[go: up one dir, main page]

CN106921495A - One kind checking user identity method and device - Google Patents

One kind checking user identity method and device Download PDF

Info

Publication number
CN106921495A
CN106921495A CN201510983087.3A CN201510983087A CN106921495A CN 106921495 A CN106921495 A CN 106921495A CN 201510983087 A CN201510983087 A CN 201510983087A CN 106921495 A CN106921495 A CN 106921495A
Authority
CN
China
Prior art keywords
information
account
user
telephone number
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510983087.3A
Other languages
Chinese (zh)
Inventor
陈永平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510983087.3A priority Critical patent/CN106921495A/en
Publication of CN106921495A publication Critical patent/CN106921495A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application is related to security technology area, and more particularly to a kind of checking user identity method and device, wherein method includes obtaining the accounts information of suspicious account;Communicated with the credible telephone number in the accounts information, and the userspersonal information of user's offer is provided;Verify the userspersonal information whether with the accounts information in content matching, the information being verified is exported if matching, otherwise export the information of authentication failed, and user can automatically be contacted by corresponding device, find that account is passive after being frozen without waiting for user to be contacted with user, due to reducing artificial participation, so as to improve the response speed of checking user, improve the experience of user, and automatic verification process reduces cost of human resources without the participation of contact staff.

Description

One kind checking user identity method and device
Technical field
The application is related to security technology area, more particularly to a kind of checking user identity method and device.
Background technology
With the development of internet, increasing people has begun to get used to network electronic transaction, while also occurring in that Increasing transaction risk, wherein account safety risk is the key for being related to user's fund security, personal information security. In the prior art when recognizing account safety risk or can conclude the business, often it is required for freezing account, to ensure user's Fund and information security, are then linked up by customer service with artificial mode and user again, are carried out the defrosting of account or are continued to freeze Operation.
Not only flow is cumbersome for above-mentioned prior art, and needs personnel to participate in, therefore occupies substantial amounts of customer service resource, Er Qieyou In human resources it is limited often link up it is slow, cause user find account be frozen, but do not know reason and the account that cannot thaw Family, causes the experience of user very poor.
Occur in that the security that account is verified in the way of sending mobile phone identifying code automatically in the prior art in another, but it is this In mode, the mobile phone of user may can still cause the damage of user's fund due to being kidnapped or user mobile phone loss by bogusware Lose, need a kind of scheme for verifying user identity badly now to solve above-mentioned technical problem.
The content of the invention
In order to solve the problems, such as that human resources occupancy is excessive during manual verification's user identity in the prior art, it is proposed that one kind checking is used Family identity process and device, can automatically pass to user's ditch the identity of checking user, so as to decide whether to freeze the account of user Family, it is to avoid artificial participation so as to save human cost, and checking user personal information, it is ensured that the reliability of checking, Further ensure the safety of user account.
The embodiment of the present application specifically provides a kind of checking user identity method, including,
Obtain the accounts information of suspicious account;
Communicated with the credible telephone number in the accounts information, and the userspersonal information of user's offer is provided;
Verify the userspersonal information whether with the accounts information in content matching, output is verified if matching Information, otherwise exports the information of authentication failed.
The embodiment of the present application additionally provides a kind of checking user identity device, including,
Accounts information for obtaining suspicious account;
Communication unit, for being communicated with the credible telephone number in the accounts information, and obtains the individual subscriber letter of user's offer Breath;
Processing unit, for verify the userspersonal information whether with the accounts information in content matching, if matching if The information that output is verified, otherwise exports the information of authentication failed.
The technical scheme provided from above the embodiment of the present application, can automatically contact user, and account is found without waiting for user It is passive after frozen to be contacted with user, due to reducing artificial participation, so as to improve the response speed of checking user, lifting The experience of user, and automatic verification process reduces cost of human resources without the participation of contact staff.
Certainly any product or method for implementing the application must be not necessarily required to while reaching all the above advantage.
Brief description of the drawings
In order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art, below will be to embodiment or prior art The accompanying drawing to be used needed for description is briefly described, it should be apparent that, drawings in the following description are only note in the application Some embodiments for carrying, for those of ordinary skill in the art, without having to pay creative labor, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 show a kind of flow chart for verifying user identity method of the embodiment of the present application;
Fig. 2 show a kind of structural representation for verifying user identity device of the embodiment of the present application;
Fig. 3 show a kind of system data flow graph for verifying user identity of the embodiment of the present application;
Fig. 4 show the system data flow graph of another checking user identity of the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides a kind of method and device for verifying user identity.
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with the embodiment of the present application Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the scope of the application protection.
The flow chart of user identity method is verified for the embodiment of the present application is a kind of as shown in Figure 1, in system server terminal according to suspicious The credible telephone number of account is communicated with user, the content in checking accounts information, such that it is able to ensure the safety of the account Property.The method of the present embodiment can be run in the security system of electronic transaction, or is individually located independently of security system Reason, and whether the result for freezing suspicious account is exported, so that suspicious account is freezed or thawed to security system.
Method is specifically included in this figure, step 101, obtains the accounts information of suspicious account.
Step 102, communicates with the credible telephone number in the accounts information, and obtains the userspersonal information of user's offer.
Step 103, verify the userspersonal information whether with the accounts information in content matching, exported if matching The information being verified, otherwise exports the information of authentication failed.
Wherein, the information being verified can be received by such as security system, and carry out releasing the operation for freezing the suspicious account, The information of authentication failed can similarly be received by such as security system, and carry out freezing this can be with the operation of account.
As one embodiment of the application, communicated with the credible telephone number in the accounts information, and user's offer is provided Userspersonal information further include, carry out voice communication with the credible telephone number by automated audio systems, and lead to Cross speech recognition system and recognize the userspersonal information that the user provides.
Wherein, after the terminal with credible telephone number is connected, terminal plays from automated audio systems to the credible telephone number Voice content set in advance, voice content can be, for example, that " you are good for user, and your platform account there may be risk, please say Go out your ID card No. to check whether the transaction for carrying out just now obtains your mandate ", when user is by terminal (fixed electricity Words or mobile phone) when the ID card No. of oneself is input into the way of voice, system end obtains the userspersonal information, and Voice messaging is converted to by text information by speech recognition system, in order to follow-up matching, the identity in certain the present embodiment Card number is a citing, the only user such as some problem answers that only user knows that can also be reserved by user There are several trees etc. on the information known, such as first phone number, doorway.Described automated audio systems and speech recognition system Scheme of the prior art can be used, be will not be repeated here.
