CN112566098A - Identification information verification method and server - Google Patents
Identification information verification method and server Download PDFInfo
- Publication number
- CN112566098A CN112566098A CN202011374204.3A CN202011374204A CN112566098A CN 112566098 A CN112566098 A CN 112566098A CN 202011374204 A CN202011374204 A CN 202011374204A CN 112566098 A CN112566098 A CN 112566098A
- Authority
- CN
- China
- Prior art keywords
- verified
- information
- stolen
- risk index
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 118
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000012545 processing Methods 0.000 claims abstract description 69
- 238000004891 communication Methods 0.000 claims abstract description 37
- 238000004364 calculation method Methods 0.000 claims description 27
- 230000006870 function Effects 0.000 description 45
- 238000010586 diagram Methods 0.000 description 8
- 238000012546 transfer Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000001603 reducing effect Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Databases & Information Systems (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Computational Linguistics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Educational Administration (AREA)
- Technology Law (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses a verification method and a server for identification information. The method comprises the following steps: acquiring verification information sent by a plurality of processing nodes; determining a stealing risk index of the number to be verified which is stolen according to the verification information, wherein the number to be verified is a number used for identifying different terminal information; determining whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold; under the condition that the number to be verified is stolen, generating a stolen identifier; and generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified so that each processing node limits the communication function corresponding to the number to be verified. The user property loss caused by the leakage of the identity information of the user is avoided, the safety of the user information and property is guaranteed, and the user experience degree is improved.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a server for verifying identification information.
Background
At present, an intelligent terminal (e.g., a smart phone, etc.) used by a user mostly has a network payment function, and the user also binds own identity information with the intelligent terminal to verify identity verification under the condition of network payment.
However, if the smart phone of the user is stolen or lost, and the business hall of the telecom operator is just in an off-business state (for example, the business hall goes off duty), the user cannot supplement the card in time; although the mobile phone number can be subjected to loss reporting processing in a calling mode, a third party can still perform the loss reporting processing on the mobile phone number in a calling mode, so that the mobile phone number of the user is still in a stolen state, criminals can perform criminal activities all night, for example, identity information of the stolen user is obtained through the mobile phone number, and identity information of the user is leaked; or the commodity is purchased through the network payment function of the mobile phone, so that the property loss of the stolen user is caused.
Disclosure of Invention
Therefore, the application provides a verification method and a server of identification information, and the problem how to ensure the safety of user information and property under the condition that the number to be verified is stolen is solved.
In order to achieve the above object, a first aspect of the present application provides a method for verifying identification information, the method including: acquiring verification information sent by a plurality of processing nodes; determining a stealing risk index of the number to be verified which is stolen according to the verification information, wherein the number to be verified is a number used for identifying different terminal information; determining whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold; under the condition that the number to be verified is stolen, generating a stolen identifier; and generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified so that each processing node limits the communication function corresponding to the number to be verified.
In some implementations, the validation information includes: any one or more of loss report information, hang-off information, call record and short message record of the number to be verified.
In some implementations, determining a theft risk index for the number to be verified to be stolen according to the verification information includes: determining a theft risk index according to the first risk index and/or the second risk index; the first risk index is an index determined according to loss reporting information and loss releasing information, the second risk index is an index determined according to a call record and a short message record, and the short message record comprises bank verification information and/or network loan verification information.
In some specific implementations, the loss reporting information includes first location information of the number to be verified before the loss reporting operation is performed and/or an identifier of the loss reporting terminal; the hang-off information comprises any one or more of hang-off time, second position information of the number to be verified after hang-off operation and identification of the hang-off terminal.
In some implementations, the manner in which the first risk index is determined includes: determining a first risk index according to any one or more of the first calculation result, the second calculation result and the third calculation result; the first calculation result is calculated according to the initial risk index, the hang-up time and a preset time threshold; the second calculation result is a result determined based on the first position information and the second position information; the third calculation result is a result determined according to the identity of the loss reporting terminal and the identity of the unlinking terminal.
In some specific implementations, after generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified, the method further includes: inquiring emergency contact information corresponding to the number to be verified according to the number to be verified; and verifying the number to be verified according to the emergency contact information.
In some specific implementations, after generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified, the method further includes: and responding to a verification request sent by the mobile terminal corresponding to the number to be verified, and verifying the identity of the user of the mobile terminal.
In some implementations, the processing node includes an operator network customer service node and/or an operator short message center node.
In order to achieve the above object, a second aspect of the present application provides a method for verifying identification information, the method comprising: acquiring a number to be verified, wherein the number to be verified is a number used for identifying different terminal information; inquiring a database according to the number to be verified to obtain verification information; sending verification information to the number safety guarantee system node so that the number safety guarantee system node determines the embezzlement risk index of the number to be verified which is embezzled according to the verification information; acquiring alarm information sent by a number security assurance system node, wherein the alarm information comprises a stolen identifier and a number to be verified; and limiting the communication function corresponding to the number to be verified according to the stolen identifier.
