CN111382423A - Account display method and system - Google Patents

Account display method and system Download PDF

Info

Publication number
CN111382423A
CN111382423A CN202010168066.7A CN202010168066A CN111382423A CN 111382423 A CN111382423 A CN 111382423A CN 202010168066 A CN202010168066 A CN 202010168066A CN 111382423 A CN111382423 A CN 111382423A
Authority
CN
China
Prior art keywords
account
decryption
information
amount
recognition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010168066.7A
Other languages
Chinese (zh)
Inventor
滕志勇
贾学宾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010168066.7A priority Critical patent/CN111382423A/en
Publication of CN111382423A publication Critical patent/CN111382423A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Abstract

The embodiment of the application discloses a method and a system for displaying an account. The account display method comprises the following steps: acquiring and verifying decryption information of an account; displaying first account information after the account is decrypted based on the first decryption mode; displaying second account information after the account is decrypted based on a second decryption mode; wherein the first decryption mode is different from the second decryption mode. The method and the device can achieve the purpose of protecting the account privacy information.

Description

Account display method and system
Technical Field
The present application relates to the field of account display, and in particular, to an account display method and system.
Background
At present, when a user checks or operates an account such as a bank card, a payment platform or a financial platform, the system can enter the account and display the real account amount of the user through account number and password verification. However, when a user is in personal threat or otherwise wishes to display an amount of an unreal account, the conventional account display method cannot protect the security of the private information of the user account. Therefore, an effective account display method is needed to secure the account information.
Disclosure of Invention
One embodiment of the application provides an account display method and system. The method and the system can realize at least two account display modes, one mode can display the real account amount, the other mode can display the non-real account amount, and the non-real account amount is smaller than the real account amount, so that the purpose of protecting the account property information safety is achieved. The method comprises at least two account decryption modes; and displaying the first account information after the account is decrypted based on the first decryption mode. And displaying second account information after the account is decrypted based on the second decryption mode. Wherein the first decryption mode is different from the second decryption mode.
In some embodiments, the first decryption mode comprises at least one of: fixed passwords, gesture passwords, face recognition, voice recognition, fingerprint recognition, voice print recognition, and iris recognition. In some embodiments, the second decryption mode comprises at least one of: partial fixed passwords, gesture passwords, face recognition, voice recognition, fingerprint recognition, voice print recognition, and iris recognition.
In some embodiments, the first decryption mode is a fixed password, and the second decryption mode is a partial fixed password.
In some embodiments, the account information includes at least an account amount, a first account amount of the first account information and a second account amount of the second account information being different.
In some embodiments, the first account amount is a real account amount of the account; the second account amount is less than the first account amount.
In some embodiments, the second account amount is a preset fixed amount.
In some embodiments, the second account amount may be determined according to the second decryption manner and/or information in the decryption process.
In some embodiments, determining the second account amount according to the second decryption manner and/or the information in the decryption process includes: acquiring user voice information in a decryption process; and determining the second account amount based on the digital content in the user voice information.
In some embodiments, the second decryption mode is a partial fixed password, and the partial fixed password comprises a fixed part and a non-fixed part. Determining the second account amount according to the second decryption manner and/or the information in the decryption process comprises: and determining the second account amount according to the non-fixed part of the fixed password.
In some embodiments, the non-fixed portion includes at least two possible solutions. The determining the second account amount according to the non-fixed portion of the partial fixed password comprises: and determining the second account amount according to a preset corresponding rule based on the feasible solution of the non-fixed part.
In some embodiments, the method further comprises a third decryption means, the third decryption means comprising multi-face recognition. And when the account only comprises the face of the account user based on the third decryption mode, displaying the first account information. And when the account identifies that the account user also comprises other faces besides the outdoor face based on the third decryption mode, displaying the second account information.
One of the embodiments of the present application provides an account display system, which includes a decryption module and a display module. The decryption module is used for acquiring and verifying the decryption information of the account. The display module is used for: and displaying first account information after the account is decrypted based on a first decryption mode, and displaying second account information after the account is decrypted based on a second decryption mode, wherein the first decryption mode is different from the second decryption mode.
In some embodiments, the system further comprises a monetary amount determination module. And the amount determining module is used for determining the amount of the second account according to the second decryption mode and/or the information in the decryption process.
One of the embodiments of the present application provides an account display apparatus, including a processor. The processor is configured to execute the account display method according to any embodiment of the present application.
One of the embodiments of the present application provides a computer-readable storage medium, where the storage medium stores computer instructions, and after the computer reads the computer instructions in the storage medium, the computer executes an account display method according to any of the embodiments of the present application.
Drawings
The present application will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals are used to indicate like structures, wherein:
FIG. 1 is a schematic diagram of an application scenario of an account display system according to some embodiments of the present application;
FIG. 2 is a block diagram of an account display system according to some embodiments of the present application;
FIG. 3 is an exemplary flow chart of an account display method according to some embodiments of the present application;
FIG. 4 is an exemplary flow chart illustrating a method for determining a second account amount based on information in a second decryption process according to some embodiments of the present application; and
fig. 5 is an exemplary flow chart of a method for determining a second account amount based on a second decryption method according to some embodiments of the present application.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only examples or embodiments of the application, from which the application can also be applied to other similar scenarios without inventive effort for a person skilled in the art. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this application and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Embodiments of the present application may be applied to different financial account systems including, but not limited to, a combination of one or more of banks, demand banking, stocks, payment platforms, and the like. For example, a bank may provide a user savings account, financing account, and stock account simultaneously, all belonging to a financial account system. The different application embodiments of the present application include but are not limited to one or a combination of several of ATM machine, web page, client, browser plug-in, customized system, etc. It is to be understood that the application scenarios of the system and method of the present application are merely examples or embodiments of the present application, and that one of ordinary skill in the art would be able to apply the present application to other similar scenarios without inventive faculty from these figures and description. Such as other folk loan systems.
The terms "user", "user end", "user terminal", "customer", "demander", "service demander", "consumer", "customer supplier" and the like are used interchangeably and refer to a party who needs or orders a service, either a person or a tool. In addition, a "user" as described herein may be a party that needs or subscribes to a service, or a party that provides or assists in providing a service.
Fig. 1 is a schematic view illustrating an application scenario of an account display system according to some embodiments of the present application.
In some embodiments, the account display system 100 may include an online service platform for account information display. In some embodiments, the account display system 100 may be used for password authentication services in bank account services, such as face recognition, fixed password recognition, fingerprint recognition, iris recognition, short message authentication code recognition, mailbox authentication code recognition, and the like, for logging into a bank account. In some embodiments, the account display system 100 may also be used for financial accounts, stock accounts, and the like. For example, in a stock account, different stock total market values, single stock market values, current available money amounts, account flow records and the like are displayed according to different password verification modes. The account display system 100 may include a server 110, a network 120, a terminal 130, and a storage device 140.
The server 110 may process data and/or information from at least one component of the present system or an external data source (e.g., a cloud data center). The server 110 may be a single server or a group of servers that may be centralized or distributed (e.g., the server 110 may be a distributed system). In some embodiments, the server 110 may be local or remote. For example, server 110 may access terminal 130 and storage device 140 via network 120 to access stored information and/or data, or may directly access or read information and/or data stored in storage device 140. In some embodiments, server 110 may process data and/or information related to a password authentication service to perform one or more of the functions of account display described herein. Taking the bank deposit account password verification as an example, the server 110 may obtain the user input characters or face recognition from the terminal 130, and perform comparative analysis through the characters or face features input by the user to recognize whether the input characters and/or face features are consistent with the information and/or data stored and input inside the system.
The network 120 may be one or a combination of a limited network or a wireless network. For example, network 120 may include a wired network, a fiber optic network, a cable network, an intranet, a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a bluetooth network, a ZigBee network, a Near Field Communication (NFC) network, the like, or any combination of the above. In some embodiments, the network may include one or more network access points, such as wired access points, wireless access points, and wired or wireless access points including base stations or internet exchange points. Through the access point, one or more components of the account display system 100 may connect to the network 120 to exchange data and/or information.
The terminal 130 may be one or more terminal devices or software used by the user. In some embodiments, the terminal 130 may be used by one or more users, and may include users who directly use the service, and may also include other related users. The user may refer to a viewing account party, a bank worker or other service requester. In some embodiments, terminal 130 may include various types of devices that have the capability to obtain and/or send decryption information, and/or display account information. For example, it may be a computer, it may be a smartphone, and it may be an Automated Teller Machine (ATM). The above examples are intended to illustrate the broad scope of the device and not to limit its scope. Wherein, the acquiring of the decryption information and the displaying of the account information may be performed on the same device or may be performed on separate devices. For example, the decryption information can be acquired through wireless keyboard input, and the account information can be displayed through a computer; or the decryption information and the account information display can be completed on the same equipment of the tablet personal computer or the mobile phone. In some embodiments, the terminal 130 includes, but is not limited to, one or a combination of a camera, an input keyboard, a mouse, a voice device, a display screen, and a processor. In some embodiments, terminal 130 may send the user input characters and/or other information to server 110 for processing. For example, the terminal 130 may send the captured input characters, sounds, or facial images (e.g., via the network 120) to a server, which determines account data and/or information to be displayed according to preset rules.
Storage device 140 may store data and/or instructions. In some embodiments, the storage device 140 may store data obtained from the account display terminal 130. In some embodiments, storage device 140 may store data and/or instructions for execution or use by server 110, which may be used by server 110 to implement the example methods described herein. In some embodiments, the storage device 140 may store preset decryption information. In some embodiments, storage device 140 may include mass storage, removable storage, volatile read-write memory, read-only memory (ROM), and the like, or any combination thereof. The mass storage may include a magnetic disk, an optical disk, a solid state disk, and the like; volatile read-only memory may include Random Access Memory (RAM); the read-only memory may include a mask read-only memory (MROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), a compact disk read-only memory (CD-ROM), a digital versatile read-only memory, and the like.
Server 110, terminal 130, and other components may include a processing device. In some embodiments, the processing apparatus described above may include one or more processing engines (e.g., single core processing engines or multi-core processing engines). The processing device may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), an application specific instruction set processor (ASIP), or the like, as is known to those skilled in the art.
The processing device may process data and/or information obtained from other devices or system components and process such data and/or information. The processing device may control other devices in the system based on the data, information, and/or processing results.
FIG. 2 is a block diagram of an account display system according to some embodiments of the present application. In some embodiments, the account display system 200 may be implemented by the account display system 100 (e.g., the server 110 and/or the terminal 130).
As shown in fig. 2, the account display system 200 may include a decryption module 210, a display module 220, and an amount determination module 230.
The decryption module 210 may be used to obtain and verify the decryption information of the account. In some embodiments, the account is a liquidity asset class account; the decryption information is an identifier used for authenticating a user when the account logs in, and the decryption information includes but is not limited to: account number, decryption mode information, identification code, terminal hardware equipment information and the like. In some embodiments, the decryption module 210 may obtain the decryption information input by the user online and verify whether the input decryption information is consistent with the system preset decryption information. In some embodiments, the decryption module 210 may also obtain the decryption information stored in the user terminal, and verify whether the stored decryption information is consistent with the system preset decryption information.
The display module 220 may be configured to display the first account information after the account is decrypted based on the first decryption manner; displaying second account information after the account is decrypted based on a second decryption mode; wherein the first decryption mode is different from the second decryption mode. In some embodiments, the first account information reflects real information of the account. For example, the first account information includes a first account amount that indicates the actual amount of the account. In some embodiments, the second account information includes a second account amount that is less than the first account amount and that is displayed as a virtual amount for the account. In some embodiments, the first decryption mode comprises at least one of: a fixed password, a gesture password, face recognition, voice recognition, fingerprint recognition, voiceprint recognition and iris recognition; the second decryption mode comprises at least one of the following: partial fixed passwords, gesture passwords, face recognition, voice recognition, fingerprint recognition, voice print recognition, and iris recognition. In some embodiments, when the account number and the decryption method information obtained by the terminal 130 are the same as the first decryption method pre-stored in the server 110 or the storage device 140, the display module 220 displays the first account information. In some embodiments, when the account number and the decryption method information obtained by the terminal 130 are the same as the second decryption method pre-stored in the server 110 or the storage device 140, the display module 220 displays the second account information.
The amount determining module 230 may be configured to determine the amount of the second account according to the second decryption manner and/or the information in the decryption process. The amount determination module 230 may determine the amount of the second account based on the digital content in the user voice message. The amount determination module 230 may also determine the second account amount based on an unfixed portion of the partial fixed password.
It should be understood that the system and its modules shown in FIG. 2 may be implemented in a variety of ways. For example, in some embodiments, the system and its modules may be implemented in hardware, software, or a combination of software and hardware. Wherein the hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory for execution by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the above described methods and systems can be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The system and its modules of the present application may be implemented not only by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., but also by software executed by various types of processors, for example, or by a combination of the above hardware circuits and software (e.g., firmware).
It should be noted that the above description of the account display system and its modules is merely for convenience of description and should not limit the present application to the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, given the teachings of the present system, any combination of modules or sub-system configurations may be used to connect to other modules without departing from such teachings. For example, in some embodiments, the decryption module 210, the display module 220, and the amount determination module 230 disclosed in fig. 2 may be different modules in a system, or may be a module that implements the functions of two or more modules described above. For example, the decryption module 210 and the display module 220 may be two modules, or one module may have both decryption and display functions. For example, each module may share one memory module, and each module may have its own memory module. Such variations are within the scope of the present application.
FIG. 3 illustrates an exemplary flow chart of an account display method according to some embodiments of the present application. The account display method 300 may be implemented by the account display system 200. As shown in fig. 3, the account display method 300 may include:
step 310, acquiring and verifying the decryption information of the account;
in some embodiments, step 310 may be implemented in system 200 shown in FIG. 2. For example, obtaining and verifying decryption information for an account may be performed by the decryption module 210 of FIG. 2.
The account may include accounting records reflecting economic content. The account may include accounting elements by economic content such as assets, liabilities, owner equity, income, expenses, and profits. In some embodiments, the account may comprise a liquidity asset class account. The liquidity asset class account may include, but is not limited to: cash accounts, bank deposit accounts, financing investment accounts, etc.
In some embodiments, the account decryption information may include an identification for authenticating the user at the time the account is logged in. Decryption information may include, but is not limited to: account number, decryption mode information, identification code, terminal hardware equipment information and the like. The account number may be composed of one or more of numbers, letters, and symbols. In some embodiments, one account may correspond to multiple account numbers, and one account number may also correspond to multiple account numbers, but at least one account number of one account may correspond to the same account number. The decryption mode information may be understood as authentication information bound to the account, which may include, but is not limited to, one or a combination of numbers, letters, words, voice, images, video, and biometric information. The identification code may include authentication information, such as mailbox authentication, short message authentication, etc., which is additional to the decryption mode information. The terminal hardware device information may include a MAC address of the terminal. The present invention is not limited to the exact form and content of the decrypted information.
The method for acquiring and verifying the decryption information of the account refers to a three-party interaction process of a user, a terminal and a server when the account logs in. In some embodiments, the server may obtain the account number by reading account information in a bank card or similar device. In some embodiments, the step of obtaining and verifying the decryption information of the account includes, but is not limited to: a user inputs an account and decryption mode information through a terminal or selects an account password cached in the terminal; the server searches a storage account and a pre-stored password corresponding to the storage account; the server determines whether the input account password is consistent with the stored account password. In some embodiments, the decryption information for obtaining and verifying the account further may also include a terminal MAC address, a user input characteristic, a bound account number further obtaining and verifying, and the like. In some embodiments, an account may be decrypted by at least two decryption means.
And step 320, displaying the first account information after the account is decrypted based on the first decryption mode.
In some embodiments, step 320 may be implemented in system 200 shown in FIG. 2. For example, after the account is decrypted based on the first decryption method, displaying the first account information may be implemented by the display module 220 in fig. 2.
In the embodiment of the present invention, the first decryption means may include one or a combination of a fixed password, a gesture password, face recognition, voice recognition, fingerprint recognition, voiceprint recognition, iris recognition, and the like. In some embodiments, the fixed password in the first decryption mode may include one or a combination of preset letters, numbers, or characters, and the like, and the fixed password can be decrypted only by strictly inputting the corresponding password when the user selects the fixed password to log in; the gesture password may include gesture path drawing, decrypted by verifying the gesture password path; the voice recognition can comprise decryption through one or a combination of tone, sound content and the like, and the face recognition, the voice recognition, the fingerprint recognition, the voiceprint recognition and the iris recognition belong to one of biological recognition technologies, all belong to the inherent physiological characteristics of the human body which can be used for distinguishing, and can be used for verifying the decryption mode for decryption.
In the embodiment of the present invention, the account information may include an account amount of the belonging user. Among other things, the account amount may include, but is not limited to: available balance, running water records, daily available amount, etc. In some embodiments, the account information may also include identity information of the user, age, opened services, recent browsing records, consumption records, and/or other account information bound to the account, and the like.
When the decryption mode information acquired by the terminal 130 is the same as the first decryption mode pre-stored in the server 110 or the storage device 140, the first account information is displayed. In some embodiments, the first account information reflects real information of the account. For example, the first account information may include a first account amount that indicates the actual amount of the account.
In real life, a user may log in an economic related account such as a bank or a stock at the terminal 130 (e.g., an ATM, a bank counter, or a mobile phone) under the condition of confirming the security of the surrounding environment, and check the real amount of the account or perform other fund transfer operations by inputting a preset fixed password or decrypting the account in a first decryption manner such as fingerprint recognition or face recognition.
Step 330, displaying the second account information after the account is decrypted based on the second decryption mode.
In some embodiments, step 330 may be implemented in system 200 shown in FIG. 2. For example, after the account is decrypted based on the second decryption method, displaying the second account information may be implemented by the display module 220 in fig. 2.
When the decryption method information acquired by the terminal 130 is the same (or partially the same) as the second decryption method pre-stored in the server 110 or the storage device 140, the second account information is displayed. In some embodiments, the second decryption means may include: one or more of partial fixed passwords, gesture passwords, face recognition, voice recognition, fingerprint recognition, voiceprint recognition, iris recognition and the like. In some embodiments, the second decryption mode character input recognition may be a partial fixed password, which may mean that some bits of the password are set as the authentication information, and other bits are not used for authentication, different from the fixed password recognition of the first decryption mode. For example, a twelve-digit partial fixed password "cut? Is there a Is there a Is there a 2019 ' the first four digits ' CUTE ' and the last four digits ' 2019 ' are fixed passwords, and if the current four digits and the last four digits are accurately input, the middle four digits can be successfully decrypted by inputting the character string randomly.
In some embodiments, the second decryption mode is different from the first decryption mode. The user may enable the terminal 130 to display the second account information of the account by setting another way different from the first decryption way.
In some embodiments, the second account amount is different from the first account amount. Notably, the second account amount is not greater than the first account amount. Corresponding to the actual amount of the first account, the actual journal, the actual daily operable amount, etc., each of the amounts of the second account may be virtual or partially virtual, and each corresponding virtual amount is less than the actual amount. For example, a user's real stock account has 100 ten thousand of funds, and 30 ten thousand of funds can be transferred out in the same day, and when the user logs in the account in the first decryption mode, the account funds are 100 ten thousand, and 30 ten thousand of funds can be transferred out in the same day; when the user logs in the account by adopting the second decryption mode, 20 thousands of account funds can be displayed, and 5 thousands can be transferred out on the day.
In some embodiments, the second account amount included in the second account information may be a preset fixed amount. When the real amount in the account changes, the user can modify the preset second account amount by himself, but the preset second account amount should be ensured not to be larger than the real amount of the account. In some embodiments, after the actual amount of money in the account is decreased, if the amount of money previously preset by the user is greater than the actual amount of money and the user has not modified the system may default the displayed amount of money for the second account to any value not greater than the actual amount of money (e.g., 100%, 80%, 60%, etc. of the actual amount of money). In some embodiments, the second account amount included in the second account information may also be determined according to the second decryption method and/or the information in the decryption process. Further details of determining the amount of the second account based on the second decryption manner may be found in fig. 5 and its associated description; for more details of determining the amount of the second account based on the information in the decryption process, reference may be made to fig. 4 and its associated description.
In real life, when the user logs in a mobile asset account (such as a bank, a financial platform, a stock and the like) because the surrounding environment is unsafe or based on the self interest requirement, the user can select a second decryption mode to decrypt and display the amount of money of the second account. The user may significantly reduce the risk of financial damage by having the account display a lower amount.
In some embodiments, the account decryption means may further include a third decryption means. The third decryption mode may be a multi-face recognition mode, and the multi-face recognition mode is one of face recognition and can extract more information than a single face authentication mode. In some embodiments, when the account identifies that only the face of the account user is included based on the third decryption mode, the first account information is displayed; and when the account identifies that the account user also comprises other faces besides the outdoor face based on the third decryption mode, displaying the second account information.
In some embodiments, when the terminal does not recognize the face of the account user, the verification fails; displaying first account information when only the face of the account user is recognized; when other faces including the account user outdoors are recognized, second account information is displayed.
In some embodiments, the third decryption mode may be performed independently, or may be performed based on the first decryption mode or the second decryption mode. For example, after the user decrypts the account by using the first decryption method or the second decryption method, the account may be decrypted by using the third decryption method. In this case, the display amount of the account may be finally displayed based on the result of the third decryption means (the first account amount is displayed when one person is recognized, and the second account amount is displayed when a plurality of persons are recognized). For another example, the user may directly decrypt the account in the third decryption manner.
It should be noted that the above description related to the flow 300 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 300 will be apparent to those skilled in the art in light of this disclosure. However, such modifications and variations are intended to be within the scope of the present application. For example, the process 300 may further include a fourth or fifth decryption method, which corresponds to the fourth account information and the fifth account information, respectively.
Fig. 4 is an exemplary flow chart illustrating a method for determining a second account amount based on information in a second decryption process according to some embodiments of the present application. As shown in fig. 4, the method for determining the amount of the second account according to the information in the second decryption process may include:
step 410, obtaining the voice information of the user. In some embodiments, step 410 may be implemented by decryption module 210.
In some embodiments, the terminal 130 acquiring the voice information of the user may include voice feature information (e.g., voice pop information) of the user and/or acquiring voice content of the user, and the like. The voice feature recognition is used as one of identity information for distinguishing users, and account login can be determined. For example, in a noisy environment, when a user inputs a voice to a login account, the terminal can only acquire voice information with a similarity of 99% to the voice feature of the user stored in the server, and the voice information can only be identified to pass. For another example, after confirming that the obtained voice feature information matches with the pre-stored voice feature information, the decryption module 210 may perform recognition of the voice content.
In some embodiments, the voice content may refer to voice content acquired by specific or non-specific human voice recognition, such as digital content and the like. In some embodiments, the decryption module 210 may convert the speech signal into corresponding text or commands through a speech recognition model.
In some embodiments, it may be set to acquire the voice information of the user only within a certain period of time. For example, it may be set that the voice information is acquired only for a certain period of time (for example, 1 minute) before and after the decryption using the second decryption means. For example, the voice information obtaining function may be automatically turned off within a period of time (e.g., within 15 minutes) after being decrypted by using the first decryption means; and if the voice information is acquired between the working time Monday and the Friday 09:00-18:00, the function is closed, and the voice information is automatically opened during the non-working time.
Step 420, determining the second account amount based on the digital content in the user voice information. In some embodiments, step 420 may be implemented by the amount determination module 230.
In some embodiments, the second account amount may be determined based on the digit-related content in the user's voice message.
For example, a user logs in a bank client, and the password is verified by extracting voice information of the user, wherein the voice information comprises 'only 400 yuan in a card', and the balance is correspondingly displayed by 400 yuan. For another example, when the extracted voice message includes "less than 1000 yuan in the card", a random number with a difference of 100 yuan or less from 1000 yuan is displayed, for example, between 900-999 yuan, wherein the difference 100 can be set in advance, and the difference value can be set to other numbers.
It should be noted that the above description related to the flow 400 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 400 may occur to those skilled in the art in light of the teachings herein. However, such modifications and variations are intended to be within the scope of the present application. For example, the process 400 may also be performed by displaying other account information by recognizing specific voice information after the account is decrypted based on the first decryption method.
Fig. 5 is an exemplary flow chart illustrating a method for determining a second account amount based on a second decryption method according to some embodiments of the present application. As shown in fig. 5, the method for determining the amount of the second account according to the second decryption manner may include:
in step 510, the second decryption mode is set as a partial fixed password. In some embodiments, step 510 may be implemented by display module 220.
In some embodiments, the first decryption means may be one or a combination of a fixed password, a gesture password, face recognition, voice recognition, fingerprint recognition, voice print recognition, and iris recognition. Preferably, the first decryption mode may be a fixed password mode. For example, the account is preset with a set of 8-digit passwords, and the combination of letters and numbers, such as the password of baby1234, and the first account information can be displayed by accurately inputting the password of "baby 1234".
In some embodiments, the second decryption mode may be set as a partial fixed password. The partial fixed password comprises a fixed part and a non-fixed part.
In some embodiments, the fixed part of the partial fixed password may be one or a combination of letters, numbers, symbols. For example, a 12-digit password is required to be input, the password is in the form of cutedxxxxx 0, the fixed password is cute and the last digit 0, account information can be displayed only when cute is input in the first four digits and the last digit 0 is input, and random digits or a combination of digits and other characters can be input in other non-fixed parts. For another example, the partial fixed password may be a password consisting of 6 digits, the password form is 2020, where the first 4 digits of the password are fixed, the last two digits may be entered with a random number, and the account information may be displayed only when the user enters the first four digits accurately.
Step 520, determining the amount of the second account according to the non-fixed part of the partial fixed password. In some embodiments, step 520 may be implemented by the amount determination module 230.
In some embodiments, the second account amount may be determined by an unsecure portion of the partial fixed password. In some embodiments, the second account information may be determined to be displayed based on decryption of a fixed portion of the partial fixed password. And the second account amount of the displayed second account information is determined by the non-fixed part in the part of the fixed password. In some embodiments, the non-fixed portion may include at least two possible solutions. A feasible solution may refer to a set of variables that satisfy a constraint. In some embodiments, the feasible solutions may include combinations of numbers, letters, or alphanumerics, etc. The user may preset a rule of correspondence between the feasible solution and the second account amount. The amount determination module 230 may determine the amount of the second account according to a preset corresponding rule based on the feasible solution of the non-fixed part. For example, a feasible solution may be any two-digit number; the rule may include that the first digit of the feasible solution determines the first digit of the second account amount, and the second digit may determine the number of 0 after the first digit (for example, the feasible solution is 93, and the second account amount is 9000). For another example, the feasible solution may be any two-digit number, and the rule may include that the second account amount is a fixed multiple (e.g., 9 times, 5 times, etc.) of the feasible solution. In some embodiments, the chronological information in the second account amount may statistically generate a corresponding virtual chronological from the amounts determined by the non-fixed portion. It is worth noting that the second account amount is shown to be no greater than the actual amount of the account. If the amount of the second account determined by the amount determination module 230 is greater than the actual amount of the account, the amount may be displayed according to the maximum amount preset by the user or any value that is not greater than the actual amount of the account.
In some embodiments, the non-fixed part of the partial fixed combination includes at least a numeric symbol, and when the non-fixed part inputs a letter or a character, the bit may be set to 0 or not displayed, for example, the 12-bit combination cutedxxxxx 0, the fixed part includes the first four letters and the last 0, and the other 7-bit non-fixed part can input r! 90 x 87, when the characters are set to be 0, the corresponding account display amount is 90087 yuan, and when the characters or the characters are not displayed, the corresponding account amount is 9087 yuan.
It should be noted that the above description related to the flow 500 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 500 may occur to those skilled in the art upon review of the present application. However, such modifications and variations are intended to be within the scope of the present application. For example, the system defaults a certain part of characters of the last input password to be a fixed part of a part of fixed password, and the second input password needs to be accurately input with the part of characters of the previous time.
The beneficial effects that may be brought by the embodiments of the present application include, but are not limited to: (1) according to the technical scheme, the privacy and the safety of the user account can be effectively protected, and the purpose of protecting the account information is achieved through the display method of the account diversity; (2) in the account display process, the verification and identification of diversified decryption information are carried out, and key data and/or information input by a user are/is acquired according to preset rules, so that the account can display the information according to the intention of the user. It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the broad application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, this application uses specific language to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the present application may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present application may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereon. Accordingly, various aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which elements and sequences of the processes described herein are processed, the use of alphanumeric characters, or the use of other designations, is not intended to limit the order of the processes and methods described herein, unless explicitly claimed. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the present application. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the present application can be viewed as being consistent with the teachings of the present application. Accordingly, the embodiments of the present application are not limited to only those embodiments explicitly described and depicted herein.

Claims (17)

1. An account display method is characterized by comprising at least two account decryption modes;
displaying first account information after the account is decrypted based on the first decryption mode;
displaying second account information after the account is decrypted based on a second decryption mode;
wherein the first decryption mode is different from the second decryption mode.
2. The method of claim 1,
the first decryption mode comprises at least one of the following modes: a fixed password, a gesture password, face recognition, voice recognition, fingerprint recognition, voiceprint recognition and iris recognition;
the second decryption mode comprises at least one of the following: partial fixed passwords, gesture passwords, face recognition, voice recognition, fingerprint recognition, voice print recognition, and iris recognition.
3. The method of claim 2, wherein the first decryption mode is a fixed password and the second decryption mode is a partial fixed password.
4. The method of claim 1, wherein account information includes at least an account amount, a first account amount of the first account information being different than a second account amount of the second account information.
5. The method of claim 4, wherein the first account amount is a real account amount of the account;
the second account amount is less than the first account amount.
6. The method of claim 5, wherein the second account amount is a preset fixed amount.
7. The method of claim 5, further comprising:
and determining the second account amount according to the second decryption mode and/or the information in the decryption process.
8. The method of claim 7, wherein the determining the second account amount according to the second decryption manner and/or the information in the decryption process comprises:
acquiring user voice information in a decryption process;
and determining the second account amount based on the digital content in the user voice information.
9. The method of claim 7, wherein the second decryption mode is a partial fixed password, the partial fixed password comprising a fixed portion and a non-fixed portion;
the determining the second account amount according to the second decryption manner and/or the information in the decryption process includes:
and determining the second account amount according to the non-fixed part of the fixed password.
10. The method of claim 9, wherein the non-fixed portion includes at least two possible solutions;
the determining the second account amount according to the non-fixed portion of the partial fixed password comprises:
and determining the second account amount according to a preset corresponding rule based on the feasible solution of the non-fixed part.
11. The method of claim 1, further comprising a third decryption means, the third decryption means comprising multi-face recognition;
when the account only comprises the face of the account user based on the third decryption mode, displaying the first account information;
and when the account identifies that the account user also comprises other faces besides the outdoor face based on the third decryption mode, displaying the second account information.
12. An account display system is characterized by comprising a decryption module and a display module;
the decryption module is used for acquiring and verifying decryption information of the account;
the display module is used for:
and displaying first account information after the account is decrypted based on a first decryption mode, and displaying second account information after the account is decrypted based on a second decryption mode, wherein the first decryption mode is different from the second decryption mode.
13. The system of claim 12,
the first decryption mode comprises at least one of the following modes: a fixed password, a gesture password, face recognition, voice recognition, fingerprint recognition, voiceprint recognition and iris recognition;
the second decryption mode comprises at least one of the following: partial fixed passwords, gesture passwords, face recognition, voice recognition, fingerprint recognition, voice print recognition, and iris recognition.
14. The system of claim 12, wherein account information includes at least an account amount, the first account amount being a real account amount of the account; the second account amount is less than the first account amount.
15. The system of claim 14, wherein the system further comprises a monetary determination module;
and the amount determining module is used for determining the amount of the second account according to the second decryption mode and/or the information in the decryption process.
16. An account display apparatus comprising a processor, wherein the processor is configured to perform the account display method of any one of claims 1 to 11.
17. A computer-readable storage medium storing computer instructions, the computer instructions when read by a computer executing the account display method according to any one of claims 1 to 11.
CN202010168066.7A 2020-03-11 2020-03-11 Account display method and system Pending CN111382423A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010168066.7A CN111382423A (en) 2020-03-11 2020-03-11 Account display method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010168066.7A CN111382423A (en) 2020-03-11 2020-03-11 Account display method and system

Publications (1)

Publication Number Publication Date
CN111382423A true CN111382423A (en) 2020-07-07

Family

ID=71219955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010168066.7A Pending CN111382423A (en) 2020-03-11 2020-03-11 Account display method and system

Country Status (1)

Country Link
CN (1) CN111382423A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680669A (en) * 2013-11-29 2015-06-03 株式会社日立制作所 Financial business transaction system and method
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN110675549A (en) * 2019-09-19 2020-01-10 中国银行股份有限公司 Bank account security processing method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680669A (en) * 2013-11-29 2015-06-03 株式会社日立制作所 Financial business transaction system and method
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN110675549A (en) * 2019-09-19 2020-01-10 中国银行股份有限公司 Bank account security processing method and device

Similar Documents

Publication Publication Date Title
US11416602B2 (en) Methods and systems for identity creation, verification and management
US20240013072A1 (en) Processing machine learning attributes
US8510797B2 (en) Online user authentication
US9536107B2 (en) System and method enabling multiparty and multi level authorizations for accessing confidential information
EP2784710B1 (en) Method and system for validating personalized account identifiers using biometric authentication and self-learning algorithms
US20180052990A1 (en) Password check by decomposing password
US8141134B2 (en) Authentication engine for enrollment into a computer environment
US20100325442A1 (en) System and method for nameless biometric authentication and non-repudiation validation
EP3681126B1 (en) Systems and methods for securely verifying a subset of personally identifiable information
US20160162893A1 (en) Open, on-device cardholder verification method for mobile devices
CN112651841A (en) Online business handling method and device, server and computer readable storage medium
Hossain et al. Improving cloud data security through hybrid verification technique based on biometrics and encryption system
KR101763275B1 (en) The method for customer certification using credit bereau information, the system thereof, and computer-readable recording medium for recording program executing the same method
Priya et al. A novel algorithm for secure Internet Banking with finger print recognition
CN111382423A (en) Account display method and system
Barde A multimodal biometric system-aadhar card
CA3207731A1 (en) System and method for distributed management of consumer data
CN112785410A (en) Relying party risk adjustment indicator systems and methods
US20230061605A1 (en) Systems and methods for intelligent fraud detection
JP7355790B2 (en) Programs, systems and information processing methods
AU2021107510A4 (en) A method for electronic identity verification and management
Shelupanova et al. Video Identification as a Tool to Prevent Social Engineering Attacks in Finance
TWM640847U (en) Financial verification system
Jayapal et al. Enhancing KYC Efficiency and Accuracy Through Session Recording and Document Auto-Capture
WO2023023824A1 (en) A method for electronic identity verification and management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination