Identity authentication method, equipment and medium based on intelligent receipt machine

文档序号:190852 发布日期:2021-11-02 浏览:19次 中文

阅读说明:本技术 一种基于智能回单机的身份认证方法、设备及介质 (Identity authentication method, equipment and medium based on intelligent receipt machine ) 是由 肖玉冰 高春晓 于 2021-08-04 设计创作,主要内容包括:本申请公开了一种基于智能回单机的身份认证方法、设备及介质,方法包括:接收服务请求,并根据所述服务请求发送登录二维码至对应的智能回单机,以通过所述智能回单机展示所述登录二维码;接收由登录终端通过扫描所述登录二维码发送的验证信息,并对所述验证信息进行验证,以确定所述登录终端为合法状态;将所述登录二维码与所述验证信息进行绑定,生成确认登录请求,并将所述确认登录请求发送至所述登录终端;接收由所述登录终端,根据所述确认登录请求生成并发送的确认登录指令,并根据所述确认登录指令确定所述登录终端登录成功。免除了实体卡的介质,方便了用户的使用,提升了用户的使用体验,同时也进一步保护了用户的密码安全。(The application discloses an identity authentication method, equipment and a medium based on an intelligent receipt machine, wherein the method comprises the following steps: receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine; receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state; binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal; and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction. The method avoids media of the entity card, facilitates use of the user, improves use experience of the user, and further protects password security of the user.)

1. An identity authentication method based on an intelligent receipt machine is characterized by comprising the following steps:

receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine;

receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state;

binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal;

and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

2. The identity authentication method based on the intelligent receipt machine as claimed in claim 1, wherein receiving verification information sent by a login terminal by scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state specifically comprises:

receiving verification information sent by a login terminal through scanning the login two-dimensional code, wherein the verification information at least comprises: identity information, equipment information and a login two-dimensional code number;

inquiring a database according to the identity information and the login two-dimensional code number, and determining that the database has the same information with the identity information and the login two-dimensional code number;

inquiring whether the login terminal is a common login device or not according to the device information;

if so, determining that the login terminal is in a legal state;

if not, sending a verification link short message to the mobile phone number bound with the identity information, and determining that the login terminal is in a legal state according to the verification link.

3. The identity authentication method based on the intelligent receipt machine, according to claim 2, is characterized in that the login two-dimensional code is bound with the verification information to generate a login confirmation request, and the login confirmation request is sent to the login terminal, and specifically comprises:

binding the login two-dimensional code number with the identity information to limit a jump channel of the login two-dimensional code to be: only allowing the login terminal corresponding to the identity information to pass through;

generating a login confirmation request, and determining a communication path with the login terminal according to the equipment information;

and sending the login confirmation request to the login terminal according to the communication path.

4. The identity authentication method based on the intelligent receipt machine as claimed in claim 1, wherein after receiving a service request and sending a login two-dimensional code to the corresponding intelligent receipt machine according to the service request, the method further comprises:

determining that the login two-dimensional code is in a first state, and opening a jump channel of the login two-dimensional code according to the first state;

receiving authentication information sent by a login terminal through scanning the login two-dimensional code, and authenticating the authentication information to determine that the login terminal is in a legal state, wherein the method further comprises the following steps:

updating the login two-dimensional code to be in a second state, and limiting a jump channel of the login two-dimensional code to be in a range of: only allowing the login terminal corresponding to the verification information to pass;

receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and after the login success of the login terminal is determined according to the login confirmation instruction, the method further comprises the following steps:

and updating the login two-dimensional code to be in a third state, and closing a jump channel of the login two-dimensional code according to the third state.

