code of the user login device if the address verification passes. In an embodiment, the second verification module 830 may be configured to perform the operation S230 described above, which is not described herein.
The third verification module 840 is configured to verify the biometric characteristic of the user if the international mobile equipment identity is verified. In an embodiment, the second verification module 840 may be used to perform the operation S240 described above, which is not described herein.
According to the embodiment of the disclosure, the identity authentication device 800 of the embodiment adopts a multi-factor authentication mode, namely a multi-stage encryption frame authentication mode combining media access control address authentication, international mobile equipment identification code authentication and biometric authentication, wherein the media access control address can verify whether the network card address stored by the user is correct, the international mobile equipment identification code authentication can verify whether the mobile phone card is installed on a common login device, the biometric authentication can verify whether the mobile phone card is operated by the user, the user can finish authentication without inputting a user name and a password, potential safety hazard caused by password memorizing of the user is avoided, and the user transaction is safer.
According to an embodiment of the present disclosure, any of the acquisition module 810, the first verification module 820, the second verification module 830, and the third verification module 840 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of the acquisition module 810, the first verification module 820, the second verification module 830, and the third verification module 840 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the acquisition module 810, the first authentication module 820, the second authentication module 830, and the third authentication module 840 may be at least partially implemented as computer program modules that, when executed, perform the respective functions.
Fig. 9 schematically illustrates a block diagram of an electronic device adapted to implement an identity authentication method according to an embodiment of the present disclosure.
As shown in fig. 9, an electronic device 900 according to an embodiment of the present disclosure includes a processor 901 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. The processor 901 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 901 may also include on-board memory for caching purposes. Processor 901 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the electronic device 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other by a bus 904. The processor 901 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the program may be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in one or more memories.
According to an embodiment of the disclosure, the electronic device 900 may also include an input/output (I/O) interface 905, the input/output (I/O) interface 905 also being connected to the bus 904. The electronic device 900 may also include one or more of the following components connected to the I/O interface 905: an input section 906 including a keyboard, a mouse, and the like; an output portion 907 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 908 including a hard disk or the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as needed. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 910 so that a computer program read out therefrom is installed into the storage section 908 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 902 and/or RAM 903 and/or one or more memories other than ROM 902 and RAM 903 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the identity authentication method provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 901. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed, and downloaded and installed in the form of a signal on a network medium, via communication portion 909, and/or installed from removable medium 911. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from the network via the communication portion 909 and/or installed from the removable medium 911. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 901. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (12)

CN202311117611.XA2023-08-312023-08-31Identity authentication method, device, equipment, medium and program productPendingCN117172786A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202311117611.XACN117172786A (en)2023-08-312023-08-31Identity authentication method, device, equipment, medium and program product

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202311117611.XACN117172786A (en)2023-08-312023-08-31Identity authentication method, device, equipment, medium and program product

Publications (1)

Publication NumberPublication Date
CN117172786Atrue CN117172786A (en)2023-12-05

Family

ID=88946323

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202311117611.XAPendingCN117172786A (en)2023-08-312023-08-31Identity authentication method, device, equipment, medium and program product

Country Status (1)

CountryLink
CN (1)CN117172786A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN117670262A (en)*2024-01-312024-03-08成都双流建工建设集团有限公司Project management system and method
CN119520067A (en)*2024-11-142025-02-25华北电力大学 Multi-factor identity authentication method for access control of distribution network data assets

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN117670262A (en)*2024-01-312024-03-08成都双流建工建设集团有限公司Project management system and method
CN117670262B (en)*2024-01-312024-04-26成都双流建工建设集团有限公司Project management system and method
CN119520067A (en)*2024-11-142025-02-25华北电力大学 Multi-factor identity authentication method for access control of distribution network data assets

Similar Documents

PublicationPublication DateTitle
US10454924B1 (en)Systems and methods for providing credentialless login using a random one-time passcode
US10708257B2 (en)Systems and methods for using imaging to authenticate online users
US10735198B1 (en)Systems and methods for tokenized data delegation and protection
US9864987B2 (en)Account provisioning authentication
KR102141836B1 (en)Two factor authentication
US8572701B2 (en)Authenticating via mobile device
US9009793B2 (en)Dynamic pin dual factor authentication using mobile device
US10057255B2 (en)Preventing unauthorized access to secured information systems using multi-device authentication techniques
US10489565B2 (en)Compromise alert and reissuance
CN117172786A (en)Identity authentication method, device, equipment, medium and program product
US11233897B1 (en)Secure call center communications
US9413744B2 (en)Method and system for authenticating service
US10158628B2 (en)Preventing unauthorized access to secured information systems based on contextual login information
US10580000B2 (en)Obtaining user input from a remote user to authorize a transaction
US10659458B2 (en)Systems and methods for performing biometric registration and authentication of a user to provide access to a secure network
CN112968797B (en)Application configuration method, system and storage medium of cloud service software
CN111832005A (en)Application authorization method, application authorization device and electronic equipment
US10057249B2 (en)Preventing unauthorized access to secured information systems using tokenized authentication techniques
TWI839875B (en) Payment method, user terminal, device, equipment, system and medium
US12354101B2 (en)Systems and methods for providing in-person status to a user device
CN111314343B (en) Account management method, device and readable storage medium
US8731195B2 (en)Method and system for initiating secure transactions within a defined geographic region
KR102029333B1 (en)Method for payment process, Server for payment process and Computer program for the same
CN113849791B (en) Third-party platform registration method, device, equipment, medium and program product
US20230300132A1 (en)Authentication method and system

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp