Specific embodiment
The embodiment of the present application provides a kind of method and device for verifying user identity.
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with the embodiment of the present application
Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only
It is some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, ordinary skill people
The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the scope of the application protection.
The flow chart of user identity method is verified for the embodiment of the present application is a kind of as shown in Figure 1, in system server terminal according to suspicious
The credible telephone number of account is communicated with user, the content in checking accounts information, such that it is able to ensure the safety of the account
Property.The method of the present embodiment can be run in the security system of electronic transaction, or is individually located independently of security system
Reason, and whether the result for freezing suspicious account is exported, so that suspicious account is freezed or thawed to security system.
Method is specifically included in this figure, step 101, obtains the accounts information of suspicious account.
Step 102, communicates with the credible telephone number in the accounts information, and obtains the userspersonal information of user's offer.
Step 103, verify the userspersonal information whether with the accounts information in content matching, exported if matching
The information being verified, otherwise exports the information of authentication failed.
Wherein, the information being verified can be received by such as security system, and carry out releasing the operation for freezing the suspicious account,
The information of authentication failed can similarly be received by such as security system, and carry out freezing this can be with the operation of account.
As one embodiment of the application, communicated with the credible telephone number in the accounts information, and user's offer is provided
Userspersonal information further include, carry out voice communication with the credible telephone number by automated audio systems, and lead to
Cross speech recognition system and recognize the userspersonal information that the user provides.
Wherein, after the terminal with credible telephone number is connected, terminal plays from automated audio systems to the credible telephone number
Voice content set in advance, voice content can be, for example, that " you are good for user, and your platform account there may be risk, please say
Go out your ID card No. to check whether the transaction for carrying out just now obtains your mandate ", when user is by terminal (fixed electricity
Words or mobile phone) when the ID card No. of oneself is input into the way of voice, system end obtains the userspersonal information, and
Voice messaging is converted to by text information by speech recognition system, in order to follow-up matching, the identity in certain the present embodiment
Card number is a citing, the only user such as some problem answers that only user knows that can also be reserved by user
There are several trees etc. on the information known, such as first phone number, doorway.Described automated audio systems and speech recognition system
Scheme of the prior art can be used, be will not be repeated here.
In the present embodiment, carried out with credible telephone number voice communication potentially include for example, by wechat class can send voice believe
Social class software and the credible telephone number of breath carry out voice communication, and receive the individual subscriber letter of the speech data class of user's return
Breath, text information is converted to by speech recognition system by the speech data.
As one embodiment of the application, communicated with the credible telephone number in the accounts information, and user's offer is provided
Userspersonal information further include, short message is sent to the authentic mobile number by short message system, and obtain
The userspersonal information for taking family return.
Wherein, to credible mobile number send short message content can with voice communication embodiment in it is identical, and extract use
The short message for being loaded with userspersonal information that family returns, obtains userspersonal information therein.
Used as one embodiment of the application, the credible telephone number is the telephone number bound with the suspicious account.Binding
Telephone number can be fixed telephone number or Mobile Directory Number.
Used as one embodiment of the application, the userspersonal information includes passport NO., home address, the bank card of user
Number etc. is not generally the user profile being known to others, and certain userspersonal information can also include other information content, above-mentioned interior
Hold and simply illustrate, do not limit the scope of userspersonal information.
As one embodiment of the application, also include among the accounts information for obtaining suspicious account,
Judge whether the suspicious account is certification account;
If certification account, then corresponding accounts information is obtained;
Otherwise, the information of authentication failed is exported.
Substantial amounts of non-authentication account can be rejected by this step, recognized because the subsequent step of technical scheme is needed to use
The credible telephone number bound in card account carries out subscriber authentication, does not carry out follow-up checking step for the account without certification
Suddenly, so as to save overhead, and improve treatment effeciency.
As one embodiment of the application, judge whether the suspicious account is that certification account is further included, judge described
Whether include certification mark in suspicious account, be certification account if including the certification mark, be otherwise non-authentication account.
Wherein, certification account all has credible telephone number.
Contacted with the credible telephone number of suspicious account by the method in above-mentioned the embodiment of the present application, verify the individual of user input
Whether information is identical with the accounts information in database, can automatically contact user, after finding that account is frozen without waiting for user
Passive contacts with user, due to reducing artificial participation, so as to improve the response speed of checking user, improves user's
Experience, and automatic verification process reduces cost of human resources without the participation of contact staff.