5. The identity authentication method based on the intelligent receipt machine as claimed in claim 1, wherein before the login two-dimensional code is bound with the verification information to generate a login confirmation request and the login confirmation request is sent to the login terminal, the method further comprises:

determining whether a login account corresponding to the login terminal is an enterprise account;

if so, sending a first verification instruction to the login terminal so that the login terminal collects account information according to the first verification instruction;

receiving the account information, and determining that the account information exists in pre-stored pre-signing information;

sending a second verification instruction to the login terminal so that the login terminal collects an account password according to the second verification instruction;

and receiving the account password and determining that the account password is verified.

6. The identity authentication method based on the intelligent receipt machine as claimed in claim 1, wherein after receiving the login confirmation instruction generated and sent by the login terminal according to the login confirmation request, and determining that the login terminal successfully logs in according to the login confirmation instruction, the method further comprises:

receiving the card number sent by the login terminal, and inquiring a receipt corresponding to the card number;

and sending the receipt to the intelligent receipt machine so as to display the receipt through the intelligent receipt machine.

7. The identity authentication method based on the intelligent receipt according to claim 6, wherein after receiving the card number sent by the login terminal and inquiring the receipt corresponding to the card number, the method further comprises:

acquiring historical services corresponding to the card number, and selecting a plurality of services in the historical services according to a pre-stored selection rule;

and acquiring the receipt corresponding to the plurality of services, and setting the receipt at the top for preferential display.

8. The identity authentication method based on the intelligent receipt machine as claimed in claim 6, wherein after the receipt is sent to the intelligent receipt machine so as to be displayed by the intelligent receipt machine, the method further comprises:

determining the printed receipt through the intelligent receipt; determining the support service of the printed receipt;

acquiring the professional identity of a user corresponding to the login terminal by querying a database, and determining the business which cannot be executed in the support business according to the professional identity;

and generating prompt information according to the business which cannot be executed, and sending the prompt information to the intelligent receipt machine so as to display the prompt information through the intelligent receipt machine.

9. The utility model provides an identity authentication equipment based on intelligence receipt machine which characterized in that includes:

at least one processor; and the number of the first and second groups,

a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,

the memory stores instructions executable by the at least one processor to cause the at least one processor to perform instructions for:

receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine;

receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state;

binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal;

and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

10. A non-transitory computer storage medium for identity authentication based on an intelligent form-factor issuer, the computer storage medium storing computer-executable instructions configured to:

receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine;

receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state;

binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal;

and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

Technical Field

The application relates to the technical field of intelligent authentication, in particular to an identity authentication method, identity authentication equipment and identity authentication media based on an intelligent receipt machine.

Background

The intelligent receipt machine is self-service equipment which is arranged in a related business place of an intranet point in the jurisdiction by a bank and provides functions of business receipt, transaction detail, electronic tax payment voucher printing, account checking reminding and the like for clients.

The traditional intelligent receipt machine authenticates the identity of a client by reading an entity card and inputting a password in an authentication mode, thereby providing related services. However, the physical card has the problem of inconvenient carrying, and the input password has the risk of password leakage. Therefore, it is an urgent need to provide an identity authentication method that can avoid the physical medium.

Disclosure of Invention

In order to solve the above problems, that is, to solve the problems that the entity card is inconvenient to carry and the password is easy to leak due to the fact that the identity authentication is performed through the entity card and the password input mode in the intelligent receipt machine, the present application provides an identity authentication method, device and medium based on the intelligent receipt machine, including:

in a first aspect, the present application provides an identity authentication method based on an intelligent receipt machine, including: receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine; receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state; binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal; and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

In one example, receiving authentication information sent by a login terminal by scanning the login two-dimensional code, and authenticating the authentication information to determine that the login terminal is in a legal state specifically includes: receiving verification information sent by a login terminal through scanning the login two-dimensional code, wherein the verification information at least comprises: identity information, equipment information and a login two-dimensional code number; inquiring a database according to the identity information and the login two-dimensional code number, and determining that the database has the same information with the identity information and the login two-dimensional code number; inquiring whether the login terminal is a common login device or not according to the device information; if so, determining that the login terminal is in a legal state; if not, sending a verification link short message to the mobile phone number bound with the identity information, and determining that the login terminal is in a legal state according to the verification link.

