CN111898107A - Account freezing method and device, computer equipment and storage medium - Google Patents

Account freezing method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111898107A
CN111898107A CN202010829203.7A CN202010829203A CN111898107A CN 111898107 A CN111898107 A CN 111898107A CN 202010829203 A CN202010829203 A CN 202010829203A CN 111898107 A CN111898107 A CN 111898107A
Authority
CN
China
Prior art keywords
account
verification
page
freezing
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010829203.7A
Other languages
Chinese (zh)
Other versions
CN111898107B (en
Inventor
程冉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010829203.7A priority Critical patent/CN111898107B/en
Publication of CN111898107A publication Critical patent/CN111898107A/en
Application granted granted Critical
Publication of CN111898107B publication Critical patent/CN111898107B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Hardware Design (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to privacy and safety of an account, in particular to an account freezing method, an account freezing device, computer equipment and a storage medium. The method comprises the following steps: acquiring a risk account and an account identification code for verifying an auxiliary account; when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code; determining identity authentication information corresponding to the account identification code; verifying the user information collected by the identity verification page according to the identity verification information; and when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page. By adopting the method, the security of account freezing can be improved.

Description

Account freezing method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to an account freezing method and apparatus, a computer device, and a storage medium.
Background
At present, account safety of users is increasingly serious, and events threatening the account safety of the users often occur. In order to reduce the loss caused by the stolen account number and password of the user, emergency measures such as account number emergency freezing and the like are provided by the internet provider.
The existing account freezing needs to verify the bound mobile phone number, however, when the mobile phone of the user is stolen, the mobile phone card is reprocessed, and before the account is frozen based on the reprocessed mobile phone card, a stealer can steal the user account through the stolen mobile phone card, which results in lower security of freezing the account through the bound mobile phone number.
Disclosure of Invention
In view of the above, it is necessary to provide an account freezing method, an account freezing apparatus, a computer device, and a storage medium, which can improve security of account freezing.
An account freezing method, the method comprising:
acquiring a risk account and an account identification code for verifying an auxiliary account;
when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code;
determining identity verification information corresponding to the account identification code;
verifying the user information collected by the identity verification page according to the identity verification information;
and when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
An account freezing apparatus, the apparatus comprising:
acquiring a risk account and an account identification code for verifying an auxiliary account;
when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code;
determining identity verification information corresponding to the account identification code;
verifying the user information collected by the identity verification page according to the identity verification information;
and when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, the account verification module is further configured to, when an account management sub-application is started by a parent application, display an account information acquisition page by the account management sub-application; the account management sub-application is an application running in a running environment provided by the parent application; and acquiring the input risk account and an account identification code for assisting account verification based on the account information acquisition page.
In one embodiment, the account verification module is further configured to analyze the account identification code to obtain a verification account corresponding to the account identification code and a page link of an identity verification page to be entered; and when the verification account number is matched with the risk account number, entering the corresponding identity verification page according to the page link.
In one embodiment, the identity verification module further comprises a password verification module for acquiring the user information collected through the identity verification page; extracting a verification password in the identity verification information and a user password in the user information; carrying out consistency verification on the verification password and the user password; the step of jumping to an account freezing page when the verification is passed, and the step of freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps: and when the verification password is consistent with the user password, jumping to the account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, the identity verification module further comprises a face image verification module, configured to extract a user face image from the user information collected by the identity verification page; matching verification is carried out on the user face image and the reference face image; the step of jumping to an account freezing page when the verification is passed, and the step of freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps: and when the user face image is matched with the verification face image, jumping to the account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, the face image verification module is further configured to determine user feature points respectively appearing in each image frame of the live body detection video; determining various user actions corresponding to the living body detection video based on user feature points respectively appearing in each image frame; performing matching verification on various user actions based on the action guide information; when the user face image is matched with the verification face image, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page, wherein the steps of: and when the user face image is matched with the verification face image and the user action is matched with the action guide information, jumping to the account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, the account freezing device is further configured to, when a viewing instruction for the risky account in the frozen state is received, display corresponding account content in response to the viewing instruction; when a target operation instruction of the risk account in the frozen state is received, shielding the target operation instruction, and not responding to a target operation pointed by the target operation instruction; wherein the target operation comprises a modification operation of at least one function of a social function, a resource transfer function, a setting function and the like.
In one embodiment, the account freezing device is further configured to determine, when a sharing instruction for the account identification code occurs, at least one sharing object carried in the sharing instruction; and sending the account identification code to the sharing object.
In one embodiment, the account freezing device further comprises an account identification code generation module, configured to obtain a verification account of the account identification code to be generated; determining authentication information associated with the authentication account number; generating a target link corresponding to the verification account according to the verification account, the identity verification information and a preset page link of an identity verification page; and coding the target link to obtain an account identification code of the verification account.
In one embodiment, the account identification code generation module is further configured to display an identity information acquisition page; when a verification password is acquired through the identity information acquisition page, the verification password is used as identity verification information and is bound with the verification account number; and when a reference face image is acquired through the identity information acquisition page, binding the reference face image serving as identity authentication information with the authentication account.
In one embodiment, the account identification code generation module is further configured to, when the verification account is not authenticated by a real-name, acquire real-name authentication information associated with the verification account, and verify the real-name authentication information; after the real-name authentication information passes verification, performing living body detection on a target object initiating an account identification code generation operation; and when the target object is detected to be a living body, executing the step of generating a target link corresponding to the verification account according to the verification account, the identity verification information and a preset page link of the identity verification page.
In one embodiment, the account identification code generation module is further configured to trigger a reset instruction for the authentication information through an identity information acquisition page; responding to the reset instruction, and acquiring reset identity authentication information through the identity information acquisition page; setting the account identification code generated in the previous time in an invalid state, and regenerating a target link corresponding to the verification account according to the verification account, the page link of the authentication page and the reset authentication information; and coding the regenerated target link to obtain the reset account identification code of the verification account.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring a risk account and an account identification code for verifying an auxiliary account;
when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code;
determining identity verification information corresponding to the account identification code;
verifying the user information collected by the identity verification page according to the identity verification information;
and when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring a risk account and an account identification code for verifying an auxiliary account;
when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code;
determining identity verification information corresponding to the account identification code;
verifying the user information collected by the identity verification page according to the identity verification information;
and when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
According to the account freezing method, the account freezing device, the computer equipment and the storage medium, when the risk account and the account identification code are obtained, the account identification code can be analyzed to obtain the verification account for assisting account verification; when the verification account is obtained, the risk account can be verified based on the verification account, and the identity verification page is correspondingly displayed when the verification passes, so that the security of account freezing is improved; when the identity authentication information associated with the risk account is obtained and the user information is obtained through the identity authentication page, the user information can be further authenticated based on the identity authentication information, and the account freezing page is correspondingly displayed when the user information is also authenticated, so that the security of account freezing is further improved. Because the account freezing method does not depend on the bound mobile phone number, compared with the traditional method of freezing the account based on the bound mobile phone number, the account freezing method can effectively improve the safety of account freezing. And an account identification code corresponding to the user and the risk account is used as an entry, and an identity authentication mode is adopted, so that the unique information can be authenticated by the user on any equipment, the account can be quickly frozen, and the operation efficiency is improved on the premise of ensuring the security of account freezing.