In the present embodiment, carried out with credible telephone number voice communication potentially include for example, by wechat class can send voice believe Social class software and the credible telephone number of breath carry out voice communication, and receive the individual subscriber letter of the speech data class of user's return Breath, text information is converted to by speech recognition system by the speech data.
As one embodiment of the application, communicated with the credible telephone number in the accounts information, and user's offer is provided Userspersonal information further include, short message is sent to the authentic mobile number by short message system, and obtain The userspersonal information for taking family return.
Wherein, to credible mobile number send short message content can with voice communication embodiment in it is identical, and extract use The short message for being loaded with userspersonal information that family returns, obtains userspersonal information therein.
Used as one embodiment of the application, the credible telephone number is the telephone number bound with the suspicious account.Binding Telephone number can be fixed telephone number or Mobile Directory Number.
Used as one embodiment of the application, the userspersonal information includes passport NO., home address, the bank card of user Number etc. is not generally the user profile being known to others, and certain userspersonal information can also include other information content, above-mentioned interior Hold and simply illustrate, do not limit the scope of userspersonal information.
As one embodiment of the application, also include among the accounts information for obtaining suspicious account,
Judge whether the suspicious account is certification account;
If certification account, then corresponding accounts information is obtained;
Otherwise, the information of authentication failed is exported.
Substantial amounts of non-authentication account can be rejected by this step, recognized because the subsequent step of technical scheme is needed to use The credible telephone number bound in card account carries out subscriber authentication, does not carry out follow-up checking step for the account without certification Suddenly, so as to save overhead, and improve treatment effeciency.
As one embodiment of the application, judge whether the suspicious account is that certification account is further included, judge described Whether include certification mark in suspicious account, be certification account if including the certification mark, be otherwise non-authentication account. Wherein, certification account all has credible telephone number.
Contacted with the credible telephone number of suspicious account by the method in above-mentioned the embodiment of the present application, verify the individual of user input Whether information is identical with the accounts information in database, can automatically contact user, after finding that account is frozen without waiting for user Passive contacts with user, due to reducing artificial participation, so as to improve the response speed of checking user, improves user's Experience, and automatic verification process reduces cost of human resources without the participation of contact staff.
It is illustrated in figure 2 a kind of structural representation for verifying user identity device of the embodiment of the present application, the device of the present embodiment can be with In running on independent server, or it is integrated in existing security system, meter can be run on by way of software module In calculation machine, or each functional module is solidified among chip by logical devices such as FPGA (programmable logic array), should Device by internet and user terminal communication, or can be carried out voice, short message etc. and led to by communication network and user terminal Letter, and by private line network or the data communication of internet and parameter accounts information.
The present embodiment specifically includes acquiring unit 201, the accounts information for obtaining suspicious account.
Communication unit 202, for being communicated with the credible telephone number in the accounts information, and obtains the user of user's offer People's information.
Processing unit 203, for verify the userspersonal information whether with the accounts information in content matching, if With the information that is verified then is exported, the information of authentication failed is otherwise exported.
Used as one embodiment of the application, the communication unit is further included, automatic speech module and sound identification module, Voice communication is carried out by automatic speech module and the credible telephone number, and recognizes that the user carries by sound identification module The userspersonal information of confession.Wherein, the automatic speech module can use automatic speech chip of the prior art or software Module realizes that the sound identification module can be realized using voice recognition chip of the prior art or software module.
Used as one embodiment of the application, the communication unit is further included, short message module, by the short message mould Block sends short message to the authentic mobile number, and obtains the userspersonal information of user's return.
Used as one embodiment of the application, the acquiring unit is further included, judge module, for judging the suspicious account Whether number it is certification account, if certification account, then obtains corresponding accounts information;Otherwise, the information of authentication failed is exported.
Used as one embodiment of the application, whether the judge module determines whether include certification mark in the suspicious account Note, is certification account if including the certification mark, is otherwise non-authentication account.
By the device in above-mentioned the embodiment of the present application, the credible telephone number with suspicious account is contacted, and verifies the individual of user input Whether people's information is identical with the accounts information in database, can automatically contact user, finds that account is frozen without waiting for user It is passive afterwards to be contacted with user, due to reducing artificial participation, so as to improve the response speed of checking user, improve user Experience, and automatic verification process reduces cost of human resources without the participation of contact staff.
A kind of system data flow graph for verifying user identity of the embodiment of the present application is illustrated in figure 3, checking body is included in the figure Part device, user terminal, and account information database, wherein, user terminal can be smart mobile phone or landline telephone, It is in this example smart mobile phone, the account information database can be the account information database in existing electronic trading system, The accounts information that open communication port can be obtained in the database is only needed to, security system can be with checking identity in this example Device is connected (do not show security system in figure), and the information that security system can be exported according to checking identification means is performed to be freezed The operation of account or non-Frozen Account.
Step 301 is specifically included in detail in this figure, and checking identification means receive suspicious account.
Suspicious account in this step can be sended over by security system, and the account is freezed by security system, be passed Whether it is to examine want genuine Frozen Account again to enter to verify identification means.
Account in the present embodiment include 12345678911, wherein, above 123456789 be user account, behind 11 be certification account certification mark, wherein, 1 expression the account (carried out by certificates such as identity cards by real-name authentication Cross certification), this flag bit is represented when being 0 did not carried out real-name authentication, and the 1 expression account below bound telephone number, This flag bit represents unbound telephone number when being 0, and telephone number in this example is phone number.Above-mentioned flag bit can With at last two of account, it is also possible in other positions, such as two before account.
Step 302, judges whether the account is certification account, if certification account then enters step 303, otherwise enters step Rapid 309.
The judgement of account is authenticated according to foregoing certification mark, if just entered when two flag bits are all 1 in the present embodiment Enter step 303, otherwise into step 309.
In other embodiments, possible only one of which flag bit, i.e., only included in account one whether bound phone number Flag bit, enters step 303, otherwise into step 309 if telephone number has been bound.
The identity of user cannot be determined due to non-authentication account, therefore checking identity also just becomes highly difficult, can by preliminary judgement Whether doubtful account is certification account, can filter substantial amounts of non-authentication account, so as to reduce the data processing amount of checking identification means.
Step 303, checking identification means obtain the accounts information of the suspicious account from account information database.
In the present embodiment, in accounts information at least include address name, binding phone number, type of credential, passport NO., Frequent location, can also include other accounts informations certainly, or even can also include Transaction Information, by embodiment below In provide example.
Step 304, checking identification means dial the binding phone number in accounts information by automated audio systems.
Automated audio systems in this step can carry out language according to the dialog context for prestoring with the binding phone number Sound communicates, and such as voice communication content is for " dear member XX, you are good, is here Alipay security centre, due to sending out in the recent period A suspicious transaction is given birth to, it is therefore desirable to verify whether the transaction has obtained your mandate, in please saying your accounts information Passport NO. ".
Step 305, receives the voice messaging that user is input into by mobile phone terminal.
In this step, the voice messaging of user input is the ID card No. 987654321 of the user, or can also include Other voice messagings, such as " my ID card No. is " etc..
Step 306, recognizes the passport NO. in the voice messaging.
In this step, the voice messaging of user potentially includes many contents, can be by useless voice by speech recognition system Information Filtration, only retains predetermined voice messaging, for example can be by " my ID card No. is " in above-mentioned voice messaging, " assorted Suspicious transaction" etc. content filter, only retain ID card No. 987654321, described speech recognition system can be base In the speech recognition system of semantics recognition, or the speech recognition system based on cloud computing, the speech recognition system can be with integrated In the checking identification means, it is also possible to realized by single server or server cluster, that is to say, that speech recognition Can be realized in identification means are verified, it is also possible to which the voice messaging of the user input that will be received by checking identification means is sent to Far-end speech identification server is identified, and the recognition result of speech recognition server is then received again.
In this step, if thinking that the suspicious transaction is to be authorized without user after voice message of the user according to above-mentioned steps 304 Transaction, input " Frozen Account ", the voice messaging such as " locking an account " are received by step 305 and for example " locked an account " Voice messaging after, identify in this step phonetic order or short message of user etc. other instruction, then into step 309, Make security system Frozen Account.
Step 307, the passport NO. that checking identification means will identify that is matched with the passport NO. in accounts information, if The match is successful then enters step 308, otherwise into step 309.
Step 308, the information that output passes through checking.
This can be transmitted to security system by the information verified, after security system receives the information by checking, can be with Releasing is freezed to the account.
Step 309, exports the information of authentication failed.
The information of the authentication failed can be transmitted to security system, after security system receives the information of the authentication failed, can be with Continue to keep freezing the account.
It is illustrated in figure 4 the system data flow graph of another checking user identity of the embodiment of the present application, the system architecture of the present embodiment It is similar to figure 3 above, verify that the detailed process and method of identity are otherwise varied with figure 3 above illustrated embodiment.
Step 401 is specifically included in detail in this figure, and checking identification means receive suspicious account.
Step 402, judges whether the account is certification account, if certification account then enters step 403, otherwise enters step Rapid 410.
Step 403, checking identification means obtain the credible telephone number of the suspicious account from account information database.
In this example, the credible telephone number is phone number, so that it is short that transmission can be received in follow-up verification process Information.
Step 404, checking identification means are sent to the credible phone number by the text information that short message system will be pre-established Code.
The text information for pre-establishing in the present embodiment can be similar with the voice communication content in embodiment illustrated in fig. 3, certainly Wherein it is used to verifying that passport NO. used can also to be other information, such as home address etc..
Step 405, receives the short message that user is input into by mobile phone terminal.
The passport NO. of user input is included in short message in this step, has been also possible that in the short message other Content, such as useless character, word of inquiry etc..
If user does not authorize any transaction, after the short message of above-mentioned steps 404 is received, the finger of Frozen Account is input into The instruction character for making the modes such as character, such as special character string " 000 " express.
Step 406, recognizes the passport NO. in the short message.
Can identify the passport NO. of user input by the system such as semantics recognition in this step, and by other unrelated redundancies Information Filtration.
In this step, if there is no passport NO. in the short message for receiving but the instruction character of Frozen Account, directly Into step 410, security system Frozen Account is notified.
Step 407, checking identification means obtain the passport NO. of the suspicious account from account information database.
In this step, according to checking information (being in this example passport NO.) predetermined in abovementioned steps 404, from account letter The corresponding information with the checking information, i.e. passport NO. are obtained in breath database, matching during for follow-up checking identity can Accurately to obtain accounts information as far as possible, rather than the accounts information for obtaining full dose, so as to ensure the information security of user.
Step 408, the passport NO. that checking identification means will identify that is matched with the passport NO. in accounts information, if The match is successful then enters step 409, otherwise into step 410.
Step 409, the information that output passes through checking.
This can be transmitted to security system by the information verified, after security system receives the information by checking, can be with Releasing is freezed to the account.
Step 410, exports the information of authentication failed.
The information of the authentication failed can be transmitted to security system, after security system receives the information of the authentication failed, can be with Continue to keep freezing the account.
By the method and device in above-mentioned the embodiment of the present application, verify user input personal information whether with database in account Family information is identical, can automatically contact user, and find that account is passive after being frozen without waiting for user contacts with user, due to Artificial participation is reduced, so as to improve the response speed of checking user, the experience of user is improved, and verify automatically Process reduces cost of human resources without the participation of contact staff.
Can clearly be distinguished for the improvement of a technology is improvement on hardware (for example, to diode, transistor, opening Close etc. circuit structure improvement) or software on improvement (for the improvement of method flow).However, with the development of technology, The improvement of current many method flows can be considered as directly improving for hardware circuit.Designer nearly all passes through will Improved method flow is programmed into hardware circuit to obtain corresponding hardware circuit.Therefore, it cannot be said that a method flow Improvement cannot be realized with hardware entities module.For example, PLD (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) is exactly such a collection Into circuit, its logic function is determined by user to device programming.Voluntarily programmed by designer a digital display circuit " collection Into " on a piece of PLD, without asking chip maker to design and make special IC chip 2.And, Nowadays, substitution manually makes IC chip, and this programming is also used instead " logic compiler (logic compiler) " mostly Software realizes that when it writes with program development software compiler used is similar, and source code before compiling is also Write with specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), And HDL is also not only a kind of, but there are many kinds, such as ABEL (Advanced Boolean Expression Language), AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、 MyHDL, PALASM, RHDL (Ruby Hardware Description Language) etc., most commonly use at present It is VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog2. Those skilled in the art also will be apparent to the skilled artisan that and only need to above-mentioned several hardware description languages slightly programming in logic and compile method flow Journey is in integrated circuit, it is possible to be readily available the hardware circuit for realizing the logical method flow.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processor and Storage can by the computer-readable medium of the computer readable program code (such as software or firmware) of (micro-) computing device, Gate, switch, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), FPGA The form of controller and embedded microcontroller, the example of controller includes but is not limited to following microcontroller:ARC 625D、Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, Memory Controller can also quilt It is embodied as a part for the control logic of memory.
It is also known in the art that in addition to realizing controller in pure computer readable program code mode, completely can be with Cause controller with gate, switch, application specific integrated circuit, FPGA control by the way that method and step is carried out into programming in logic Device processed realizes identical function with the form of embedded microcontroller etc..Therefore this controller is considered a kind of Hardware Subdivision Part, and the device for realizing various functions to including in it can also be considered as the structure in hardware component.Or even, can Not only can be the software module of implementation method but also can be knot in hardware component will be used to realizing that the device of various functions to be considered as Structure.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity, or Realized by the product with certain function.
For convenience of description, it is divided into various units with function during description apparatus above to describe respectively.Certainly, the application is being implemented When the function of each unit can be realized in same or multiple softwares and/or hardware.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can be by soft Part adds the mode of required general hardware platform to realize.Based on such understanding, the technical scheme of the application is substantially in other words The part contributed to prior art can be embodied in the form of software product, and the computer software product can be stored In storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are used to so that computer equipment (can be with It is personal computer, server, or network equipment etc.) perform some part institutes of each embodiment of the application or embodiment The method stated.
Each embodiment in this specification is described by the way of progressive, and identical similar part is mutual between each embodiment Referring to what each embodiment was stressed is the difference with other embodiment.Especially for system embodiment Speech, because it is substantially similar to embodiment of the method, so description is fairly simple, referring to the part of embodiment of the method in place of correlation Illustrate.
The application can be used in numerous general or special purpose computing system environments or configuration.For example:Personal computer, server Computer, handheld device or portable set, laptop device, multicomputer system, the system based on microprocessor, top set Box, programmable consumer-elcetronics devices, network PC, minicom, mainframe computer, including any of the above system or equipment DCE etc..
The application can be described in the general context of computer executable instructions, such as program module. Usually, program module include performing particular task or realize the routine of particular abstract data type, program, object, component, Data structure etc..The application can also be in a distributed computing environment put into practice, in these DCEs, by passing through Communication network and connected remote processing devices perform task.In a distributed computing environment, program module may be located at bag Storage device is included in interior local and remote computer-readable storage medium.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application have it is many deformation and change and Spirit herein is not departed from, it is desirable to which appended claim includes these deformations and changes without deviating from spirit herein.

Claims (11)

1. it is a kind of verify user identity method, it is characterised in that including,
Obtain the accounts information of suspicious account;
Communicated with the credible telephone number in the accounts information, and the userspersonal information of user's offer is provided;
Verify the userspersonal information whether with the accounts information in content matching, output is verified if matching Information, otherwise exports the information of authentication failed.
2. method according to claim 1, it is characterised in that the credible telephone number in the accounts information leads to Believe, and the userspersonal information of user's offer is provided and further include, by automated audio systems and the credible telephone number Voice communication is carried out, and the userspersonal information that the user provides is recognized by speech recognition system.
3. method according to claim 1, it is characterised in that the credible telephone number in the accounts information leads to Believe, and the userspersonal information of user's offer is provided and further include, by short message system to the authentic mobile number Code sends short message, and obtains the userspersonal information of user's return.
4. method according to claim 1, it is characterised in that the credible telephone number is to be tied up with the suspicious account Fixed telephone number.
5. method according to claim 1, it is characterised in that also include among the accounts information for obtaining suspicious account,
Judge whether the suspicious account is certification account;
If certification account, then corresponding accounts information is obtained;
Otherwise, the information of authentication failed is exported.
6. method according to claim 5, it is characterised in that judge whether the suspicious account is to enter in certification account Whether one step includes judge include certification mark in the suspicious account, is certification account if including the certification mark, Otherwise it is non-authentication account.
7. it is a kind of verify user identity device, it is characterised in that including,
Acquiring unit, the accounts information for obtaining suspicious account;
Communication unit, for being communicated with the credible telephone number in the accounts information, and obtains the individual subscriber letter of user's offer Breath;
Processing unit, for verify the userspersonal information whether with the accounts information in content matching, if matching if The information that output is verified, otherwise exports the information of authentication failed.
8. device according to claim 7, it is characterised in that the communication unit further includes, automatic speech mould Block and sound identification module, voice communication is carried out by automatic speech module with the credible telephone number, and by speech recognition Module recognizes the userspersonal information that the user provides.
9. device according to claim 7, it is characterised in that the communication unit further includes, short message module, Short message is sent to the authentic mobile number by the short message module, and obtains the individual subscriber letter of user's return Breath.
10. device according to claim 7, it is characterised in that the acquiring unit further includes, judge module, For judging whether the suspicious account is certification account, if certification account, then corresponding accounts information is obtained;Otherwise, Export the information of authentication failed.
11. devices according to claim 7, it is characterised in that the judge module determines whether the suspicious account In whether include certification mark, be otherwise non-authentication account if including being certification account if the certification mark.
CN201510983087.3A 2015-12-24 2015-12-24 One kind checking user identity method and device Pending CN106921495A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510983087.3A CN106921495A (en) 2015-12-24 2015-12-24 One kind checking user identity method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510983087.3A CN106921495A (en) 2015-12-24 2015-12-24 One kind checking user identity method and device

Publications (1)

Publication Number Publication Date
CN106921495A true CN106921495A (en) 2017-07-04

Family

ID=59457554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510983087.3A Pending CN106921495A (en) 2015-12-24 2015-12-24 One kind checking user identity method and device

Country Status (1)

Country Link
CN (1) CN106921495A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680602A (en) * 2017-08-24 2018-02-09 平安科技(深圳)有限公司 Voice fraud recognition methods, device, terminal device and storage medium
CN108765169A (en) * 2018-05-15 2018-11-06 中国平安人寿保险股份有限公司 Declaration form Risk Identification Method, device, computer equipment and storage medium
CN110572368A (en) * 2019-08-13 2019-12-13 平安科技(深圳)有限公司 Domain account unlocking method and system based on telephone channel and readable storage medium
CN112990051A (en) * 2021-03-26 2021-06-18 国网河北省电力有限公司信息通信分公司 Auxiliary authentication method and device, electronic equipment and storage medium
CN116436655A (en) * 2021-02-02 2023-07-14 支付宝(杭州)信息技术有限公司 An account authentication method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345788A (en) * 2007-07-11 2009-01-14 游艺春秋网络科技(北京)有限公司 Identity affirmation method and system through telephone call-back
CN101523427A (en) * 2006-09-29 2009-09-02 丹·斯卡梅尔 System and method for verifying user's identity in electronic transactions
CN101615274A (en) * 2008-06-25 2009-12-30 阿里巴巴集团控股有限公司 Utilize the method and system of communication terminal to pay
CN101853342A (en) * 2009-03-30 2010-10-06 宋煜燊 The anti identity theft and the payment network of protection privacy
CN103778536A (en) * 2014-02-25 2014-05-07 上海农村商业银行股份有限公司 Implementation method and implementation system for transfer transaction
CN104270354A (en) * 2014-09-17 2015-01-07 宁波掌聘企业管理咨询有限公司 User account security verification method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101523427A (en) * 2006-09-29 2009-09-02 丹·斯卡梅尔 System and method for verifying user's identity in electronic transactions
CN101345788A (en) * 2007-07-11 2009-01-14 游艺春秋网络科技(北京)有限公司 Identity affirmation method and system through telephone call-back
CN101615274A (en) * 2008-06-25 2009-12-30 阿里巴巴集团控股有限公司 Utilize the method and system of communication terminal to pay
CN101853342A (en) * 2009-03-30 2010-10-06 宋煜燊 The anti identity theft and the payment network of protection privacy
CN103778536A (en) * 2014-02-25 2014-05-07 上海农村商业银行股份有限公司 Implementation method and implementation system for transfer transaction
CN104270354A (en) * 2014-09-17 2015-01-07 宁波掌聘企业管理咨询有限公司 User account security verification method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680602A (en) * 2017-08-24 2018-02-09 平安科技(深圳)有限公司 Voice fraud recognition methods, device, terminal device and storage medium
CN108765169A (en) * 2018-05-15 2018-11-06 中国平安人寿保险股份有限公司 Declaration form Risk Identification Method, device, computer equipment and storage medium
CN108765169B (en) * 2018-05-15 2023-04-25 中国平安人寿保险股份有限公司 Policy risk identification method, device, computer equipment and storage medium
CN110572368A (en) * 2019-08-13 2019-12-13 平安科技(深圳)有限公司 Domain account unlocking method and system based on telephone channel and readable storage medium
CN110572368B (en) * 2019-08-13 2022-07-19 平安科技(深圳)有限公司 Domain account unlocking method and system based on telephone channel and readable storage medium
CN116436655A (en) * 2021-02-02 2023-07-14 支付宝(杭州)信息技术有限公司 An account authentication method, device, equipment and medium
CN112990051A (en) * 2021-03-26 2021-06-18 国网河北省电力有限公司信息通信分公司 Auxiliary authentication method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US11392935B2 (en) Automatic activation of a physical payment card
CN109087106B (en) Risk control model training, risk control method, device and equipment for identifying the theft of secondary account numbers
KR101300426B1 (en) Methods and systems for real time language translation using social networking
CN106921495A (en) One kind checking user identity method and device
CN114491430B (en) Business processing method, device and equipment based on block chain
US20090234764A1 (en) Systems and methods for biometric authentication of monetary fund transfer
EP3270550A1 (en) Method and corresponding device for starting service through voice in communication software
US20160275486A1 (en) Device, system, and method for creating virtual credit card
US11113684B2 (en) Device, system, and method for creating virtual credit card
US20110213706A1 (en) Systems and methods for transactions on the telecom web
EP4176395B1 (en) Electronic system and method for enabling payment of a good or service by means of voice commands
CN108510290A (en) Customer information amending method, device, computer equipment and storage medium in call
CN108074024A (en) Risk Identification Method, apparatus and system
CN108282471A (en) A transmission method, device and equipment for an electronic certificate
CN106056377A (en) Data processing method and smartwatch
CN109617860A (en) The real name identification method and device of account
CN104393995B (en) A kind of intelligent terminal and identity identifying method
CN109299948A (en) Red packet sending method and device, wearable device and storage medium
CN120087964A (en) Identity-free verification method, device, medium and equipment in weak network environment
CN110309124B (en) Data management method and system
CN102662496A (en) Multifunctional mouse and method for controlling same
CN110415100A (en) A kind of intelligent data appraisal procedure, mobile terminal and computer readable storage medium
US20250037113A1 (en) Method, Wallet Application Terminal, and System for Opening Digital Wallet
CN110493205A (en) A kind of subway data processing method and device
US20250348881A1 (en) eSIM Enabled Unique Card as a Device for FI Agnostic Transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201013

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201013

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: Greater Cayman, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170704