In one example, the binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal specifically includes: binding the login two-dimensional code number with the identity information to limit a jump channel of the login two-dimensional code to be: only allowing the login terminal corresponding to the identity information to pass through; generating a login confirmation request, and determining a communication path with the login terminal according to the equipment information; and sending the login confirmation request to the login terminal according to the communication path.

In one example, after receiving a service request and sending a login two-dimensional code to a corresponding intelligent receipt according to the service request, the method further includes: determining that the login two-dimensional code is in a first state, and opening a jump channel of the login two-dimensional code according to the first state; receiving authentication information sent by a login terminal through scanning the login two-dimensional code, and authenticating the authentication information to determine that the login terminal is in a legal state, wherein the method further comprises the following steps: updating the login two-dimensional code to be in a second state, and limiting a jump channel of the login two-dimensional code to be in a range of: only allowing the login terminal corresponding to the verification information to pass; receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and after the login success of the login terminal is determined according to the login confirmation instruction, the method further comprises the following steps: and updating the login two-dimensional code to be in a third state, and closing a jump channel of the login two-dimensional code according to the third state.

In one example, before binding the login two-dimensional code with the verification information, generating a login confirmation request, and sending the login confirmation request to the login terminal, the method further includes: determining whether a login account corresponding to the login terminal is an enterprise account; if so, sending a first verification instruction to the login terminal so that the login terminal collects account information according to the first verification instruction; receiving the account information, and determining that the account information exists in pre-stored pre-signing information; sending a second verification instruction to the login terminal so that the login terminal collects an account password according to the second verification instruction; and receiving the account password and determining that the account password is verified.

In one example, after receiving a login confirmation instruction generated and sent by the login terminal according to the login confirmation request, and determining that the login terminal successfully logs in according to the login confirmation instruction, the method further includes: receiving the card number sent by the login terminal, and inquiring a receipt corresponding to the card number; and sending the receipt to the intelligent receipt machine so as to display the receipt through the intelligent receipt machine.

In one example, after receiving the card number sent by the login terminal and inquiring the receipt corresponding to the card number, the method further includes: acquiring historical services corresponding to the card number, and selecting a plurality of services in the historical services according to a pre-stored selection rule; and acquiring the receipt corresponding to the plurality of services, and setting the receipt at the top for preferential display.

In one example, after sending the receipt to the intelligent receipt machine to display the receipt through the intelligent receipt machine, the method further comprises: determining the printed receipt through the intelligent receipt; determining the support service of the printed receipt; acquiring the professional identity of a user corresponding to the login terminal by querying a database, and determining the business which cannot be executed in the support business according to the professional identity; and generating prompt information according to the business which cannot be executed, and sending the prompt information to the intelligent receipt machine so as to display the prompt information through the intelligent receipt machine.

On the other hand, this application has proposed an identity authentication equipment based on intelligence receipt machine, includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to: receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine; receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state; binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal; and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

In another aspect, the present application provides a non-volatile computer storage medium for identity authentication based on an intelligent receipt machine, in which computer-executable instructions are stored, and the computer-executable instructions are configured to: receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine; receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state; binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal; and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

The identity authentication method, the identity authentication equipment and the identity authentication medium based on the intelligent receipt machine can bring the following beneficial effects: the user can authorize the intelligent receipt machine to log in the account through the login terminal, and then prints the receipt, so that the medium of an entity card is avoided, the use of the user is facilitated, the use experience of the user is improved, and the password security of the user is further protected. In addition, a series of protection measures are designed aiming at the authorized login process of the login terminal, so that the account security and the personal information security of the user are protected, the leakage of sensitive information is avoided, and the use security of the intelligent receipt machine is improved.

Drawings

The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:

fig. 1 is a schematic flowchart of an identity authentication method based on an intelligent receipt machine in an embodiment of the present application;

fig. 2 is a schematic diagram of an identity authentication device based on an intelligent receipt machine in an embodiment of the present application.

Detailed Description

In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.

As shown in fig. 1, an identity authentication method based on an intelligent receipt machine provided in an embodiment of the present application includes:

s101: and receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt according to the service request so as to display the login two-dimensional code through the intelligent receipt.

It should be noted that, in the conventional intelligent receipt machine, the identity of the client is authenticated by reading the entity card and inputting the password, so as to provide the related services. However, the entity card is inconvenient to carry, and the password input risk is leaked, so that the identity authentication method for the intelligent receipt machine and capable of avoiding the entity medium is provided for solving the problem. The intelligent receipt machine, the login terminal and the server are arranged in the embodiment of the application and are matched with each other to solve the problems.

Specifically, the display screen is arranged on the intelligent receipt machine, and when a user has a requirement for printing the receipt, the user can select a service for printing the receipt on the intelligent receipt machine by touching the display screen or pressing a separately arranged key or the like. The intelligent receipt machine generates a service request based on the trigger, and the intelligent receipt machine can send the service request to the server according to the communication connection established with the server in advance.

Further, the server receives the service request and generates a login two-dimensional code according to the service request, it should be noted that the login two-dimensional code does not have a display function, and the login two-dimensional code exists in a form of a number.

Furthermore, based on the service request carrying information such as the device website number and the device number of the intelligent receipt machine, the server can send the login two-dimensional code to the corresponding intelligent receipt machine. The intelligent receipt machine can display the login two-dimensional code on a screen so as to provide the two-dimensional code for logging in the bank account user for the user who selects the printing receipt service.

S102: and receiving verification information sent by the login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state.

Specifically, the user can scan the login two-dimensional code in the intelligent receipt screen through the login terminal. It should be noted that the login terminal is provided with a lens and other related components to implement a scanning function, and the login terminal is provided with a related login system in its inside, and the login system is used to log in a bank account of a user.

Furthermore, the user scans the login two-dimensional code through a login system in the login terminal, the login terminal can acquire verification information according to the relevant settings in the login two-dimensional code, and the verification information is sent to the server according to the skip channel of the login two-dimensional code. It should be noted that, the login system needs to store the authentication information in advance, and based on an encryption algorithm between the server and the login terminal, the login terminal can determine the authenticity and security of the login two-dimensional code according to the key when scanning the login two-dimensional code.

Further, the server receives authentication information sent by the login terminal through scanning the login two-dimensional code, wherein the authentication information at least comprises: identity information, equipment information and a login two-dimensional code number. The identity information is recorded in a bank account of the user and can prove the related information of the user identity, the equipment information is recorded with a specific communication address and an equipment number of the login terminal, and the login two-dimensional code number is recorded with a number corresponding to a login two-dimensional code scanned by the login terminal.

And the server inquires the database according to the received identity information and the login two-dimensional code number, and determines the information which exists in the database and has the same identity information and login two-dimensional code number. Through the steps, the server can determine the bank account of the user according to the identity information and determine which intelligent receipt machine is used by the user according to the login two-dimensional code number.

Further, the server may query the database according to the device information to determine whether the login terminal is a common login device corresponding to the bank account. If the login terminal is determined to be the common login device, the login terminal is determined to be in a legal state, if the login terminal is determined not to be the common login device, a verification link short message is sent to the mobile phone number bound with the identity information, the short message comprises a verification link, a user can determine that the login terminal is safe by clicking the verification link, namely, the server can determine that the login terminal is in the legal state according to the verification link.

S103: and binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal.

Specifically, after the server determines that the login terminal is in a legal state, the login two-dimensional code and the verification information can be bound, and based on the fact that the verification information contains the identity information and the login two-dimensional code number, the server can bind the login two-dimensional code number and the identity information, the login two-dimensional code at the moment is bound to certain specific identity information, and if other login terminals scan the login two-dimensional code again, the steps in the above text cannot be executed according to the login two-dimensional code.

Through binding, the skip channel for logging in the two-dimensional code can be limited as follows: only the login terminal corresponding to the identity information is allowed to pass through, namely, only the bound login terminal can establish communication connection with the server through the login two-dimensional code, so that the safety is improved, and malicious scanning of other users is prevented.

Further, the server generates a login confirmation request, determines a communication path with the login terminal according to the equipment information of the login terminal, and sends the login confirmation request to the corresponding login terminal according to the communication path.

Further, the login terminal receives a login confirmation request, the login confirmation request can be displayed in a display screen of the login terminal, confirmation and rejection options are provided, and a user can confirm that a corresponding bank account in the login terminal is authorized to a corresponding intelligent receipt and the server by clicking the confirmation.

S104: and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

Specifically, the server receives the login confirmation instruction, confirms that the login of the login terminal is successful according to the login confirmation instruction, and further authorizes the corresponding intelligent receipt machine.

Furthermore, when the user logs in the terminal, the display interface of the login system changes, and all the bank card patterns and card numbers under the bank account can be displayed. Meanwhile, because the intelligent receipt machine is authorized, the display interface of the login system can be synchronously projected into the intelligent receipt machine.

The user can select the card number under the bank account through the login terminal or the intelligent receipt machine so as to determine the account number needing receipt printing. After selection, the card number can be sent to the server through a communication channel between the login terminal and the server.

Further, the server receives the card number and inquires all the receipt corresponding to the card number. After the inquiry is finished, the server can send the receipt back to the intelligent receipt back machine so as to display the receipt back through the intelligent receipt back machine.

Furthermore, the user can select the receipt to be printed to click and print according to the displayed receipt in the intelligent receipt machine, and the intelligent receipt machine can print the selected receipt.

In addition, the intelligent receipt and the login system in the login terminal can be provided with a return key, and a user can reselect the card number or reselect the receipt by clicking the return key.

In one embodiment, after the server receives the card number sent by the login terminal and inquires the receipt corresponding to the card number, the server can also obtain the historical service corresponding to the card number and select a plurality of services in the historical service according to the pre-stored selection rule. For example, the latest service and the service whose amount is larger than the preset threshold value are selected from the historical services. In addition, the selection rule may be flexibly set or changed according to the actual situation, and the specific selection manner is not specifically limited herein.

Furthermore, the receipt corresponding to the selected multiple services is obtained, and the receipt is set to the top through the intelligent receipt for preferential display.

Through the setting mode, several receipt most likely to be printed by the user can be selected, the user can conveniently and quickly select the receipt, the time of the user is saved, and the efficiency of printing the receipt is improved.

In one embodiment, after the receipt is sent to the intelligent receipt machine, so that the receipt is displayed through the intelligent receipt machine, the server can also determine the printed receipt through the intelligent receipt machine and determine the supporting service of the printed receipt according to the printed receipt query of the user.

Further, the server acquires the professional identity of the user corresponding to the login terminal by querying the database, that is, the professional identity can be determined by the personal information reserved by the user in advance, and the service which cannot be executed in the support service is determined according to the professional identity.

And further, generating prompt information according to the business which cannot be executed, and sending the prompt information to the intelligent receipt machine so as to display the prompt information through the intelligent receipt machine.

By the method, effective prompt for the user can be realized, the situation that the user cannot apply for certain bank programs when printing the receipt is avoided, and time of the user and bank staff is saved.

In one embodiment, based on the steps described above, a receipt is printed for an individual user, however, in practical cases, there are also cases where a receipt is printed for an enterprise account, and based on the particularity of the enterprise account, the present application particularly designs an authentication method dedicated to the enterprise account.

When the enterprise account is used, the previous steps are the same as those of the personal account, and before the service binds the login two-dimensional code with the verification information to generate a login confirmation request and sends the login confirmation request to the login terminal, the server needs to verify whether the account corresponding to the login terminal is the enterprise account.

If the verification is yes, a first verification instruction is sent to the login terminal, so that the login terminal collects account information according to the first verification instruction. Specifically, the login terminal can show a plurality of input boxes in the display screen according to a first verification instruction, the input boxes can be provided with prompt information for prompting account information needing to be input in the input boxes, and the account information at least comprises: and printing information such as the name, the identification card number, the mobile phone number and the like.

Further, the server receives the account information and determines that the account information exists in the pre-stored pre-subscription information. Specifically, each enterprise account may specify several receipt printers, which need to pre-sign with the system corresponding to the server and input their related account information. Only the pre-signed user has qualified login.

Further, the server sends a second verification instruction to the login terminal, so that the login terminal collects the account password according to the second verification instruction. Specifically, the login terminal displays an input box on the display screen according to the second verification instruction, wherein the input box is used for enabling the user to input an account password of the enterprise account.

Further, the server receives the account password and verifies whether the account password can be verified. If the server determines that the account password is verified, the subsequent steps are the same as those of the personal account, and redundant description is omitted here.

In one embodiment, after the server receives the service request and sends the login two-dimensional code to the corresponding intelligent receipt machine according to the service request, the server can also determine that the login two-dimensional code is in a first state, the first state is a state to be scanned, and the login two-dimensional code in the state is set to be the highest in authority. Namely, the server can open a jump channel for logging in the two-dimensional code according to the first state, namely, any login terminal can jump to a communication channel with the server by scanning and logging in the two-dimensional code.

The server receives verification information sent by the login terminal through scanning the login two-dimensional code, verifies the verification information, and can update the login two-dimensional code to be in a second state after the login terminal is determined to be in a legal state, the second state is a state to be confirmed after scanning, the login two-dimensional code at the moment is scanned by a certain login terminal, and the server can limit a jump channel of the login two-dimensional code to only allow the login terminal corresponding to the verification information to pass through according to the second state, namely, only the login terminal corresponding to the verification information can be connected with the server through the two-dimensional code.

The server receives a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and after the login success of the login terminal is confirmed according to the login confirmation instruction, the login two-dimensional code can be updated to be in a third state, the third state is the login success state, the login terminal authorizes the intelligent receipt machine to log in the bank account, and the server can close a jump channel for logging in the two-dimensional code according to the third state. That is, in this case, the login two-dimensional code is invalidated, and any login terminal cannot establish a connection with the server by scanning the login two-dimensional code any more.

By the setting mode, the safety of the bank account of the user is protected to the greatest extent, and the condition that the user receipt information is leaked due to malicious scanning of the login two-dimensional code is avoided.

In one embodiment, as shown in fig. 2, the present application further provides an identity authentication device based on an intelligent receipt machine, including:

at least one processor; and the number of the first and second groups,

a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,

the memory stores instructions executable by the at least one processor to cause the at least one processor to perform instructions for:

receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine;

receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state;

binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal;

and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

In one embodiment, the present application further provides a non-volatile computer storage medium for identity authentication based on an intelligent receipt machine, storing computer-executable instructions configured to:

receiving a service request, and sending a login two-dimensional code to a corresponding intelligent receipt machine according to the service request so as to display the login two-dimensional code through the intelligent receipt machine;

receiving verification information sent by a login terminal through scanning the login two-dimensional code, and verifying the verification information to determine that the login terminal is in a legal state;

binding the login two-dimensional code with the verification information to generate a login confirmation request, and sending the login confirmation request to the login terminal;

and receiving a login confirmation instruction which is generated and sent by the login terminal according to the login confirmation request, and determining that the login of the login terminal is successful according to the login confirmation instruction.

The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.

The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.

As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.

The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.

Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.

It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

14页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:数字身份管理方法、平台、装置、电子设备和存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类