Drawings
FIG. 1 is a diagram of an application environment of an account freezing method in an embodiment;
FIG. 2 is a flow chart illustrating an account freezing method according to an embodiment;
FIG. 3 is a schematic diagram of an account information collection page in one embodiment;
FIG. 4 is a diagram of an account freeze page in one embodiment;
FIG. 5 is a diagram of a password verification page in one embodiment;
FIG. 6 is a schematic diagram of a face image verification page in one embodiment;
FIG. 7 is a schematic diagram of a liveness detection page in one embodiment;
FIG. 8 is a diagram of an identity information collection page in one embodiment;
fig. 9 is a schematic flowchart of an account freezing method in an embodiment;
FIG. 10 is a flowchart illustrating an account freezing method according to an exemplary embodiment;
fig. 11 is a schematic flow chart of an account freezing method in another embodiment;
FIG. 12 is a block diagram of an account freezing apparatus according to an embodiment;
FIG. 13 is a block diagram of the account freezing apparatus in another embodiment;
FIG. 14 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The account freezing method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. An account management application is run in the terminal 102 to freeze an account. When the account needs to be frozen, the account management application acquires a to-be-frozen risk account and an account identification code for assisting account verification, acquires user information through an authentication page when the account identification code is matched with the risk account, and pulls authentication information from the server 104. The terminal 102 verifies the user information based on the identity verification information, and freezes the risk account when the verification passes. The server 104 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a network service, cloud communication, a middleware service, a domain name service, a cloud security service, a CDN, a big data and artificial intelligence platform, and the like. The terminal 102 may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
When the server is a cloud server, the account freezing method in the embodiments of the present application may specifically relate to cloud security. The Cloud Security (Cloud Security) refers to a generic name of Security software, hardware, users, organizations and Security Cloud platforms applied based on a Cloud computing business model. The cloud security integrates emerging technologies and concepts such as parallel processing, grid computing and unknown virus behavior judgment, abnormal monitoring of software behaviors in the network is achieved through a large number of meshed clients, the latest information of trojans and malicious programs in the internet is obtained and sent to the server for automatic analysis and processing, and then the virus and trojan solution is distributed to each client.
The main research directions of cloud security include: 1. the cloud computing security mainly researches how to guarantee the security of the cloud and various applications on the cloud, including the security of a cloud computer system, the secure storage and isolation of user data, user access authentication, information transmission security, network attack protection, compliance audit and the like; 2. the cloud of the security infrastructure mainly researches how to adopt cloud computing to newly build and integrate security infrastructure resources and optimize a security protection mechanism, and comprises the steps of constructing a super-large-scale security event and an information acquisition and processing platform through a cloud computing technology, realizing the acquisition and correlation analysis of mass information, and improving the handling control capability and the risk control capability of the security event of the whole network; 3. the cloud security service mainly researches various security services, such as anti-virus services and the like, provided for users based on a cloud computing platform.
In an embodiment, as shown in fig. 2, an account freezing method is provided, which is described by taking the example that the method is applied to the terminal in fig. 1, and includes the following steps:
step S202, acquiring a risk account and an account identification code for secondary account verification.
The risky account is a user account which may have a security problem, such as a stolen account or a reported account. The account id is an id used for assisting account verification, and may be a graphic code, such as a two-dimensional code or a barcode. In this embodiment, the account id may be a two-dimensional code or a barcode generated according to information such as a verification account, a page link of an authentication page, and authentication information. The verification account is a user account, and when a user triggers the generation step of the account identification code, the terminal can generate a corresponding account identification code based on the user account, and at this time, the user account corresponding to the account identification code can be called as the verification account.
It can be understood that the user may generate an account identification code in advance for the user account owned by the user, and at this time, the user account is a verification account. When a user thinks that a certain user account owned by the user has potential safety hazards, the user account needs to be frozen, and the user account input by the user can be regarded as a risk account at this time. Only if the user account number and the verification account number are consistent, the user has the right to freeze the risky account number.
The identity verification information refers to information which is acquired in the process of generating the account identification code and is used for representing the identity of an object initiating the operation of generating the account identification code, and the user information acquired through the identity verification page can be verified based on the identity verification information. The user information refers to identity information which is acquired in the account freezing process and used for representing an object initiating the account freezing operation. It is easy to understand that the user information input by the user in the process of freezing the account can be the authentication information input by the user in the process of generating the account identification code of the risky account. For convenience of description, an object initiating an account id generation operation is referred to as a first target object in the following description; and the object initiating the account freezing operation is called a second target object.
Specifically, when the risk account needs to be frozen, the terminal can collect the risk account to be frozen and the account identification code for assisting the verification of the risk account to be frozen based on the account information collection page. The account information acquisition page may be specifically an application page in an application program, or a web page, and the like, which is not limited in this embodiment of the application.
In an embodiment, referring to fig. 3, when the terminal displays an account information collection page as shown in fig. 3, a user may input an account name and an account password of a risk account through the account information collection page, and the terminal performs matching verification on the account name and the account password input by the user. The account includes an account name and an account password. When the verification is passed, the terminal displays prompt information of 'inputting account identification code' for prompting the user to upload the account identification code or scan the account identification code. When the verification fails, the terminal displays prompt information of 'account name or account password error' to prompt the user to re-input the risk account. Fig. 3 shows a schematic diagram of an account information collection page in one embodiment.
There are various ways to display the account information acquisition page, and several alternative ways are provided as follows:
in the first mode, a user accesses an account information acquisition page through an account management application running in the terminal, so that the terminal acquires a risk account and an account identification code based on the account information acquisition page.
The account management application may be a parent application or a child application. The child application is an application that can run in a running environment provided by the parent application, and the parent application is a native application that runs on the operating system and provides a running environment for the child application. The parent application provides an environment for the running of the child application, and a logic layer processing unit and a view layer processing unit for realizing the child application are created. The view layer processing unit is used for processing the view of the sub-application; the logic layer processing unit is used for processing the interactive logic of the sub-application. The processing unit may specifically be a process or a thread, such as a logical layer thread and a corresponding view layer thread. The logic layer processing unit can run in a virtual machine, such as a JavaScript virtual machine.
In one embodiment, the step S202, namely the step of acquiring the account id for secondary account verification and the account id of the account id, specifically includes: when the account management sub-application is started through the parent application, displaying an account information acquisition page through the account management sub-application; the account management sub-application is an application running in a running environment provided by the parent application; and acquiring the input risk account and an account identification code for assisting account verification based on the account information acquisition page.
When the risk account needs to be frozen, a user can start the account management sub-application through the parent application, and when the account management sub-application runs in a running environment provided by the parent application, the account information acquisition page is displayed through the account management sub-application. Furthermore, a user inputs a risk account through the account information acquisition page and uploads an account identification code image containing an account identification code, so that the terminal determines the risk account based on the input operation of the user and determines the account identification code based on the uploading operation of the user.
In the second mode, a user accesses an account information acquisition page through a browser in the terminal, and inputs a risk account and an account identification code through the account information acquisition page.
Obviously, the account information collection page display modes are not limited to the two modes, and any mode that the terminal is open and can display the account information collection page can be applied to the embodiment of the present invention.
And step S204, when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code.
Specifically, the terminal analyzes the received account identification code to obtain a verification account for verifying the risk account and a page link for entering an identity verification page. Meanwhile, the terminal verifies the matching of the verification account and the risk account, when the verification account is matched with the risk account, the account identification code is generated by the risk account, at the moment, a second target object initiating account freezing operation aiming at the risk account is a practical owner of the risk account, and at the moment, the terminal can enter a corresponding identity verification page according to the page link obtained through analysis. When the verification account obtained by analyzing the account identification code is not matched with the risk account, the account identification code is not generated by the risk account, at this time, the second target object initiating the account freezing operation for the risk account is not the actual owner of the risk account, and therefore, in order to protect the safety of the risk account, the terminal refuses to enter the identity verification page.
In step S206, the authentication information corresponding to the account id is determined.
Specifically, when the account information acquisition page acquires an account identification code for assisting in verifying the risk account, the terminal may acquire the authentication information associated with the account identification code from a local or server. The identity authentication information associated with the account identification code is acquired through an identity information acquisition page in the process of generating the account identification code of the risk account. At this time, the terminal can store the risk account number, the account number identification code of the risk account number and the authentication information acquired through the identity information acquisition page locally in a correlated manner, or send the risk account number, the account number identification code of the risk account number and the authentication information to the server, and the server stores the risk account number and the authentication information in a correlated manner.
In one embodiment, the authentication information may be stored in direct association with the account identification code. The account identification code is a two-dimensional code or a bar code generated according to the verification account, the page link of the authentication page, the authentication information and the like, so that the terminal can associate the authentication information with the account identification code generated based on the authentication information in the process of generating the account identification code, and therefore, the terminal can directly acquire the associated authentication information based on the account identification code in the process of freezing the risk account.
In one embodiment, the risky account number, the corresponding account identification code, and the associated authentication information may be stored in the content distribution network, so that when the authentication information associated with the risky account number needs to be determined, the terminal may determine a nearby content distribution network node and pull the authentication information from the nearby content distribution network node. A Content Delivery Network (CDN) is a method for delivering Content from a central server to an edge server close to a user, so as to implement distributed near-access to the Content. A nearby content delivery network node (CDN node) refers to a node closest in logical distance and/or physical distance between the CDN node and the terminal. In practical application, the geographical location information and the operator information corresponding to the IP Address can be obtained by analyzing the IP (Internet Protocol Address) Address of the CDN node, and based on the obtained geographical location information and operator information, a CDN node having the same operator (close logical distance) as the client of the account management application is preferentially selected, and then a CDN node in the same operator in the same area (close physical distance) is selected. By storing the risk account, the corresponding account identification code and the authentication information in a content distribution network in an associated manner, the acquisition speed of the authentication information can be effectively increased, and the freezing efficiency of account freezing is improved.
And S208, verifying the user information collected by the identity verification page according to the identity verification information.
Specifically, when the risk account number is matched with the verification account number, the terminal can further verify the identity of the second target object initiating the account number freezing operation for the risk account number according to the identity verification information and the user information, so that the account number is frozen only when the identity verification is passed, and thus, the security of account number freezing is improved.
In an embodiment, the user information collected by the authentication page may specifically be a text or an image input to the authentication page by a user through an input device, may also be a user image or a user video of the second target object collected by the authentication page calling the image collecting device, and may also be a user voice collected by the authentication page calling the recording device, which is not limited in this embodiment of the application. The user image or the user video may specifically be a face image or a face video.
In one embodiment, when entering the authentication page, the user may input corresponding user information according to the prompt information in the authentication page, and the terminal authenticates the user information according to the authentication information. For example, in the process of generating the account identification code, the user may set a corresponding question and an answer corresponding to the question according to the identity of the user, so that the terminal stores the question and the answer set by the user as authentication information. When the account number is frozen, the terminal extracts the question in the authentication information, displays the question as prompt information in the authentication page, so that the user inputs corresponding user information according to the prompt information, namely inputs an answer corresponding to the question, and the terminal performs consistency verification on the answer input by the user and the answer in the authentication information.
In one embodiment, the identity verification information may specifically be biometric verification information. For example, the identity verification information may include a face feature or an iris feature reflecting facial movements, may also include a fingerprint feature, a palm print feature or a handwriting feature reflecting limb movements, and may also include a voiceprint feature reflecting voice movements. The embodiments of the present application do not limit this. Accordingly, in this case, the user information collected through the authentication page may specifically be information such as a face image, an iris image, a user fingerprint, or a user voice, and the terminal may authenticate the user information according to the corresponding authentication information.
And step S210, jumping to an account freezing page when the verification is passed, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
Specifically, when the identity verification information is matched with the user information, the terminal acquires a page link of the account freezing page and jumps from the identity verification page to the account freezing page according to the page link of the account freezing page. Referring to fig. 4, as shown in fig. 4, the account freezing page includes a frozen account control 401, and when it is determined that the frozen account control 401 is triggered by the user, the terminal correspondingly generates a freezing instruction, and freezes the risk account according to the freezing instruction. FIG. 4 shows a schematic diagram of an account freeze page in one embodiment. The triggering operation may be specifically a touch operation, a cursor operation, a key operation, or a voice operation. The touch operation can be touch click operation, touch press operation or touch slide operation, and the touch operation can be single-point touch operation or multi-point touch operation; the cursor operation can be an operation of controlling a cursor to click or an operation of controlling the cursor to press; the key operation may be a virtual key operation or a physical key operation, etc.
In one embodiment, as shown in fig. 4, the account frozen page further includes a unfreezing account control 402, based on which unfreezing account control 402, the frozen at risk account can be unfrozen. When the risk account needs to be unfrozen, a user can sequentially input a risk account to be unfrozen, an account identification code corresponding to the risk account to be unfrozen and user information according to the account freezing steps, and whether an account frozen page is displayed or not is judged by the terminal according to the risk account to be unfrozen, the account identification code corresponding to the risk account to be unfrozen and the user information input by the user, so that when the account frozen page of the risk account to be unfrozen is correspondingly displayed by the terminal, the user can unfreeze the risk account to be unfrozen through an account control in the account frozen page.
In one embodiment, when the risk account is in the frozen state, only the risk account in the frozen state can be checked, and operations such as addition, deletion, modification and the like cannot be performed on the risk account. When the risk account is in the unfreezing state, the risk account in the unfreezing state can be checked, and operations such as adding, deleting, modifying and the like can be performed on the risk account.
In one embodiment, when the terminal determines that the user information is identical to the authentication information, it may be determined that the user information is authenticated. Or, the terminal may further compare the matching degree of the user information and the authentication information, and when the matching degree exceeds a preset threshold, it is determined that the user information is authenticated. Of course, the terminal may also compare the user information with the authentication information in other manners to determine whether the user information passes the authentication, which is not limited in this embodiment of the present application.
In the account freezing method, when the risk account and the account identification code are obtained, the account identification code can be analyzed to obtain a verification account for assisting account verification; when the verification account is obtained, the risk account can be verified based on the verification account, and the identity verification page is correspondingly displayed when the verification passes, so that the security of account freezing is improved; when the identity authentication information associated with the risk account is obtained and the user information is obtained through the identity authentication page, the user information can be further authenticated based on the identity authentication information, and the account freezing page is correspondingly displayed when the user information is also authenticated, so that the security of account freezing is further improved. Because the account freezing method does not depend on the bound mobile phone number, compared with the traditional method of freezing the account based on the bound mobile phone number, the account freezing method can effectively improve the safety of account freezing. And an account identification code corresponding to the user and the risk account is used as an entry, and an identity authentication mode is adopted, so that the unique information can be authenticated by the user on any equipment, the account can be quickly frozen, and the operation efficiency is improved on the premise of ensuring the security of account freezing.
In one embodiment, the account management application may also be configured to generate an account identification code; the generation step of the account identification code comprises the following steps: acquiring a verification account of an account identification code to be generated; determining authentication information associated with the authentication account number; generating a target link corresponding to the verification account according to the verification account, the identity verification information and a preset page link of the identity verification page; and coding the target link to obtain an account identification code of the verification account.
Specifically, the terminal may obtain, through the account management application, an account name of a verification account to be generated with the account identification code input by the user, and an account password corresponding to the account name of the verification account. And when the account name is matched with the account password, the terminal displays the identity information acquisition page and acquires the identity verification information which is input by the user and is associated with the verification account through the identity information acquisition page.
Further, the terminal acquires a page link of a preset authentication page, and splices the page link, the account name of the authentication account, the account password and the authentication information to obtain a target link corresponding to the authentication account. Meanwhile, the terminal encodes the target link according to a preset rule to obtain an account identification code of the verification account. It is easy to understand that when the number of the identity verification pages is multiple, a developer can select a target identity verification page from the multiple identity verification pages according to requirements, so that the terminal generates the account identification code according to the page link of the target identity verification page selected by the developer.
In one embodiment, in order to ensure that the password of the verification account is not revealed, the account identification code may be generated based on only the account name of the verification account, the authentication information, and the page link of the authentication page.
In one embodiment, as shown in fig. 4, when the account id is generated, the terminal may correspondingly display the account id in an account freeze page.
In one embodiment, as shown in fig. 4, the account freeze page further includes a control to save the account identification code to the local, for example, to local control 403. When determining that the user triggers to save to the local control 403, the terminal converts the account identification code displayed in the account frozen page into a picture, and saves the converted picture to the local.
In one embodiment, the terminal may splice the page link, the verification account and the identity verification information based on a preset symbol to obtain a target link corresponding to the verification account. Wherein the preset symbol includes "/", "_", "? ", or" & "and the like. For example, when the page link of the identity verification page is "www.abc.com", the account name "id" of the verification account is "zhangsan", the account password "is" 123 ", and the authentication information" test "is the identity number" 3622 "of the user who registers the verification account, the target link obtained by splicing according to the preset symbol may be" www.abc.com? And id is zhangsan & passswerd 123& test 3622 ".
In one embodiment, when the account identification code is a two-dimensional code, in order to improve the display effect of the two-dimensional code, the target link may be converted into a short link, and the target link and the converted short link are stored in the terminal in an associated manner, so that when the user needs to jump to the authentication page, the user can obtain the target link through the short link and enter the authentication page according to the target link. During storage, the storage may be performed according to a key-value pair, where the target link is used as a key (key) in the key-value pair, and the short link is used as a value (value) in the key-value pair.
The short link is required to be shorter than the target link, so that the length of the data code generated based on the short link is shorter than the length of the data code generated based on the target link, and the number of pixels in the two-dimensional code generated based on the data code corresponding to the short link is smaller than the number of pixels in the two-dimensional code generated based on the data code corresponding to the target link.
In the embodiment, the account identification code is generated in advance, the risk account can be subjected to auxiliary verification based on the account identification code, and the user is allowed to perform identity verification after the verification is passed, so that the security of account freezing is greatly improved.
In one embodiment, when an account obtained by analyzing an account identification code matches a risk account, entering a corresponding authentication page according to the account identification code includes: analyzing the account number identification code to obtain a verification account number corresponding to the account number identification code and a page link of an identity verification page to be entered; and when the verification account number is matched with the risk account number, entering a corresponding identity verification page according to the page link.
Specifically, when the account identification code is obtained, the terminal analyzes the account identification code according to a preset analysis rule to obtain a corresponding target link, and extracts a verification account and a page link of an authentication page to be entered from the target link. For example, in the above example, when the terminal analyzes the account id, the obtained target link is "www.abc.com? When id is zhangsan & passswerd 123& test 3622 ", the terminal is according to the symbol? "the page link of the authentication page to be entered" www.abc.com is extracted, "and the account name" zhangsan "and the account password" 123 "of the authentication account are extracted according to the symbol" & "and the character" id ".
Further, the terminal matches the verification account with the risk account, and when the verification account is matched with the risk account, the terminal enters an identity verification page according to the page link. For example, when the account name of the verification account is consistent with the account name of the risk account, the terminal enters an identity verification page according to the page link. For another example, when the account name of the verification account is consistent with the account name of the risk account, and the account password of the verification account is timely compared with the account password of the risk account, the terminal enters the identity verification page according to the page link. For another example, although the verification account is inconsistent with the risky account, when the user with the verification account and the user with the risky account belong to the same person, the terminal enters the authentication page according to the page link. The present embodiment is not limited herein.
In the embodiment, when the verification account number is matched with the risk account number, the account number identification code is used as an entrance to enter the identity verification page, so that the security of account number freezing can be improved.
In one embodiment, verifying the user information collected by the authentication page according to the authentication information includes: acquiring user information acquired through an identity verification page; extracting a verification password in the identity verification information and a user password in the user information; carrying out consistency verification on the verification password and the user password; when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps: and when the password is verified to be consistent with the user password, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
The password refers to a character string used for assisting account authentication, and may specifically be composed of numbers, letters, and symbols. The identity authentication information comprises an authentication password, and the authentication password is a password which is set by a user according to the requirement of the user and is associated with the authentication account in the process of generating the account identification code of the authentication account. The user information includes a user password, which is a password associated with the risk account and input by the user in the process of freezing the account. It is easy to understand that, in the process of freezing an account, the user password input by the user and associated with the risky account may be a verification password set by the user according to the needs of the user in the process of generating the account identification code of the risky account.
Specifically, the identity verification page may be a password verification page configured to collect a user password and perform password verification on the user password. When the user password is acquired based on the password authentication page, the terminal carries out consistency authentication on the user password and the authentication password extracted from the identity authentication information. Referring to fig. 5, as shown in fig. 5, the password verification page includes a user password input box and a determination control, when it is confirmed that the user triggers the determination control, the terminal determines whether the user passwords input by the user twice are consistent, if yes, the terminal extracts the user password from the user password input box, and performs consistency determination on the user password and the verification password. FIG. 5 illustrates a password verification page in one embodiment.
The terminal judges whether the verification password is consistent with the user password according to preset judgment logic, when the verification password is consistent with the user password, the fact that a user initiating account freezing operation aiming at the risk account is probably the actual owner of the risk account is shown, at the moment, the terminal jumps to an account freezing page from an identity verification page, and freezes the risk account according to a freezing instruction triggered in the account freezing page. And when the verification password is inconsistent with the user password, the verification password indicates that the user initiating the freezing operation aiming at the risk account is not the actual owner of the risk account, and at the moment, the terminal pauses to jump to an account freezing page.
In one embodiment, when the authentication password is inconsistent with the user password, the terminal correspondingly displays prompt information such as 'user password error' on the authentication page so that the user can re-input the user password according to the prompt information.
In one embodiment, the terminal counts the times of inputting the user password by the user, and when the times of inputting the wrong user password by the user reaches a preset upper limit in a preset counting time period, the terminal prohibits the user from inputting the user password again.
In the embodiment, the consistency verification is carried out on the user password and the verification password, and the account freezing page is correspondingly displayed only when the user password and the verification password pass the verification, so that the security of account freezing can be improved.
In one embodiment, the authentication information includes a reference face image; the user information comprises a currently acquired user face image; according to the authentication information, the user information collected by the authentication page is authenticated, and the authentication method comprises the following steps: extracting a user face image from user information collected by an identity verification page; matching verification is carried out on the user face image and the reference face image; when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps: and when the face image of the user is matched with the verification face image, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
The user face image refers to a face image acquired by aiming at an object initiating an account freezing operation in the account freezing process. The reference face image is a face image used for verifying the face image of the user.
Specifically, the identity verification page may be a face image verification page for acquiring a face image of the user and performing face verification on the face image of the user. When the user face image and the reference face image are obtained, the terminal extracts the reference face features in the reference face image according to a preset face feature extraction strategy, extracts the user face features in the user face image, and performs feature matching on the extracted reference face features and the user face features. When the feature matching is successful, it is indicated that a second target object initiating an account freezing operation for the risky account may be an actual owner of the risky account, at this time, the terminal jumps to an account freezing page, and freezes the risky account according to a freezing instruction triggered on the account freezing page. And when the feature matching fails, the terminal pauses to jump to the account freezing page. The face features are data for reflecting the face features of the person. The face features may reflect one or more of gender of the person, contour of the face, hairstyle, glasses, nose, mouth, and distance between various facial organs.
In one embodiment, the terminal may invoke the image acquisition device according to a face detection instruction triggered in the identity acquisition page, and the invoked image acquisition device acquires the face image of the user according to the face detection instruction. For example, referring to fig. 6, as shown in fig. 6, the face image verification page includes a face image acquisition control, when the face image acquisition control is determined to be triggered, the terminal invokes an image acquisition device, acquires a face image of a user based on the image acquisition device, and verifies the acquired face image of the user and a reference image. FIG. 6 is a diagram that illustrates a face image verification page in one embodiment.
In one embodiment, when the identity verification information does not include the reference face image, the terminal pulls the corresponding reference face image from the docked public security system according to the risk account number, and performs matching verification on the pulled reference face image and the user face image.
In one embodiment, the facial features may include facial texture features. The facial texture features may reflect the depth of pixels in facial organs including nose, ears, eyebrows, cheeks, or lips. The facial texture features may include color value distributions and luminance value distributions of pixels of the facial image.
In one embodiment, the preset human face feature extraction strategy may be a preset image feature extraction algorithm or a pre-trained feature extraction machine learning model. The feature extraction machine learning model can have the face feature extraction capability through sample learning. The machine learning model may adopt a neural network model, a dual path network model (DPN), a support vector machine, a logistic regression model, or the like.
In the embodiment, the confidence level of the determination result that the second target object initiating the operation of freezing the risk account and the actual owner of the risk account are determined as the same user can be improved by performing matching verification on the face image of the user and the reference face image, so that the security of account freezing is improved.
In one embodiment, the user information further comprises a live detection video, wherein the live detection video is obtained by collecting user actions in response to a live detection instruction triggered by the authentication page; the living body detection instruction includes action guide information; the account freezing method further comprises the following steps: determining user characteristic points which respectively appear in each image frame of a living body detection video; determining various user actions corresponding to the living body detection video based on the user characteristic points respectively appearing in the image frames; performing matching verification on various user actions based on the action guide information; when the face image of the user is matched with the verification face image, jumping to an account freezing page, and freezing a risk account according to a freezing instruction triggered in the account freezing page, wherein the method comprises the following steps: and when the user face image is matched with the verification face image and the user action is matched with the action guide information, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
The action guide information refers to text, pictures, audio or video information for prompting the user to make a corresponding action.
Specifically, the identity verification page may specifically be a liveness detection page used for liveness verification. When identity authentication is required, a user can enter a living body detection page by triggering the living body detection control, so that the terminal generates a living body detection instruction according to the triggering operation of the user and displays action guide information on the living body detection page. Furthermore, the terminal calls the image acquisition equipment according to the living body detection instruction, and the image acquisition equipment acquires interaction action information performed by the user according to the action guide information to obtain a living body detection video. For example, referring to fig. 7, as shown in fig. 7, the in-vivo detection page includes a confirmation control, and when the confirmation control is determined to be triggered, the terminal generates and displays the action guidance information, and invokes the image capture device to capture the action of the user, so as to obtain the in-vivo detection video. FIG. 7 shows a schematic diagram of a liveness detection page in one embodiment.
The terminal identifies user characteristic points appearing in each image frame of the living body detection video respectively, and determines various actions corresponding to the living body detection video according to the user characteristic points appearing in each image frame respectively. The user feature point is a feature point which is obtained by performing key point identification on an image frame in a living body detection video and is used for determining the action type of a user action. Taking a user action as a gesture action as an example, the terminal divides a gesture area from each image frame, determines the positions of skeleton nodes of the gesture in the gesture area, determines user feature points according to the preset position relation between the skeleton nodes, and identifies a gesture formed by the skeleton nodes according to the user feature points, so as to determine the user action corresponding to the gesture.
Further, the terminal determines the action type of the user action, and judges whether the action type of the user action belongs to the target action type corresponding to the action guide information according to preset judgment logic. If yes, the terminal judges that the user action is matched with the action guide information, jumps to an account freezing page, and freezes the risk account according to a freezing instruction triggered in the account freezing page. If not, the terminal refuses to jump to the account freezing page.
In one embodiment, the terminal may extract a face image including a front face of the user from the live body detection video, and perform matching verification on the extracted face image as the face image of the user and a reference face image. And when the user face image is matched with the verification face image and the user action is matched with the action guide information, jumping to an account freezing page.
In one embodiment, a developer of the account management application can set different authentication strategies according to the importance degree of the risk account, so that when the risk account needs to be frozen, a user needs to perform authentication according to the different authentication strategies preset by the developer. For example, when the risky account is an important account, the user needs to perform password authentication, face authentication and liveness authentication, and the risky account on the page can be frozen based on the account when the password authentication, the face authentication and the liveness authentication are passed. For another example, when the risky account is a secondary account, the user can freeze the risky account only by performing password verification. By setting different identity authentication strategies for different risk account numbers, the efficiency of account number freezing can be improved on the premise of ensuring the security of account number freezing. It is easily understood that the authentication order of the password authentication, the face authentication, and the living body authentication can be freely set as required.
In the embodiment, the confidence level of the judgment result of the living body of the user who initiates the operation of freezing the risk account number can be improved by detecting the living body of the user, so that the safety of account number freezing is improved.
In one embodiment, the account freezing method further includes: when a viewing instruction of the risk account in the frozen state is received, displaying corresponding account content in response to the viewing instruction; when a target operation instruction of the risk account in the frozen state is received, shielding the target operation instruction, and not responding to a target operation pointed by the target operation instruction; wherein the target operation comprises a modification operation of at least one function of a social function, a resource transfer function, a setting function and the like.
Specifically, in order to improve the safety of the frozen risk account, when a check instruction of the frozen risk account is received, the terminal acquires the account content of the risk account according to the check instruction and correspondingly displays the account content; when a target operation instruction of the risk account in the frozen state is received, the terminal shields the target operation instruction and does not respond to modification operation which is pointed by the target operation instruction and comprises at least one function of a social function, a resource transfer function, a setting function and the like. The modification operation specifically includes at least one of addition, deletion and the like.
In the embodiment, the target operation instruction of the risk account in the frozen state is shielded by responding to the viewing instruction of the risk account in the frozen state, so that the safety of the frozen risk account can be improved.
In one embodiment, the account freezing method further includes: when a sharing instruction for the account identification code occurs, determining that at least one sharing object is carried in the sharing instruction; and sending the account identification code to the sharing object.
In particular, the account freeze page may display a control for generating a sharing instruction, e.g., send to friend control 404 as shown in fig. 4. The user can trigger the control to generate a sharing instruction, and the terminal acquires the sharing instruction and correspondingly displays a sharing object selection page through the sharing instruction. The sharing object selection interface displays sharing objects which can be selected by users. Further, when the user selects at least one sharing object through the target sharing object selection page, the terminal acquires the account identification code to be shared and sends the account identification code to be shared to the sharing object.
In the embodiment, after the sharing object is determined, the account identification code can be directly sent to the sharing object, so that the sharing operation is simplified, and the sharing efficiency of the account identification code is improved.
In one embodiment, determining authentication information associated with the authentication account number includes: displaying an identity information acquisition page; when the authentication password is acquired through the identity information acquisition page, the authentication password is used as identity authentication information and is bound with the authentication account; and when the reference face image is acquired through the identity information acquisition page, binding the reference face image serving as identity authentication information with the authentication account number.
Specifically, in the process of generating the account identification code of the verification account, when the user inputs the verification password through the identity information acquisition page, the terminal takes the verification password input by the user as identity verification information and binds the verification password with the verification account. For example, referring to fig. 8, a user may input an authentication password through the identity information acquisition page shown in fig. 8, and when the authentication passwords input by the user twice consecutively are consistent and the input authentication passwords conform to a preset password rule, use the authentication password as the identity authentication information. When the user uploads the reference face image through the identity information acquisition page, the terminal takes the reference face image uploaded by the user as identity authentication information and binds the identity authentication information with an authentication account. For example, a user can upload a reference face image through an identity information acquisition page, so that the terminal performs image detection on the reference face image uploaded by the user, and when a detection result meets a preset detection condition, the reference face image is used as identity authentication information. FIG. 8 illustrates a schematic diagram of an identity information collection page in one embodiment.
In a real-time example, when the authentication password input by the user does not conform to the preset password rule, the terminal stops binding the authentication password as the identity authentication information with the authentication account. The preset password rule can be freely set according to the requirement. For example, as shown in fig. 8, in order to improve the security of the password, the preset password rule may be "the password for verifying the password needs to be longer than 8 characters, shorter than 256 characters, and composed of any one or more of letters, numbers, and characters".
In one embodiment, a user can freely select whether to upload a reference face image, when the user does not upload the reference face image through an identity information acquisition page, the terminal pulls the reference face image from a docked public security system, and correspondingly stores the pulled reference face image.
In one embodiment, when the reference facial image bound with the verification account includes the reference facial image, the terminal determines the storage address of the reference facial image and generates the target link based on the storage address of the reference facial image. For example, when the page link of the identity verification page is "www.abc.com", the verification account "id" is "zhangsan", the account password "is" 123 ", and the storage address" add "of the reference face image is" dizhi/123 ", the target link obtained by splicing according to the preset symbol may be" www.abc.com? And id is zhangsan & passswerd 123& add is dizhi/123 ".
In the embodiment, when the identity authentication information is set, the user only needs to provide the authentication password and/or the reference face image, and the terminal can automatically authenticate the user password and/or the user face image according to the authentication password and/or the reference face image, so that the setting efficiency of the identity authentication information is improved.
In one embodiment, before generating a target link corresponding to a verification account according to the verification account, an account password corresponding to the verification account, and identity verification information, the account freezing method further includes: when the verification account is not subjected to real-name authentication, acquiring real-name authentication information associated with the verification account, and verifying the real-name authentication information; after the real-name authentication information passes verification, performing living body detection on a target object initiating an account identification code generation operation; and when the target object is detected to be a living body, executing a step of generating a target link corresponding to the verification account according to the verification account, the authentication information and a preset page link of the authentication page.
Specifically, before generating the target link, the terminal may query whether the verification account associated with the target link has been subjected to real-name authentication, and if not, the terminal correspondingly displays a real-name authentication page, so that the user inputs real-name authentication information through the real-name authentication page. The real-name authentication information may specifically include an identification number of the user, a bank card number, and the like. Further, the terminal verifies the real-name authentication information input by the user, performs living body detection on a first target object initiating an account identification code generation operation after the verification is passed, and generates a target link corresponding to the verification account when the first target object is detected to be a living body. In one embodiment, the terminal may send the real-name authentication information to a third-party real-name authentication system, and the third-party real-name authentication system verifies the real-name authentication information.
In the embodiment, the real-name authentication is performed on the verification account of the target link to be generated, so that the security of generating the target link can be improved, and the security of freezing the account is further improved.
In one embodiment, the account freezing method further includes: triggering a reset instruction of the identity authentication information through the identity information acquisition page; in response to the reset instruction, acquiring reset identity authentication information through an identity information acquisition page; setting the account identification code generated in the previous time in an invalid state, and regenerating a target link corresponding to the verification account according to the verification account, the page link of the authentication page and the reset authentication information; and coding the regenerated target link to obtain the reset account identification code of the verification account.
Specifically, in order to facilitate the user to modify the authentication information, the identity information collection page further includes a reset control for resetting the authentication information. The user can trigger the reset control to generate a reset instruction, so that the terminal collects the authentication information input again by the user according to the reset instruction. Further, the terminal sets the identity authentication information generated last time as invalid, and generates the account identification code after reset according to the generation step of the account identification code.
In the embodiment, the identity authentication information is reset by supporting, so that the change requirement of the user for changing the identity information can be met, the flexibility is strong, and the user experience can be improved.
To facilitate understanding by those skilled in the art, a specific flow chart of account freezing is provided as shown in fig. 9. When the account management application is opened, a user can input a risk account based on an account information acquisition page in the account management application, wherein the risk account comprises an account name and a corresponding account password, so that when the account name and the account password of the risk account are determined to be matched, the terminal checks the risk account input by the user, determines whether a generation record for generating an account identification code corresponding to the risk account exists, namely determines whether the user applies for the account identification code of the wind direction account in advance. If the account identification code of the risk account is applied in advance, the terminal displays corresponding prompt information so that a user can input the account identification code, and when the account obtained by analyzing the account identification code is matched with the risk account, the user enters an identity verification page according to the account identification code. The terminal determines identity verification information associated with the risk account, acquires user information through an identity verification page, jumps to an account freezing page when the identity verification information is matched with the user information, and freezes the risk account according to a freezing instruction triggered in the account freezing page.
When the account identification code of the risk account is not applied in advance, the terminal jumps to an identity information acquisition page, acquires identity verification information through the identity information acquisition page, and generates the account identification code of the risk account according to the risk account, the identity verification information and a preset page link of the identity verification page input by a user.
In a specific embodiment, as shown in fig. 10, the account freezing method provided by the present application includes the following steps:
s1002, when the account management sub-application is started through the parent application, displaying an account information acquisition page through the account management sub-application; the account management sub-application is an application that runs in a running environment provided by the parent application.
And S1004, analyzing the account number identification code to obtain a verification account number corresponding to the account number identification code and a page link of the identity verification page to be entered.
And S1006, when the verification account number is matched with the risk account number, entering a corresponding identity verification page according to the page link.
S1008, the identity authentication information corresponding to the account number identification code is determined, and the user information collected through the identity authentication page is obtained.
S1010, extracting the authentication password in the identity authentication information and the user password in the user information.
S1012, consistency verification is carried out on the verification password and the user password.
And S1014, when the verification password is consistent with the user password, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
S1016, the identity authentication information comprises a reference face image; the user information comprises a currently acquired user face image; extracting a user face image from user information collected by an identity verification page;
and S1018, performing matching verification on the user face image and the reference face image.
S1020, when the face image of the user is matched with the verification face image, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
S1022, determining user characteristic points respectively appearing in each image frame of the living body detection video in the user information; and determining various user actions corresponding to the living body detection video based on the user characteristic points respectively appearing in the image frames.
And S1024, performing matching verification on various user actions based on the action guide information.
And S1026, when the user action is matched with the action guide information, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
S1028, when a viewing instruction of the risk account in the frozen state is received, displaying corresponding account content in response to the viewing instruction.
S1030, shielding the target operation instruction when the target operation instruction of the risk account in the frozen state is received, and not responding to the target operation pointed by the target operation instruction; wherein the target operation comprises a modification operation of at least one function of a social function, a resource transfer function, a setting function and the like.
S1032, when a sharing instruction for the account identification code occurs, determining at least one sharing object carried in the sharing instruction; and sending the account identification code to the sharing object.
In the account freezing method, when the risk account and the account identification code are obtained, the account identification code can be analyzed to obtain a verification account for assisting account verification; when the verification account is obtained, the risk account can be verified based on the verification account, and the identity verification page is correspondingly displayed when the verification passes, so that the security of account freezing is improved; when the identity authentication information associated with the risk account is obtained and the user information is obtained through the identity authentication page, the user information can be further authenticated based on the identity authentication information, and the account freezing page is correspondingly displayed when the user information is also authenticated, so that the security of account freezing is further improved. Because the account freezing method does not depend on the bound mobile phone number, compared with the traditional method of freezing the account based on the bound mobile phone number, the account freezing method can effectively improve the safety of account freezing. And an account identification code corresponding to the user and the risk account is used as an entry, and an identity authentication mode is adopted, so that the unique information can be authenticated by the user on any equipment, the account can be quickly frozen, and the operation efficiency is improved on the premise of ensuring the security of account freezing.
In another specific embodiment, as shown in fig. 11, the account freezing method provided by the present application includes the following steps:
and S1102, acquiring a verification account of the account identification code to be generated.
And S1104, displaying an identity information acquisition page.
And S1106, binding the verification password as identity verification information with a verification account when the verification password is acquired through the identity information acquisition page.
And S1108, when the reference face image is acquired through the identity information acquisition page, binding the reference face image serving as identity authentication information with the authentication account.
S1110, when the verification account is not subjected to the real-name authentication, acquiring real-name authentication information associated with the verification account, and verifying the real-name authentication information.
And S1112, after the real-name authentication information passes verification, performing living body detection on the target object initiating the account identification code generation operation.
S1114, when the target object is detected to be a living body, generating a target link corresponding to the verification account according to the verification account, the identity verification information and a preset page link of the identity verification page; and coding the target link to obtain an account identification code of the verification account.
S1116, a reset instruction for the authentication information is triggered through the identity information collection page.
S1118, responding to the reset instruction, and acquiring the reset identity authentication information through the identity information acquisition page.
S1120, the account identification code generated in the previous time is placed in an invalid state, and a target link corresponding to the verification account is regenerated according to the verification account, the page link of the authentication page and the reset authentication information; and coding the regenerated target link to obtain the reset account identification code of the verification account.