It is illustrated in figure 2 a kind of structural representation for verifying user identity device of the embodiment of the present application, the device of the present embodiment can be with
In running on independent server, or it is integrated in existing security system, meter can be run on by way of software module
In calculation machine, or each functional module is solidified among chip by logical devices such as FPGA (programmable logic array), should
Device by internet and user terminal communication, or can be carried out voice, short message etc. and led to by communication network and user terminal
Letter, and by private line network or the data communication of internet and parameter accounts information.
The present embodiment specifically includes acquiring unit 201, the accounts information for obtaining suspicious account.
Communication unit 202, for being communicated with the credible telephone number in the accounts information, and obtains the user of user's offer
People's information.
Processing unit 203, for verify the userspersonal information whether with the accounts information in content matching, if
With the information that is verified then is exported, the information of authentication failed is otherwise exported.
Used as one embodiment of the application, the communication unit is further included, automatic speech module and sound identification module,
Voice communication is carried out by automatic speech module and the credible telephone number, and recognizes that the user carries by sound identification module
The userspersonal information of confession.Wherein, the automatic speech module can use automatic speech chip of the prior art or software
Module realizes that the sound identification module can be realized using voice recognition chip of the prior art or software module.
Used as one embodiment of the application, the communication unit is further included, short message module, by the short message mould
Block sends short message to the authentic mobile number, and obtains the userspersonal information of user's return.
Used as one embodiment of the application, the acquiring unit is further included, judge module, for judging the suspicious account
Whether number it is certification account, if certification account, then obtains corresponding accounts information;Otherwise, the information of authentication failed is exported.
Used as one embodiment of the application, whether the judge module determines whether include certification mark in the suspicious account
Note, is certification account if including the certification mark, is otherwise non-authentication account.
By the device in above-mentioned the embodiment of the present application, the credible telephone number with suspicious account is contacted, and verifies the individual of user input
Whether people's information is identical with the accounts information in database, can automatically contact user, finds that account is frozen without waiting for user
It is passive afterwards to be contacted with user, due to reducing artificial participation, so as to improve the response speed of checking user, improve user
Experience, and automatic verification process reduces cost of human resources without the participation of contact staff.
A kind of system data flow graph for verifying user identity of the embodiment of the present application is illustrated in figure 3, checking body is included in the figure
Part device, user terminal, and account information database, wherein, user terminal can be smart mobile phone or landline telephone,
It is in this example smart mobile phone, the account information database can be the account information database in existing electronic trading system,
The accounts information that open communication port can be obtained in the database is only needed to, security system can be with checking identity in this example
Device is connected (do not show security system in figure), and the information that security system can be exported according to checking identification means is performed to be freezed
The operation of account or non-Frozen Account.
Step 301 is specifically included in detail in this figure, and checking identification means receive suspicious account.
Suspicious account in this step can be sended over by security system, and the account is freezed by security system, be passed
Whether it is to examine want genuine Frozen Account again to enter to verify identification means.
Account in the present embodiment include 12345678911, wherein, above 123456789 be user account, behind
11 be certification account certification mark, wherein, 1 expression the account (carried out by certificates such as identity cards by real-name authentication
Cross certification), this flag bit is represented when being 0 did not carried out real-name authentication, and the 1 expression account below bound telephone number,
This flag bit represents unbound telephone number when being 0, and telephone number in this example is phone number.Above-mentioned flag bit can
With at last two of account, it is also possible in other positions, such as two before account.
Step 302, judges whether the account is certification account, if certification account then enters step 303, otherwise enters step
Rapid 309.
The judgement of account is authenticated according to foregoing certification mark, if just entered when two flag bits are all 1 in the present embodiment
Enter step 303, otherwise into step 309.
In other embodiments, possible only one of which flag bit, i.e., only included in account one whether bound phone number
Flag bit, enters step 303, otherwise into step 309 if telephone number has been bound.
The identity of user cannot be determined due to non-authentication account, therefore checking identity also just becomes highly difficult, can by preliminary judgement
Whether doubtful account is certification account, can filter substantial amounts of non-authentication account, so as to reduce the data processing amount of checking identification means.
Step 303, checking identification means obtain the accounts information of the suspicious account from account information database.
In the present embodiment, in accounts information at least include address name, binding phone number, type of credential, passport NO.,
Frequent location, can also include other accounts informations certainly, or even can also include Transaction Information, by embodiment below
In provide example.
Step 304, checking identification means dial the binding phone number in accounts information by automated audio systems.
Automated audio systems in this step can carry out language according to the dialog context for prestoring with the binding phone number
Sound communicates, and such as voice communication content is for " dear member XX, you are good, is here Alipay security centre, due to sending out in the recent period
A suspicious transaction is given birth to, it is therefore desirable to verify whether the transaction has obtained your mandate, in please saying your accounts information
Passport NO. ".
Step 305, receives the voice messaging that user is input into by mobile phone terminal.
In this step, the voice messaging of user input is the ID card No. 987654321 of the user, or can also include
Other voice messagings, such as " my ID card No. is " etc..
Step 306, recognizes the passport NO. in the voice messaging.
In this step, the voice messaging of user potentially includes many contents, can be by useless voice by speech recognition system
Information Filtration, only retains predetermined voice messaging, for example can be by " my ID card No. is " in above-mentioned voice messaging, " assorted
Suspicious transaction" etc. content filter, only retain ID card No. 987654321, described speech recognition system can be base
In the speech recognition system of semantics recognition, or the speech recognition system based on cloud computing, the speech recognition system can be with integrated
In the checking identification means, it is also possible to realized by single server or server cluster, that is to say, that speech recognition
Can be realized in identification means are verified, it is also possible to which the voice messaging of the user input that will be received by checking identification means is sent to
Far-end speech identification server is identified, and the recognition result of speech recognition server is then received again.
In this step, if thinking that the suspicious transaction is to be authorized without user after voice message of the user according to above-mentioned steps 304
Transaction, input " Frozen Account ", the voice messaging such as " locking an account " are received by step 305 and for example " locked an account "
Voice messaging after, identify in this step phonetic order or short message of user etc. other instruction, then into step 309,
Make security system Frozen Account.
Step 307, the passport NO. that checking identification means will identify that is matched with the passport NO. in accounts information, if
The match is successful then enters step 308, otherwise into step 309.
Step 308, the information that output passes through checking.
This can be transmitted to security system by the information verified, after security system receives the information by checking, can be with
Releasing is freezed to the account.
Step 309, exports the information of authentication failed.
The information of the authentication failed can be transmitted to security system, after security system receives the information of the authentication failed, can be with
Continue to keep freezing the account.
It is illustrated in figure 4 the system data flow graph of another checking user identity of the embodiment of the present application, the system architecture of the present embodiment
It is similar to figure 3 above, verify that the detailed process and method of identity are otherwise varied with figure 3 above illustrated embodiment.
Step 401 is specifically included in detail in this figure, and checking identification means receive suspicious account.
Step 402, judges whether the account is certification account, if certification account then enters step 403, otherwise enters step
Rapid 410.
Step 403, checking identification means obtain the credible telephone number of the suspicious account from account information database.
In this example, the credible telephone number is phone number, so that it is short that transmission can be received in follow-up verification process
Information.
Step 404, checking identification means are sent to the credible phone number by the text information that short message system will be pre-established
Code.
The text information for pre-establishing in the present embodiment can be similar with the voice communication content in embodiment illustrated in fig. 3, certainly
Wherein it is used to verifying that passport NO. used can also to be other information, such as home address etc..
Step 405, receives the short message that user is input into by mobile phone terminal.
The passport NO. of user input is included in short message in this step, has been also possible that in the short message other
Content, such as useless character, word of inquiry etc..
If user does not authorize any transaction, after the short message of above-mentioned steps 404 is received, the finger of Frozen Account is input into
The instruction character for making the modes such as character, such as special character string " 000 " express.
Step 406, recognizes the passport NO. in the short message.
Can identify the passport NO. of user input by the system such as semantics recognition in this step, and by other unrelated redundancies
Information Filtration.
In this step, if there is no passport NO. in the short message for receiving but the instruction character of Frozen Account, directly
Into step 410, security system Frozen Account is notified.
Step 407, checking identification means obtain the passport NO. of the suspicious account from account information database.
In this step, according to checking information (being in this example passport NO.) predetermined in abovementioned steps 404, from account letter
The corresponding information with the checking information, i.e. passport NO. are obtained in breath database, matching during for follow-up checking identity can
Accurately to obtain accounts information as far as possible, rather than the accounts information for obtaining full dose, so as to ensure the information security of user.
Step 408, the passport NO. that checking identification means will identify that is matched with the passport NO. in accounts information, if
The match is successful then enters step 409, otherwise into step 410.
Step 409, the information that output passes through checking.
This can be transmitted to security system by the information verified, after security system receives the information by checking, can be with
Releasing is freezed to the account.
Step 410, exports the information of authentication failed.
The information of the authentication failed can be transmitted to security system, after security system receives the information of the authentication failed, can be with
Continue to keep freezing the account.
By the method and device in above-mentioned the embodiment of the present application, verify user input personal information whether with database in account
Family information is identical, can automatically contact user, and find that account is passive after being frozen without waiting for user contacts with user, due to
Artificial participation is reduced, so as to improve the response speed of checking user, the experience of user is improved, and verify automatically
Process reduces cost of human resources without the participation of contact staff.
Can clearly be distinguished for the improvement of a technology is improvement on hardware (for example, to diode, transistor, opening
Close etc. circuit structure improvement) or software on improvement (for the improvement of method flow).However, with the development of technology,
The improvement of current many method flows can be considered as directly improving for hardware circuit.Designer nearly all passes through will
Improved method flow is programmed into hardware circuit to obtain corresponding hardware circuit.Therefore, it cannot be said that a method flow
Improvement cannot be realized with hardware entities module.For example, PLD (Programmable Logic Device,
PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) is exactly such a collection
Into circuit, its logic function is determined by user to device programming.Voluntarily programmed by designer a digital display circuit " collection
Into " on a piece of PLD, without asking chip maker to design and make special IC chip 2.And,
Nowadays, substitution manually makes IC chip, and this programming is also used instead " logic compiler (logic compiler) " mostly
Software realizes that when it writes with program development software compiler used is similar, and source code before compiling is also
Write with specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL),
And HDL is also not only a kind of, but there are many kinds, such as ABEL (Advanced Boolean Expression Language),
AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University
Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、
MyHDL, PALASM, RHDL (Ruby Hardware Description Language) etc., most commonly use at present
It is VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog2.
Those skilled in the art also will be apparent to the skilled artisan that and only need to above-mentioned several hardware description languages slightly programming in logic and compile method flow
Journey is in integrated circuit, it is possible to be readily available the hardware circuit for realizing the logical method flow.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processor and
Storage can by the computer-readable medium of the computer readable program code (such as software or firmware) of (micro-) computing device,
Gate, switch, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), FPGA
The form of controller and embedded microcontroller, the example of controller includes but is not limited to following microcontroller:ARC 625D、Atmel
AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, Memory Controller can also quilt
It is embodied as a part for the control logic of memory.
It is also known in the art that in addition to realizing controller in pure computer readable program code mode, completely can be with
Cause controller with gate, switch, application specific integrated circuit, FPGA control by the way that method and step is carried out into programming in logic
Device processed realizes identical function with the form of embedded microcontroller etc..Therefore this controller is considered a kind of Hardware Subdivision
Part, and the device for realizing various functions to including in it can also be considered as the structure in hardware component.Or even, can
Not only can be the software module of implementation method but also can be knot in hardware component will be used to realizing that the device of various functions to be considered as
Structure.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity, or
Realized by the product with certain function.
For convenience of description, it is divided into various units with function during description apparatus above to describe respectively.Certainly, the application is being implemented
When the function of each unit can be realized in same or multiple softwares and/or hardware.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can be by soft
Part adds the mode of required general hardware platform to realize.Based on such understanding, the technical scheme of the application is substantially in other words
The part contributed to prior art can be embodied in the form of software product, and the computer software product can be stored
In storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used to so that computer equipment (can be with
It is personal computer, server, or network equipment etc.) perform some part institutes of each embodiment of the application or embodiment
The method stated.
Each embodiment in this specification is described by the way of progressive, and identical similar part is mutual between each embodiment
Referring to what each embodiment was stressed is the difference with other embodiment.Especially for system embodiment
Speech, because it is substantially similar to embodiment of the method, so description is fairly simple, referring to the part of embodiment of the method in place of correlation
Illustrate.
The application can be used in numerous general or special purpose computing system environments or configuration.For example:Personal computer, server
Computer, handheld device or portable set, laptop device, multicomputer system, the system based on microprocessor, top set
Box, programmable consumer-elcetronics devices, network PC, minicom, mainframe computer, including any of the above system or equipment
DCE etc..
The application can be described in the general context of computer executable instructions, such as program module.
Usually, program module include performing particular task or realize the routine of particular abstract data type, program, object, component,
Data structure etc..The application can also be in a distributed computing environment put into practice, in these DCEs, by passing through
Communication network and connected remote processing devices perform task.In a distributed computing environment, program module may be located at bag
Storage device is included in interior local and remote computer-readable storage medium.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application have it is many deformation and change and
Spirit herein is not departed from, it is desirable to which appended claim includes these deformations and changes without deviating from spirit herein.