In some implementations, the communication function includes any one or more of an internet access function, a call function, and a short message verification function.
In order to achieve the above object, a third aspect of the present application provides a number security system node server, including: the first acquisition module is used for acquiring the verification information sent by the plurality of processing nodes; the risk index calculation module is used for determining the stealing risk index of the number to be verified which is stolen according to the verification information, wherein the number to be verified is a number used for identifying different terminal information; the judging module is used for determining whether the number to be verified is stolen according to the stealing risk index and a preset risk index threshold; the generation module is used for generating a stolen identifier under the condition that the number to be verified is determined to be stolen; and the first processing module is used for generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified so that each processing node limits the communication function corresponding to the number to be verified.
In order to achieve the above object, a third aspect of the present application provides a processing node server, comprising: the second acquisition module is used for acquiring a number to be verified, wherein the number to be verified is a number used for identifying different terminal information; the query module is used for querying the database according to the number to be verified to obtain verification information; the sending module is used for sending verification information to the number safety guarantee system node so that the number safety guarantee system node can determine the embezzlement risk index of the number to be verified which is embezzled according to the verification information; the third acquisition module is used for acquiring alarm information sent by the number security assurance system node, wherein the alarm information comprises an stolen identifier and a number to be verified; and the second processing module is used for limiting the communication function corresponding to the number to be verified according to the stolen identifier.
According to the verification method and the server for the identification information, the number to be verified can be comprehensively verified by acquiring the verification information sent by the plurality of processing nodes; determining a stealing risk index of the number to be verified which is stolen according to the verification information, judging whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold, generating a stolen identifier under the condition that the number to be verified is determined to be stolen, representing the condition that the number to be verified is stolen through the stolen identifier, processing the number to be verified in time, and avoiding the number to be verified being occupied by other people; according to the stolen identifier and the number to be verified, an alarm message is generated and sent to each processing node, so that each processing node limits the communication function corresponding to the number to be verified, the user property loss caused by the leakage of the identity information of the user is avoided, the safety of the user information and property is guaranteed, and the user experience degree is improved.
Drawings
The accompanying drawings are included to provide a further understanding of the embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application. The above and other features and advantages will become more apparent to those skilled in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 is a flowchart illustrating a verification method for identification information in an embodiment of the present application.
Fig. 2 is a flowchart illustrating a method for verifying identification information according to another embodiment of the present application.
Fig. 3 is a flowchart illustrating a method for verifying identification information according to still another embodiment of the present application.
Fig. 4 shows a block diagram of a node server of the number security system in the embodiment of the present application.
Fig. 5 is a block diagram showing components of a processing node server in the embodiment of the present application.
Fig. 6 is a block diagram showing components of a system for verifying identification information in the embodiment of the present application.
Fig. 7 is a schematic workflow diagram showing a verification system of identification information in the embodiment of the present application.
In the drawings:
401: the first obtaining module 402: risk index calculation module
403: the judging module 404: generation module
405: the first processing module 501: second acquisition module
502: the query module 503: transmission module
504: the third obtaining module 505: second processing module
610: number security node server 620: loss reporting terminal
630: the off-hook terminal 640: operator short message center node server
650: operator network customer service node server
Detailed Description
The following detailed description of embodiments of the present application will be made with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present application, are given by way of illustration and explanation only, and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a verification method for identification information in an embodiment of the present application. The method for verifying the identification information can be applied to a node server of a number security assurance system, and as shown in fig. 1, the method for verifying the identification information comprises the following steps:
step S101, acquiring the verification information sent by a plurality of processing nodes.
Wherein the verification information includes: any one or more of loss report information, hang-off information, call record and short message record of the number to be verified. The number to be verified is a mobile phone number used by the user or an identifier of the communication equipment issued by the wireless network operator and bound with the identity information of the user.
In some specific implementations, the loss reporting information includes first location information of the number to be verified before the loss reporting operation is performed and/or an identifier of the loss reporting terminal; the hang-off information comprises any one or more of hang-off time, second position information of the number to be verified after hang-off operation and identification of the hang-off terminal. The loss reporting information and the hang-up information are only examples, and may be specifically set according to actual situations, and other non-described loss reporting information and hang-up information are also within the protection scope of the present application and are not described herein again.
In some implementations, the processing node includes an operator network customer service node and/or an operator short message center node.
The number security guarantee system node server can verify the number to be verified according to the verification information, determine whether the number to be verified has abnormal conditions during communication, and guarantee the network security of the number to be verified.
And step S102, determining the stealing risk index of the number to be verified which is stolen according to the verification information.
The number to be verified is a number for identifying different terminal information. For example, the number to be authenticated may be an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or the like.
Verifying the current state of the number to be verified through the verification information, and if the verification information comprises risk information (for example, the number to be verified logs in a financial system frequently (for example, logging in once in 1 hour) recently, and conducts actions such as transferring or remitting), determining to start a verification process of the number to be verified, and initializing a theft risk index to be 1; otherwise, the number to be verified is determined to be safe, and normal communication can be carried out.
In some implementations, determining a theft risk index for the number to be verified to be stolen according to the verification information includes: determining a theft risk index according to the first risk index and/or the second risk index; the first risk index is an index determined according to loss reporting information and loss releasing information, the second risk index is an index determined according to a call record and a short message record, and the short message record comprises bank verification information and/or network loan verification information.
For example, if the call records include a plurality of call records with strange numbers, the theft risk index is + 1; if the number to be verified is frequently called to a plurality of strange numbers for a plurality of times in the night (e.g., 22:00-6:00) after being off-hook, a first risk index (e.g., 2) is calculated.
For example, if the short message set includes short message verification codes of a plurality of network loan platforms, for example, any one or more of a new registration verification short message of the network loan platform, a login verification short message of the network loan platform, a loan verification short message of the network loan platform, and a verification short message for purchasing virtual currency, a second risk index (for example, 3, 4, or 5, etc.) is calculated every time any one of the above short message verification codes is obtained; if the short message set includes short message verification codes of multiple banks, for example, a login verification short message of a certain bank or a quick binding verification short message sent by a bank, a second risk index (for example, 6 or the like) is obtained through calculation.
It should be noted that the verification information may further include an internet access record, and if the internet access record includes an internet access operation for logging in a plurality of internet loan platforms or banks, the risk index +2 is stolen. To speed up the validation of the theft risk index.
And determining the stealing risk index through the first risk index and/or the second risk index, so that the calculation speed of the stealing risk index is accelerated, whether the number to be verified is stolen is comprehensively measured, the verification speed of the number to be verified is accelerated, the number to be verified is rapidly processed in time, the property safety of the registered user corresponding to the number to be verified is ensured, and the user experience degree is improved.
In some implementations, the manner in which the first risk index is determined includes: determining a first risk index according to any one or more of the first calculation result, the second calculation result and the third calculation result; wherein the first calculation result is a result calculated according to the initial risk index, the hang-off time and a preset time threshold (e.g., a period from 22 pm to 6 pm); the second calculation result is a result determined based on the first position information and the second position information; the third calculation result is a result determined according to the identity of the loss reporting terminal and the identity of the unlinking terminal.
For example, if the unhook terminal 630 is an unhook operation performed at night, especially at a time point (e.g., 22:00-6:00) when a fraud case is high, setting the initial risk index to 1, and starting a verification process for a number to be verified; if the first position information is inconsistent with the second position information of the number to be verified after the number to be verified is subjected to the hanging-off operation, adding 1 to the stolen risk index; and if the IMSI number of the loss-reported terminal is inconsistent with the IMSI number of the hang-up terminal, calculating to obtain a third calculation result (or adding 1 to the stolen risk index) so as to improve the risk degree of the number to be verified.
And step S103, determining whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold.
The stealing risk index is dynamically changed in real time, the preset risk index threshold is a preset risk index threshold, when the stealing risk index exceeds the preset risk index threshold, the number to be verified is represented to be stolen, processing measures need to be taken for the number to be verified, and property loss of users is reduced.
And step S104, generating a stolen identifier under the condition that the number to be verified is determined to be stolen.
The stolen identifier indicates that the number to be verified is stolen by other people, the number to be verified is in illegal use, and the fund corresponding to the number to be verified is probably encroached by the stolen user, so that the number to be verified needs to be processed, and property loss of the registered user corresponding to the number to be verified is avoided.
And step S105, generating and sending alarm information to each processing node according to the stolen identifier and the number to be verified.
The number to be verified corresponds to the stolen identifier one by one, and the stolen identifier is used for identifying the number to be verified to be stored in the stolen state.
When each processing node acquires the alarm information, the stolen identification and the number to be verified can be acquired through analysis of the alarm information, and the communication function corresponding to the number to be verified is limited according to the stolen identification. For example, a short message verification function corresponding to the number to be verified is locked or an internet communication function corresponding to the number to be verified is closed, so that a thief is prevented from performing the next transfer operation, and the property safety of the user is ensured.
In the embodiment, the number to be verified can be comprehensively verified by acquiring the verification information sent by the plurality of processing nodes; determining a stealing risk index of the number to be verified which is stolen according to the verification information, judging whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold, generating a stolen identifier under the condition that the number to be verified is determined to be stolen, representing the condition that the number to be verified is stolen through the stolen identifier, processing the number to be verified in time, and avoiding the number to be verified being occupied by other people; according to the stolen identifier and the number to be verified, an alarm message is generated and sent to each processing node, so that each processing node limits the communication function corresponding to the number to be verified, the user property loss caused by the leakage of the identity information of the user is avoided, the safety of the user information and property is guaranteed, and the user experience degree is improved.
Fig. 2 is a flowchart illustrating a method for verifying identification information according to another embodiment of the present application. The verification method can be applied to a node server of a number security assurance system. As shown in fig. 2, the verification method includes the following steps:
in step S201, authentication information sent by a plurality of processing nodes is acquired.
And step S202, determining the stealing risk index of the number to be verified which is stolen according to the verification information.
And step S203, determining whether the number to be verified is stolen according to the stealing risk index and a preset risk index threshold.
And step S204, generating a stolen identifier under the condition that the number to be verified is determined to be stolen.
And step S205, generating and sending alarm information to each processing node according to the stolen identifier and the number to be verified.
It should be noted that steps S201 to S205 are the same as steps S101 to S105 in the previous embodiment, and are not described again here.
Step S206, inquiring the emergency contact information corresponding to the number to be verified according to the number to be verified.
The emergency contact information is information of an emergency contact person preset by a user corresponding to the number to be verified, for example, the emergency contact information includes a telephone number of the emergency contact person, relationship information between the emergency contact person and the user, and the like. The emergency contact information is only illustrated by way of example, and may be specifically set according to actual situations, and other emergency contact information not illustrated is also within the protection scope of the present application, and is not described herein again.
For example, the number to be verified is used as an index, and the number is searched in the operator system database to obtain information such as the telephone number of the emergency contact.
And step S207, verifying the number to be verified according to the emergency contact information.
The verification of the number to be verified can be the comparison of the emergency contact information and the information of the current user of the number to be verified; or directly dialing the telephone number of the emergency contact in the emergency contact information, directly inquiring whether the number to be verified is stolen, and the like, further determining whether the number to be verified is stolen, determining the current use state of the number to be verified, and reducing the property loss of the user.
In some specific implementations, after generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified, the method further includes: and responding to a verification request sent by the mobile terminal corresponding to the number to be verified, and verifying the identity of the user of the mobile terminal.
It should be noted that, if the number to be authenticated is not stolen, but it is determined that the number to be authenticated is at a risk of being stolen by the stolen identifier, at this time, the user of the mobile terminal corresponding to the number to be authenticated still needs to use the network function of the number to be authenticated, and needs to perform identity authentication on the user after receiving a verification request sent by the user. For example, the user is subjected to online face recognition verification and the like to ensure that the user is really a registered user of the number to be verified, and the use safety of the number to be verified is ensured. If the user is not the registered user of the number to be verified through face recognition, the communication function of the number to be verified still needs to be limited. For example, a network locking operation (e.g., locking a communication function such as an internet access function and a short message verification function corresponding to the number to be verified) is performed on the number to be verified, and a bank card of a user corresponding to the number to be verified is frozen, so that a fraudulent user is prevented from performing a next transfer operation.
In the embodiment, the number to be verified can be comprehensively verified by acquiring the verification information sent by the plurality of processing nodes; determining a stealing risk index of the number to be verified which is stolen according to the verification information, judging whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold, generating a stolen identifier under the condition that the number to be verified is determined to be stolen, representing the condition that the number to be verified is stolen through the stolen identifier, processing the number to be verified in time, and avoiding the number to be verified being occupied by other people; and generating and sending alarm information to each processing node according to the stolen identifier and the number to be verified, so that each processing node limits the communication function corresponding to the number to be verified, and the property loss of the user caused by the leakage of the identity information of the user is avoided. And inquiring emergency contact information corresponding to the number to be verified according to the number to be verified, and verifying the number to be verified according to the emergency contact information. The security of the number to be verified is further ensured, the number to be verified is prevented from being stolen, the property safety of the user corresponding to the number to be verified is ensured, and the user experience degree is improved.
Fig. 3 is a flowchart illustrating a method for verifying identification information according to still another embodiment of the present application. The authentication method is applicable to a processing node server. As shown in fig. 3, the verification method includes the following steps:
step S301, a number to be verified is obtained.
The number to be verified is a number for identifying different terminal information. The number to be verified is a number which receives the user's off-hook operation within a short time (e.g., within 1 hour) after the user performs the loss-reporting operation, and particularly, after the operator goes off duty, the user of the number to be verified performs the off-hook operation by telephone. The number to be verified is possible to have the risk of being stolen, corresponding verification needs to be carried out on the number to be verified, information leakage of a user is avoided, and property safety of the user is guaranteed.
Step S302, inquiring a database according to the number to be verified to obtain verification information.
The verification information comprises any one or more of loss report information, hang-off information, call record and short message record of the number to be verified. For example, the loss reporting information includes any one or more of first location information (e.g., latitude and longitude information of the location of the loss reporting terminal, etc.) of the number to be verified before the loss reporting operation is performed, first cell information providing communication service for the number to be verified, and an identifier (e.g., IMSI of the loss reporting terminal) of the loss reporting terminal. The verification information is only illustrated by way of example, and may be specifically set according to actual situations, and other non-illustrated verification information is also within the protection scope of the present application and is not described herein again.
Step S303, sending the verification information to the number security assurance system node.
When the number security assurance system node receives the verification information, the number to be verified is verified by using any one or more of loss reporting information, release information, call records and short message records of the verification number in the verification information so as to determine the stealing risk index of the number to be verified, which is stolen.
And step S304, acquiring alarm information sent by the number security system node.
Wherein, the alarm information comprises the stolen identification and the number to be verified. The stolen identification indicates that the number to be verified is stolen by others and is in illegal use.
And S305, limiting the communication function corresponding to the number to be verified according to the stolen identifier.
Wherein, the communication function includes: any one or more of a network access function, a call function and a short message verification function (e.g., receiving/sending short messages). The internet access function is a function of accessing the internet by using a mobile network, and a user can access a website in the internet, acquire related information, use instant messaging software to perform instant messaging with other users and the like through the mobile network of the intelligent terminal. The above communication functions are only examples, and may be specifically limited according to actual situations, and other communication functions not described are also within the protection scope of the present application, and are not described herein again.
The communication function of the number to be verified is limited according to the stolen identifier, namely, under the condition that the number to be verified is stolen, each communication function of the number to be verified is closed or limited, so that a thief can be prevented from further acquiring the identity information of the user, the fund of the user is stolen according to the identity information, the property loss of the user is reduced, and the property safety of the user is ensured.
In the embodiment, the number to be verified with the risk of being stolen can be processed in time by acquiring the number to be verified, so that the number is prevented from being stolen. Inquiring a database according to the number to be verified, and acquiring and sending verification information to a number security guarantee system node so that the number security guarantee system node verifies the number to be verified according to the verification information; according to the obtained stolen identifier in the alarm information sent by the number security guarantee system node, the communication function corresponding to the number to be verified is limited, so that a thief can be prevented from performing the next transfer operation, the fund security of the registered user corresponding to the number to be verified is ensured, and the user experience is improved.
Fig. 4 shows a block diagram of a node server of the number security system in the embodiment of the present application. As shown in fig. 4, the number security system node server includes the following modules:
a first obtaining module 401, configured to obtain verification information sent by multiple processing nodes; a risk index calculation module 402, configured to determine, according to the verification information, a theft risk index indicating that a number to be verified is stolen, where the number to be verified is a number used to identify different terminal information; the judging module 403 is configured to determine whether the number to be verified is stolen according to the stealing risk index and a preset risk index threshold; a generating module 404, configured to generate a stolen identifier when it is determined that the number to be verified is stolen; the first processing module 405 is configured to generate and send an alarm message to each processing node according to the stolen identifier and the number to be verified, so that each processing node restricts a communication function corresponding to the number to be verified.
In the embodiment, the first obtaining module obtains the verification information sent by the plurality of processing nodes, so that the number to be verified can be comprehensively verified; the method comprises the steps that a risk index calculation module is used for determining a stealing risk index of a number to be verified, which is stolen, according to verification information, a judgment module is used for judging whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold value, a generation module is used for generating a stolen identifier under the condition that the number to be verified is confirmed to be stolen, the stolen condition of the number to be verified is represented through the stolen identifier, the number to be verified can be processed in time, and the number to be verified is prevented from being occupied by other people; the first processing module is used for generating and sending alarm information to each processing node according to the stolen identifier and the number to be verified, so that each processing node limits the communication function corresponding to the number to be verified, the user property loss caused by the leakage of the identity information of the user is avoided, the safety of the user information and property is guaranteed, and the user experience degree is improved.
Fig. 5 is a block diagram showing components of a processing node server in the embodiment of the present application. As shown in fig. 5, the processing node server includes the following modules:
a second obtaining module 501, configured to obtain a number to be verified, where the number to be verified is a number used for identifying different terminal information; the query module 502 is configured to query a database according to a number to be verified to obtain verification information; a sending module 503, configured to send verification information to the number security assurance system node, so that the number security assurance system node determines, according to the verification information, an embezzlement risk index for the number to be verified to be embezzled; a third obtaining module 504, configured to obtain alarm information sent by a node of the number security assurance system, where the alarm information includes an stolen identifier and a number to be verified; and the second processing module 505 is configured to limit the communication function corresponding to the number to be verified according to the stolen identifier.
In this embodiment, the number to be verified is obtained through the second obtaining module, so that the number to be verified with the risk of being stolen can be processed in time, and the number is prevented from being stolen. The method comprises the steps that a query module queries a database according to a number to be verified to obtain verification information, and a sending module sends the verification information to a number security guarantee system node so that the number security guarantee system node verifies the number to be verified according to the verification information; and limiting the communication function corresponding to the number to be verified by using the second processing module according to the stolen identifier in the alarm information sent by the number security guarantee system node, so that a thief can be prevented from performing the next transfer operation, the fund security of the registered user corresponding to the number to be verified is ensured, and the user experience is improved.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, a unit that is not so closely related to solving the technical problem proposed by the present application is not introduced in the present embodiment, but it does not indicate that no other unit exists in the present embodiment.
Fig. 6 is a block diagram showing components of a system for verifying identification information in the embodiment of the present application. As shown in fig. 6, the method specifically includes the following steps: a number security assurance system node server 610, a loss report terminal 620, a drop release terminal 630, an operator short message center node server 640 and an operator network customer service node server 650. The devices communicate with each other through a Mobile cellular network, for example, any one of a 3rd Generation Mobile network (3G), a 4th Generation Mobile network (4G), and a 5th Generation Mobile network (5G).
Fig. 7 is a schematic workflow diagram showing a verification system of identification information in the embodiment of the present application. As shown in fig. 7, the method specifically includes the following steps:
step S701, the loss reporting terminal 620 logs in the operator network customer service node server 650, reports the loss of the to-be-verified number corresponding to the loss reporting terminal 620, and generates loss reporting information.
For example, the loss report terminal 620 may log in to the operator server through a customer service phone of the calling operator (e.g., 10010/10000/10086), or through a mobile phone client (e.g., a mobile phone business office) of the loss report terminal 620, and perform loss report processing on the number to be verified (e.g., 186xxxx8888), thereby generating loss report information.
The loss reporting information includes any one or more of first location information (e.g., latitude and longitude information of the location of the loss reporting terminal, etc.) of the number to be verified before the loss reporting operation is performed, first Cell information (e.g., Physical Cell Identifier (PCI), etc.) providing a communication service for the number to be verified, and an Identifier (e.g., IMSI of the loss reporting terminal 620) of the loss reporting terminal 620.
In step S702, the detach terminal 630 logs in the operator network service node server 650 again, and performs an detach operation on the number to be verified to generate detach information.
The hang-off operation is an hang-off operation performed on the number to be authenticated again within a short time (for example, within one hour) after the loss report terminal 620 performs the loss report operation. The hang-off information includes any one or more of second location information (e.g., latitude and longitude information, etc.) of the to-be-verified number after the hang-off operation is performed, second cell information (e.g., PCI, etc.) providing communication service for the to-be-verified number, and an identifier of the hang-off terminal 630 (e.g., IMSI, etc. of the hang-off terminal 630).
In step S703, the operator network customer service node server 650 reports the loss report information and the release report information of the number to be verified to the number security assurance system node server 610 through the 3G/4G/5G network.
In step S704, since the number to be verified is subjected to both loss reporting processing and hang learning processing, and the two processing processes are executed by different terminals, the number security system node server 610 marks the number to be verified as a mobile phone number with a risk of embezzlement, starts a monitoring operation on the number to be verified, and sets the risk index of embezzlement of the number to be verified to 1 to prevent the number to be verified from being embezzled.
It should be noted that, if the unhook terminal 630 is an unhook operation performed at night, especially at a time point (e.g., 22:00-6:00) when a fraud case is highly happened, the stolen risk index of the number to be verified needs to be increased by 1; if the first position information is inconsistent with the second position information of the number to be verified after the number to be verified is subjected to the hanging-off operation, adding 1 to the stolen risk index; and if the IMSI number of the loss reporting terminal is inconsistent with the IMSI number of the drop reporting terminal, adding 1 to the stolen risk index so as to improve the risk degree of the number to be verified.
In step S705, the number security assurance system node server 610 generates an inquiry message according to the number to be verified, and sends the inquiry message to the operator short message center node server 640 and the operator network customer service node server 650.
Step S706, the operator short message center node server 640 receives the query message, and obtains the number to be verified and the corresponding theft risk index by analyzing the query message. And querying a database of the user according to the number to be verified, acquiring a set of short messages received after the number to be verified is disconnected, and feeding the set of short messages back to the number security system node server 610.
Step S707, the operator network customer service node server 650 receives the first warning message, and obtains the number to be verified and the corresponding theft risk index by analyzing the first warning message. And inquiring a database of the user according to the number to be verified, obtaining a call record and an internet record of the number to be verified after being hung off, and feeding back the call record and the internet record to the number security system node server 610.
In step S708, the number security assurance system node server 610 updates the theft risk index of the number to be verified according to any one or more of the acquired short message set, the call record, and the internet access record.
For example, if the call records include a plurality of call records with strange numbers, the theft risk index is + 1; if the number to be verified is frequently called to a plurality of strange numbers for a plurality of times in the night (for example, 22:00-6:00) after being off-hook, the number to be verified is stolen with the risk index of + 2. And if the Internet access records comprise Internet access operations for logging in a plurality of Internet loan platforms or banks, the risk index is stolen by + 2.
For example, if the short message set includes the short message verification codes of a plurality of network loan platforms (for example, any one or more of a new registration verification short message of the network loan platform, a login verification short message of the network loan platform, a loan verification short message of the network loan platform, and a verification short message for purchasing virtual currency), the risk index +2 will be stolen whenever any one of the short message verification codes is obtained; if the short message set comprises short message verification codes of a plurality of banks (for example, a certain bank logs in to verify a short message or a quick binding verification short message sent by a bank, etc.), the short message set is stolen with a risk index of + 2.
Step S709, the number security assurance system node server 610 compares the stolen risk index obtained by the calculation in the above step with a preset risk index threshold (for example, 20), and if the stolen risk index is greater than the preset risk index threshold, determines that the number to be verified is stolen. Generating a stolen identifier; and generating an alarm message according to the stolen identifier and the number to be verified.
Step S710, the number security assurance system node server 610 sends an alarm message to the operator short message center node server 640, the operator network customer service node server 650, and the hangup terminal 630, so that the operator short message center node server 640 locks the short message verification function corresponding to the number to be verified, the operator network customer service node server 650 locks the internet access function corresponding to the number to be verified, and a thief is prevented from performing a next transfer operation.
In one specific implementation, the number security system node server 610 may further call an emergency contact (a contact preset by the user and stored in the operator network customer service node server 650) corresponding to the number to be authenticated to further confirm whether the number to be authenticated is stolen.
Step S711, the operator short message center node server 640 locks the short message verification function corresponding to the number to be verified according to the number to be verified and the stolen identifier in the alarm information.
In step S712, the operator network customer service node server 650 locks the internet access function corresponding to the number to be verified according to the number to be verified and the stolen identifier in the warning message.
In step S713, the off-hook terminal 630 receives the alarm information sent by the node server 610 of the number security system, and learns that the communication network service of the off-hook terminal 630 is stopped according to the alarm information. However, the off-hook terminal 630 needs to continue using the internet access function, the off-hook terminal 630 applies to the node server 610 of the number security assurance system for performing identity verification on the user of the off-hook terminal 630 on line, and after the identity verification is successful, the number to be verified can continue to be used.
For example, the user of the off-hook terminal 630 may be subjected to face information acquisition through the camera function of the off-hook terminal 630, and may be subjected to online face recognition verification.
In this embodiment, after the loss reporting terminal performs the loss reporting operation on the number to be verified, the loss reporting terminal performs the hang-up removal operation on the number to be verified again in a short time, which indicates that the number to be verified has a risk of being stolen. Determining a stealing risk index of the number to be verified which is stolen according to the verification information, judging whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold, generating a stolen identifier under the condition of determining that the number to be verified is stolen, generating and sending an alarm message to an operator short message center node server and an operator network customer service node server according to the stolen identifier and the number to be verified, enabling the operator short message center node server to close a short message verification function of the number to be verified in time, enabling the operator network customer service node server to lock an internet function and the like of the number to be verified in time, preventing a thief from performing transfer operation on the next step, and reducing property loss of a user; the user property loss caused by the leakage of the identity information of the user is avoided, the safety of the user information and property is guaranteed, and the user experience degree is improved.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present application, and that the present application is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the application, and these changes and modifications are to be considered as the scope of the application.
Claims (12)
1. A method of verifying identification information, the method comprising:
acquiring verification information sent by a plurality of processing nodes;
determining a stealing risk index of the number to be verified which is stolen according to the verification information, wherein the number to be verified is a number used for identifying different terminal information;
determining whether the number to be verified is stolen or not according to the stealing risk index and a preset risk index threshold;
under the condition that the number to be verified is determined to be stolen, generating an stolen identifier;
and generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified so that each processing node limits the communication function corresponding to the number to be verified.
2. The method of claim 1, wherein the authentication information comprises: and any one or more of loss report information, release information, call record and short message record of the number to be verified.
3. The method of claim 2, wherein the determining the fraud risk index of the number to be verified that is stolen according to the verification information comprises:
determining the theft risk index according to the first risk index and/or the second risk index;
the first risk index is determined according to the loss reporting information and the release information, the second risk index is determined according to the call record and the short message record, and the short message record comprises bank verification information and/or network loan verification information.
4. The method according to claim 3, wherein the loss report information includes first location information of the number to be verified before loss report operation and/or an identifier of a loss report terminal; the hang-off information comprises any one or more of hang-off time, second position information of the number to be verified after hang-off operation and identification of the hang-off terminal.
5. The method of claim 4, wherein determining the first risk index comprises:
determining the first risk index according to any one or more of the first calculation result, the second calculation result and the third calculation result;
wherein the first calculation result is a result calculated according to an initial risk index, the hang-up time and a preset time threshold; the second calculation result is a result determined from the first position information and the second position information; the third calculation result is a result determined according to the identifier of the loss reporting terminal and the identifier of the drop releasing terminal.
6. The method according to any one of claims 1 to 5, wherein after generating and sending an alarm message to each of the processing nodes according to the stolen identifier and the number to be verified, further comprising:
inquiring emergency contact information corresponding to the number to be verified according to the number to be verified;
and verifying the number to be verified according to the emergency contact information.
7. The method according to any one of claims 1 to 5, wherein after generating and sending an alarm message to each of the processing nodes according to the stolen identifier and the number to be verified, further comprising:
and responding to a verification request sent by the mobile terminal corresponding to the number to be verified, and performing identity verification on the user of the mobile terminal.
8. The method according to any of claims 1 to 5, wherein the processing node comprises an operator network customer service node and/or an operator short message center node.
9. A method of verifying identification information, the method comprising:
acquiring a number to be verified, wherein the number to be verified is a number used for identifying different terminal information;
inquiring a database according to the number to be verified to obtain verification information;
sending the verification information to a number security guarantee system node so that the number security guarantee system node determines the embezzlement risk index of the number to be verified, wherein the number to be verified is embezzled according to the verification information;
acquiring alarm information sent by the number security assurance system node, wherein the alarm information comprises a stolen identifier and the number to be verified;
and limiting the communication function corresponding to the number to be verified according to the stolen identifier.
10. The method according to claim 9, wherein the communication function includes any one or more of an internet access function, a call function and a short message verification function.
11. A number security system node server, comprising:
the first acquisition module is used for acquiring the verification information sent by the plurality of processing nodes;
the risk index calculation module is used for determining the stealing risk index of the number to be verified which is stolen according to the verification information, wherein the number to be verified is a number used for identifying different terminal information;
the judging module is used for determining whether the number to be verified is stolen according to the stealing risk index and a preset risk index threshold;
the generation module is used for generating a stolen identifier under the condition that the number to be verified is determined to be stolen;
and the first processing module is used for generating and sending an alarm message to each processing node according to the stolen identifier and the number to be verified so that each processing node limits the communication function corresponding to the number to be verified.
12. A processing node server, comprising:
the second acquisition module is used for acquiring a number to be verified, wherein the number to be verified is a number used for identifying different terminal information;
the query module is used for querying a database according to the number to be verified to obtain verification information;
the sending module is used for sending the verification information to a number security guarantee system node so that the number security guarantee system node can determine the embezzlement risk index of the number to be verified, wherein the embezzlement risk index is embezzled according to the verification information;
a third obtaining module, configured to obtain alarm information sent by the number security assurance system node, where the alarm information includes an stolen identifier and the number to be verified;
and the second processing module is used for limiting the communication function corresponding to the number to be verified according to the stolen identifier.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011374204.3A CN112566098A (en) | 2020-11-27 | 2020-11-27 | Identification information verification method and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011374204.3A CN112566098A (en) | 2020-11-27 | 2020-11-27 | Identification information verification method and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112566098A true CN112566098A (en) | 2021-03-26 |
Family
ID=75045439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011374204.3A Pending CN112566098A (en) | 2020-11-27 | 2020-11-27 | Identification information verification method and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112566098A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960553A (en) * | 2005-11-16 | 2007-05-09 | 乔超 | System and method for preventing software and hardware with communication condition / function from being embezzled |
WO2015040459A1 (en) * | 2013-03-15 | 2015-03-26 | Yougetitback Limited | Systems and methods for dynamically assessing and mitigating risk of an insured entity |
CN106295349A (en) * | 2015-05-29 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen |
CN108985070A (en) * | 2018-07-11 | 2018-12-11 | 阿里巴巴集团控股有限公司 | Risk control method, risk control device, electronic equipment and storage medium |
-
2020
- 2020-11-27 CN CN202011374204.3A patent/CN112566098A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1960553A (en) * | 2005-11-16 | 2007-05-09 | 乔超 | System and method for preventing software and hardware with communication condition / function from being embezzled |
WO2015040459A1 (en) * | 2013-03-15 | 2015-03-26 | Yougetitback Limited | Systems and methods for dynamically assessing and mitigating risk of an insured entity |
CN106295349A (en) * | 2015-05-29 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen |
US20180077192A1 (en) * | 2015-05-29 | 2018-03-15 | Alibaba Group Holding Limited | Account theft risk identification |
CN108985070A (en) * | 2018-07-11 | 2018-12-11 | 阿里巴巴集团控股有限公司 | Risk control method, risk control device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080281737A1 (en) | System and Method for Authenticating the Identity of a User | |
CN112437428B (en) | Verification method and server | |
CN106911661B (en) | Short message verification method, device, client, server and system | |
CN110598383B (en) | Method and device for removing account authority limit | |
CN101909279A (en) | Authentication method for mobile phone video monitoring | |
CN103686651A (en) | Emergency call based authentication method, device and system | |
KR101306074B1 (en) | Method and system to prevent phishing | |
JP2000184448A (en) | Personal communication system and its communicating method | |
CN109587683B (en) | Method and system for preventing short message from being monitored, application program and terminal information database | |
CN112508482B (en) | Logistics express signing management method, system and storage medium based on block chain | |
CN101983393A (en) | Method for the reliable and targeted suppression of alarms in a monitoring and control centre | |
CN1980459B (en) | Method for realizing information destroying at network side | |
CN112566098A (en) | Identification information verification method and server | |
US8380165B1 (en) | Identifying a cloned mobile device in a communications network | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
CN112564915B (en) | Verification method, one-number multi-terminal management server and terminal | |
CN114553573B (en) | Identity authentication method and device | |
CN112954688B (en) | Communication identifier verification method, server and core network equipment | |
CN112950199B (en) | Anti-theft method and server for communication identification | |
CN109995733B (en) | Capability service opening method, device, system, equipment and medium | |
KR20040040412A (en) | Management System and method of Social Security number | |
CN117195275B (en) | Data access method, device, electronic equipment and storage medium | |
CN111242770B (en) | Risk equipment identification method and device, electronic equipment and readable storage medium | |
CN110490587B (en) | Method and device for rapidly locking bank card | |
KR20170016114A (en) | Caller authentication method and authentication server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210326 |