And S1122, acquiring the risk account and the account identification code for secondary account verification.
And S1124, when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code.
And S1126, determining the identity verification information corresponding to the account number identification code.
S1128, verifying the user information collected by the identity verification page according to the identity verification information.
S1130, when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
The application also provides an application scene, and the account freezing method is applied to the application scene. Specifically, the application of the account freezing method in the application scenario is as follows:
when an account identification code of a risk account A for logging in the instant messaging application A needs to be applied, a user can start an account management sub-application and input an account name and an account password of the risk account A based on the account management sub-application. The account management sub-application judges whether the instant messaging application can be logged in based on the account name and the account password input by the user, and correspondingly displays the identity information acquisition page when the logging is successful so that the user can input identity authentication information, such as an authentication password, through the identity information acquisition page. Meanwhile, the account management sub-application generates an account identification code corresponding to the A risk account according to the A risk account, the authentication information and a preset page link of an authentication page.
When the A risk account needs to be frozen, the user starts the account management sub-application, and inputs the account name and the account password of the A risk account based on the account management sub-application. The account management sub-application judges whether the instant messaging application can be logged in based on the account name and the account password input by the user, and correspondingly displays an identity verification page when the logging is successful so that the user can input user information, such as a user password, through the identity information acquisition page. The account management sub-application verifies the identity verification information and the user information, jumps to an account freezing page when the verification is passed, and freezes the A risk account according to a freezing instruction triggered in the account freezing page.
It should be understood that although the various steps in the flowcharts of fig. 2, 10 and 11 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2, 10 and 11 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps or stages.
In one embodiment, as shown in fig. 12, there is provided an account freezing apparatus 1200, which may be a part of a computer device using a software module or a hardware module, or a combination of the two modules, and specifically includes: an account verification module 1202, an identity verification module 1204, and a freeze module 1206, wherein:
an account verification module 1202, configured to obtain a risk account and an account identification code for secondary account verification; and when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code.
An identity authentication module 1204, configured to determine identity authentication information corresponding to the account identification code; and verifying the user information collected by the identity verification page according to the identity verification information.
And the freezing module 1206 is used for jumping to an account freezing page when the verification is passed, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, as shown in fig. 13, the account verification module 1202 is further configured to, when the account management sub-application is started by the parent application, expose an account information collection page by the account management sub-application; the account management sub-application is an application running in a running environment provided by the parent application; and acquiring the input risk account and an account identification code for assisting account verification based on the account information acquisition page.
In one embodiment, the account verification module 1202 is further configured to analyze the account identification code to obtain a verification account corresponding to the account identification code and a page link of an identity verification page to be entered; and when the verification account number is matched with the risk account number, entering a corresponding identity verification page according to the page link.
In one embodiment, the authentication module 1204 further includes a password authentication module 1241 for acquiring user information collected through an authentication page; extracting a verification password in the identity verification information and a user password in the user information; carrying out consistency verification on the verification password and the user password; when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps: and when the password is verified to be consistent with the user password, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, the identity module 1204 further includes a face image verification module 1242, configured to extract a face image of the user from the user information collected by the identity verification page; matching verification is carried out on the user face image and the reference face image; when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps: and when the face image of the user is matched with the verification face image, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, the face image verification module 1242 is further configured to determine user feature points respectively appearing in each image frame of the live detection video; determining various user actions corresponding to the living body detection video based on the user characteristic points respectively appearing in the image frames; performing matching verification on various user actions based on the action guide information; when the face image of the user is matched with the verification face image, jumping to an account freezing page, and freezing a risk account according to a freezing instruction triggered in the account freezing page, wherein the method comprises the following steps: and when the user face image is matched with the verification face image and the user action is matched with the action guide information, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
In one embodiment, the account freezing apparatus 1200 is further configured to, when receiving a viewing instruction for the risky account in the frozen state, display corresponding account content in response to the viewing instruction; when a target operation instruction of the risk account in the frozen state is received, shielding the target operation instruction, and not responding to a target operation pointed by the target operation instruction; wherein the target operation comprises a modification operation of at least one function of a social function, a resource transfer function, a setting function and the like.
In one embodiment, the account freezing apparatus 1200 is further configured to, when a sharing instruction for the account identification code occurs, determine at least one sharing object carried in the sharing instruction; and sending the account identification code to the sharing object.
In one embodiment, the account freezing apparatus 1200 further includes an account identification code generation module 1208, configured to obtain a verification account of the account identification code to be generated; determining authentication information associated with the authentication account number; generating a target link corresponding to the verification account according to the verification account, the identity verification information and a preset page link of the identity verification page; and coding the target link to obtain an account identification code of the verification account.
In one embodiment, the account id generation module 1208 is further configured to display an identity information collection page; when the authentication password is acquired through the identity information acquisition page, the authentication password is used as identity authentication information and is bound with the authentication account; and when the reference face image is acquired through the identity information acquisition page, binding the reference face image serving as identity authentication information with the authentication account number.
In one embodiment, the account id generation module 1208 is further configured to, when the verification account is not authenticated by the real-name authentication, obtain real-name authentication information associated with the verification account, and verify the real-name authentication information; after the real-name authentication information passes verification, performing living body detection on a target object initiating an account identification code generation operation; and when the target object is detected to be a living body, executing a step of generating a target link corresponding to the verification account according to the verification account, the authentication information and a preset page link of the authentication page.
In one embodiment, the account id generation module 1208 is further configured to trigger a reset instruction for the authentication information through the identity information collection page; responding to the reset instruction, and acquiring reset identity authentication information through an identity information acquisition page; setting the account identification code generated in the previous time in an invalid state, and regenerating a target link corresponding to the verification account according to the verification account, the page link of the authentication page and the reset authentication information; and coding the regenerated target link to obtain the reset account identification code of the verification account.
For specific limitations of the account freezing device, reference may be made to the above limitations on the account freezing method, which is not described herein again. All or part of the modules in the account freezing device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 14. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an account freezing method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 14 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer-readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the steps in the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (15)

1. An account freezing method is characterized by comprising the following steps:
acquiring a risk account and an account identification code for verifying an auxiliary account;
when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code;
determining identity verification information corresponding to the account identification code;
verifying the user information collected by the identity verification page according to the identity verification information;
and when the verification is passed, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
2. The method of claim 1, wherein obtaining the account identifier for the secondary account verification and the account identifier for the at risk account comprises:
when an account management sub-application is started through a parent application, an account information acquisition page is displayed through the account management sub-application; the account management sub-application is an application running in a running environment provided by the parent application;
and acquiring the input risk account and an account identification code for assisting account verification based on the account information acquisition page.
3. The method according to claim 1, wherein when the account obtained by analyzing the account identification code matches the risky account, entering a corresponding authentication page according to the account identification code comprises:
analyzing the account identification code to obtain a verification account corresponding to the account identification code and a page link of an identity verification page to be entered;
and when the verification account number is matched with the risk account number, entering the corresponding identity verification page according to the page link.
4. The method according to claim 1, wherein the verifying the user information collected by the authentication page according to the authentication information comprises:
acquiring user information acquired through the identity verification page;
extracting a verification password in the identity verification information and a user password in the user information;
carrying out consistency verification on the verification password and the user password;
the step of jumping to an account freezing page when the verification is passed, and the step of freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps:
and when the verification password is consistent with the user password, jumping to the account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
5. The method of claim 1, wherein the authentication information comprises a reference face image; the user information comprises a currently acquired user face image; the verifying the user information collected by the identity verification page according to the identity verification information comprises the following steps:
extracting a user face image from the user information collected by the identity verification page;
matching verification is carried out on the user face image and the reference face image;
the step of jumping to an account freezing page when the verification is passed, and the step of freezing the risk account according to a freezing instruction triggered in the account freezing page comprises the following steps:
and when the user face image is matched with the verification face image, jumping to the account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
6. The method of claim 5, wherein the user information further comprises a liveness detection video, the liveness detection video being obtained by capturing user actions in response to liveness detection instructions triggered by the authentication page; the living body detection instruction includes action guide information; the method further comprises the following steps:
determining user feature points which respectively appear in each image frame of the living body detection video;
determining various user actions corresponding to the living body detection video based on user feature points respectively appearing in each image frame;
performing matching verification on various user actions based on the action guide information;
when the user face image is matched with the verification face image, jumping to an account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page, wherein the steps of:
and when the user face image is matched with the verification face image and the user action is matched with the action guide information, jumping to the account freezing page, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
7. The method of claim 1, further comprising:
when a viewing instruction of the risk account in the frozen state is received, displaying corresponding account content in response to the viewing instruction;
when a target operation instruction of the risk account in the frozen state is received, shielding the target operation instruction, and not responding to a target operation pointed by the target operation instruction; wherein the target operation comprises a modification operation of at least one function of a social function, a resource transfer function, a setting function and the like.
8. The method of claim 1, further comprising:
when a sharing instruction for the account identification code occurs, determining at least one sharing object carried in the sharing instruction;
and sending the account identification code to the sharing object.
9. The method according to any one of claims 1 to 8, further comprising:
acquiring a verification account of an account identification code to be generated;
determining authentication information associated with the authentication account number;
generating a target link corresponding to the verification account according to the verification account, the identity verification information and a preset page link of an identity verification page;
and coding the target link to obtain an account identification code of the verification account.
10. The method of claim 9, wherein determining authentication information associated with the authentication account number comprises:
displaying an identity information acquisition page;
when a verification password is acquired through the identity information acquisition page, the verification password is used as identity verification information and is bound with the verification account number;
and when a reference face image is acquired through the identity information acquisition page, binding the reference face image serving as identity authentication information with the authentication account.
11. The method according to claim 9, wherein before generating the target link corresponding to the verification account according to the verification account, the authentication information, and a preset page link of the authentication page, the method further comprises:
when the verification account number is not subjected to real-name authentication, acquiring real-name authentication information associated with the verification account number, and verifying the real-name authentication information;
after the real-name authentication information passes verification, performing living body detection on a target object initiating an account identification code generation operation;
and when the target object is detected to be a living body, executing the step of generating a target link corresponding to the verification account according to the verification account, the identity verification information and a preset page link of the identity verification page.
12. The method of claim 9, further comprising:
triggering a reset instruction of the identity authentication information through an identity information acquisition page;
responding to the reset instruction, and acquiring reset identity authentication information through the identity information acquisition page;
setting the account identification code generated in the previous time in an invalid state, and regenerating a target link corresponding to the verification account according to the verification account, the page link of the authentication page and the reset authentication information;
and coding the regenerated target link to obtain the reset account identification code of the verification account.
13. An account freezing apparatus, comprising:
the account verification module is used for acquiring a risk account and an account identification code for assisting account verification; when the account obtained by analyzing the account identification code is matched with the risk account, entering a corresponding identity verification page according to the account identification code;
the identity authentication module is used for determining identity authentication information corresponding to the account identification code; verifying the user information collected by the identity verification page according to the identity verification information;
and the freezing module is used for jumping to an account freezing page when the verification is passed, and freezing the risk account according to a freezing instruction triggered in the account freezing page.
14. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 12.
15. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 12.
CN202010829203.7A 2020-08-18 2020-08-18 Account freezing method, account freezing device, computer equipment and storage medium Active CN111898107B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010829203.7A CN111898107B (en) 2020-08-18 2020-08-18 Account freezing method, account freezing device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010829203.7A CN111898107B (en) 2020-08-18 2020-08-18 Account freezing method, account freezing device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111898107A true CN111898107A (en) 2020-11-06
CN111898107B CN111898107B (en) 2024-06-07

Family

ID=73230132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010829203.7A Active CN111898107B (en) 2020-08-18 2020-08-18 Account freezing method, account freezing device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111898107B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948358A (en) * 2021-03-18 2021-06-11 上海能链众合科技有限公司 On-chain ice seal meter maintenance method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014015707A1 (en) * 2012-07-27 2014-01-30 Tencent Technology (Shenzhen) Company Limited Online user account login method and server system implementing the method
WO2014040479A1 (en) * 2012-09-12 2014-03-20 中兴通讯股份有限公司 User identity authenticating method and device for preventing malicious harassment
KR20150129477A (en) * 2014-05-12 2015-11-20 주식회사 한국인터넷기술원 Method and apparatus of authenticating an user
CN105431843A (en) * 2013-07-05 2016-03-23 林仲宇 Network identity authentication using communication device identification code
CN105763520A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Network account password recovery method and device, client terminal device and server
CN109191112A (en) * 2018-07-16 2019-01-11 阿里巴巴集团控股有限公司 Auth method and device
JP2020061095A (en) * 2018-10-12 2020-04-16 Japan Digital Design株式会社 System for providing user with account related service

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014015707A1 (en) * 2012-07-27 2014-01-30 Tencent Technology (Shenzhen) Company Limited Online user account login method and server system implementing the method
WO2014040479A1 (en) * 2012-09-12 2014-03-20 中兴通讯股份有限公司 User identity authenticating method and device for preventing malicious harassment
CN105431843A (en) * 2013-07-05 2016-03-23 林仲宇 Network identity authentication using communication device identification code
KR20150129477A (en) * 2014-05-12 2015-11-20 주식회사 한국인터넷기술원 Method and apparatus of authenticating an user
CN105763520A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Network account password recovery method and device, client terminal device and server
CN109191112A (en) * 2018-07-16 2019-01-11 阿里巴巴集团控股有限公司 Auth method and device
JP2020061095A (en) * 2018-10-12 2020-04-16 Japan Digital Design株式会社 System for providing user with account related service

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948358A (en) * 2021-03-18 2021-06-11 上海能链众合科技有限公司 On-chain ice seal meter maintenance method
CN112948358B (en) * 2021-03-18 2024-05-28 上海零数众合信息科技有限公司 On-chain ice seal meter maintenance method

Also Published As

Publication number Publication date
CN111898107B (en) 2024-06-07

Similar Documents

Publication Publication Date Title
US10885306B2 (en) Living body detection method, system and non-transitory computer-readable recording medium
US9323912B2 (en) Method and system for multi-factor biometric authentication
US11188628B2 (en) Biometric challenge-response authentication
WO2021068616A1 (en) Method and device for identity authentication, computer device, and storage medium
CN111741033B (en) Method, device, equipment and medium for account number cross-equipment login management
CN112394864B (en) Information acquisition method and device, computer equipment and storage medium
CN110348193A (en) Verification method, device, equipment and storage medium
US20200184051A1 (en) Processing Authentication Requests to Secured Information Systems Using Machine-Learned User-Account Behavior Profiles
CN107786487B (en) Information authentication processing method, system and related equipment
CN111935349B (en) Terminal-based information display method and device, terminal and storage medium
Witte et al. Context-aware mobile biometric authentication based on support vector machines
US20160275302A1 (en) Securing a device using graphical analysis
CN114612986A (en) Detection method, detection device, electronic equipment and storage medium
US20160275278A1 (en) Securing a device using graphical analysis
CN111898107B (en) Account freezing method, account freezing device, computer equipment and storage medium
CN113627387A (en) Parallel identity authentication method, device, equipment and medium based on face recognition
CN112580459A (en) Service processing method, device, computer equipment and medium based on biological recognition
CN110706221A (en) Verification method, verification device, storage medium and device for customizing pictures
US10460094B2 (en) Method, apparatus, and storage medium for data processing
CN111339829B (en) User identity authentication method, device, computer equipment and storage medium
WO2016058540A1 (en) Identity authentication method and apparatus and storage medium
CN111582144A (en) Safety processing method and device for face data, electronic equipment and storage medium
Li et al. An evaluation of behavioural profiling on mobile devices
CN110348194A (en) Method of password authentication, device, equipment and storage medium
CN113515734A (en) Data processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40030095

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant