CN111784349B - Virtual resource allocation method and system - Google Patents

Virtual resource allocation method and system Download PDF

Info

Publication number
CN111784349B
CN111784349B CN202010532749.6A CN202010532749A CN111784349B CN 111784349 B CN111784349 B CN 111784349B CN 202010532749 A CN202010532749 A CN 202010532749A CN 111784349 B CN111784349 B CN 111784349B
Authority
CN
China
Prior art keywords
resource allocation
core
account
allocation account
core body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010532749.6A
Other languages
Chinese (zh)
Other versions
CN111784349A (en
Inventor
高书欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202010532749.6A priority Critical patent/CN111784349B/en
Publication of CN111784349A publication Critical patent/CN111784349A/en
Application granted granted Critical
Publication of CN111784349B publication Critical patent/CN111784349B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the specification discloses a virtual resource allocation method and a virtual resource allocation system, when OTP core is performed in virtual resource allocation, a target core number is determined from a plurality of core numbers pre-bound to a resource allocation account, so that the possibility of selecting the plurality of core numbers is provided for a user during virtual resource allocation, and compared with the situation that only a single core number is not selected, the target core number can be selected from the plurality of core numbers pre-bound to the resource allocation account during virtual resource allocation to perform core and virtual resource allocation.

Description

Virtual resource allocation method and system
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and a system for allocating virtual resources.
Background
At present, a user performs virtual resource allocation, and verification is performed by binding only the user's own number when checking by using an OTP (One Time Password, which is a One-Time Password). However, in an actual nuclear operation scene, there are usually a plurality of operators, and the operators are often not users themselves. Therefore, a virtual resource allocation scheme capable of dealing with multiple operators is urgently needed.
Disclosure of Invention
One or more embodiments of the present specification provide a virtual resource allocation method and system.
To solve the above technical problem, one or more embodiments of the present specification provide a virtual resource allocation method, including:
obtaining a virtual resource allocation request, wherein the virtual resource allocation request is used for resource allocation in a resource allocation account; determining a target core body number from a plurality of core body numbers pre-bound to the resource allocation account based on the virtual resource allocation request, and sending a first dynamic password to a target core body terminal corresponding to the target core body number; obtaining a first dynamic password to be verified, wherein the first dynamic password to be verified is generated according to the first dynamic password received by the target core body terminal; and verifying the first dynamic password to be verified by using the first dynamic password, and distributing virtual resources after the verification is passed.
In another aspect of one or more embodiments of the present specification, there is provided a method of setting a core number, the method including:
acquiring a core number setting request, wherein the core number setting request is used for requesting the binding of a core number in a resource allocation account; binding a second number in the resource allocation account based on the core number setting request; and a first number is pre-bound in the resource allocation account, and the second number is different from the first number.
In another aspect of one or more embodiments of the present specification, there is provided a virtual resource allocation system, including:
a request obtaining module, configured to obtain a virtual resource allocation request, where the virtual resource allocation request is used to request resource allocation in a resource allocation account;
and the password sending module is used for determining a target core body number from a plurality of core body numbers pre-bound to the resource allocation account based on the virtual resource allocation request, and sending a first dynamic password to a target core body terminal corresponding to the target core body number, wherein the first dynamic password is used for carrying out core body on the resource allocation account so as to carry out virtual resource allocation based on the virtual allocation request after the core body passes through.
In another aspect of one or more embodiments of the present specification, there is provided a system for setting a core number, the system including:
the device comprises a setting request module, a resource allocation module and a setting module, wherein the setting request module is used for obtaining a core number setting request which is used for requesting to bind a core number in a resource allocation account;
the number binding module is used for binding a second number in the resource allocation account based on the core number setting request; and a first number is pre-bound in the resource allocation account, and the second number is different from the first number.
One or more embodiments of the present specification disclose a readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method.
One or more embodiments of the present specification disclose an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the program.
Through one or more technical solutions of one or more embodiments of the present specification, one or more embodiments of the present specification have the following advantages or advantages:
one or more embodiments of the present specification disclose a virtual resource allocation method and system, where after a virtual resource allocation request for resource allocation in a resource allocation account is obtained, a target core number is determined from a plurality of core numbers pre-bound to the resource allocation account, and a first dynamic password is sent to a target core terminal corresponding to the target core number, where the first dynamic password is used to perform core for the resource allocation account, so as to perform virtual resource allocation based on the virtual allocation request after the core passes through. As can be seen from the above description, because the resource allocation account is bound with a plurality of core body numbers, rather than only one number, when allocating virtual resources, a possibility of selecting a plurality of core body numbers is provided for a user, and in contrast to a case where only a single core body number is not selected, in the embodiment, when allocating virtual resources, a target core body number is selected from the plurality of core body numbers bound in advance by the resource allocation account to perform core body and virtual resource allocation, so that a reach rate of dynamic verification can be improved.
The foregoing description is only an overview of one or more embodiments of the present disclosure, and in order to make the technical approaches of one or more embodiments of the present disclosure more clearly understandable, the embodiments may be implemented according to the contents of the present disclosure, and in order to make the above and other objects, features, and advantages of one or more embodiments of the present disclosure more obvious and understandable, the following detailed description of one or more embodiments of the present disclosure is given.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting one or more embodiments of the present specification. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 illustrates a flow diagram for binding secondary numbers in accordance with one or more embodiments of the present description;
FIG. 2 illustrates a flow diagram of a virtual resource allocation method in accordance with one or more embodiments of the present description;
FIG. 3 illustrates a transfer payment specific implementation process diagram in accordance with one or more embodiments of the present description;
FIG. 4 is a diagram illustrating a specific implementation of binding secondary numbers according to one or more embodiments of the present description;
FIG. 5 illustrates a schematic structural diagram of a virtual resource allocation system in accordance with one or more embodiments of the present description;
FIG. 6 illustrates a block diagram of a system for setting a core number in accordance with one or more embodiments of the present description;
FIG. 7 shows a schematic view of an electronic device in accordance with one or more embodiments of the present description.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
One or more embodiments of the present disclosure provide a virtual resource allocation method, which is applied to a virtual resource allocation system, where the system of this embodiment is available for B-end users (B represents Business, i.e., merchant, or merchant) or C-end users (C represents Consumer, i.e., individual, or Consumer). For example: the system of the embodiment can support the merchant version of the payment software, or support the personal version of the payment software, and the like. The user in one or more embodiments of the present description may be a merchant (company) or a consumer (individual user), and both the merchant and the consumer may have an operation scenario of virtual resource allocation, and further may have a case of self-verification.
Specifically, in the process of implementing the virtual resource allocation function in One or more embodiments of the present specification, if an OTP (One Time Password/dynamic Password) core needs to be performed, a plurality of core numbers are bound to a resource allocation account in the embodiment, instead of only One core number. Therefore, during virtual resource allocation, compared with the situation that only a single core number is not selected, in the embodiment, during virtual resource allocation, a target core number is selected from a plurality of core numbers pre-bound to a resource allocation account to perform core and virtual resource allocation, so that the reaching rate of dynamic verification can be improved, and the OTP core efficiency is improved.
Please refer to fig. 2, which is a flowchart of a virtual resource allocation method according to one or more embodiments of the present disclosure, and specifically includes the following steps:
step 220, obtaining a virtual resource allocation request, where the virtual resource allocation request is used to request resource allocation in a resource allocation account.
In particular, the virtual resource may be digital currency or the like, for example, digital currency displayed in an account of the payment-type application is stored. The virtual resources are called as they exist only in electronic digital form, not as entities. The resource allocation account is an account registered in the virtual resource allocation system by the user, and the operation based on the user authority (for example, the virtual resource allocation of payment or account transfer) is completed in the virtual resource allocation system, and the operation is performed after the virtual resource allocation system is logged in by using the resource allocation account. Specifically, the information of resource allocation account registration includes but is not limited to: user identity information (e.g., name, identification number, nickname, address, etc.), registered numbers (e.g., cell phone number), registered mailboxes, limits on virtual resource allocation, etc.
The virtual resource allocation request includes, but is not limited to, payment, transfer, cash withdrawal, etc. operation requests generated in the resource allocation account. Specifically, the virtual resource allocation system may obtain the virtual resource allocation request according to the operation of the user in the system, and the system of this embodiment may provide an operation interface to obtain the operation of the user on the operation interface, so as to obtain the virtual resource allocation request. For example, a series of operations of a payment request or a transfer request of a user on an operation interface is received in the virtual resource allocation system. After the user logs in the application program corresponding to the virtual resource allocation system by using the resource allocation account, the virtual resource allocation request for payment, transfer or cash withdrawal can be selected and proposed in the application program.
Step 240, based on the virtual resource allocation request, determining a target core number from a plurality of core numbers pre-bound to the resource allocation account, and sending a first dynamic password to a target core terminal corresponding to the target core number.
The first dynamic password is used for verifying the resource allocation account so as to allocate virtual resources based on the virtual allocation request after the verification passes.
In a specific implementation process, the core numbers pre-bound to the resource allocation account may be a plurality of core numbers bound according to an operation of a user in the virtual resource allocation system. Specifically, the plurality of core numbers include two or more numbers, and as an optional embodiment, the plurality of core numbers pre-bound to the resource allocation account at least include: the resource allocation account comprises a first number of a user to which the resource allocation account belongs and a second number which is bound in the resource allocation account and used for verifying identity, wherein the second number is different from the first number.
The first number is a number (for example, a mobile phone number) used by a user to which the resource allocation account belongs, and may also be referred to as a primary number in one or more embodiments of the present specification, and is generally a company or legal person number or a user own number. The number of the first numbers can be one or more, and the specific number is set by a user to which the resource allocation account belongs. The second number is a user number to which the non-resource allocation account belongs, and is typically a number of an operator recognized by a corporate legal person or the user himself, for example, a mobile phone number of a company accounting or a mobile phone number of a family of the user himself. The second number may also be referred to as a secondary number in one or more embodiments of the present specification, and thus, in order to improve the efficiency of virtual resource allocation, there may be one or more second numbers.
It can be seen that, the resource allocation account in this embodiment is bound with several core body numbers, rather than only one core body number. Therefore, during virtual resource allocation, compared with the situation that only a single core number is not selected, in the embodiment, during virtual resource allocation, a target core number is selected from a plurality of core numbers pre-bound to a resource allocation account to perform core and virtual resource allocation, so that the reaching rate of dynamic verification can be improved, and the OTP core efficiency is improved.
As an optional embodiment, when the target core number is determined from the plurality of core numbers pre-bound to the resource allocation account, a determination rule may be set according to whether the amount of the virtual resource requested to be allocated in the virtual resource allocation request exceeds a preset limit. Specifically, the specific implementation process for determining the target core number according to the preset quota provided in this embodiment is as follows:
firstly, judging whether the amount of the virtual resource requested to be allocated in the virtual resource allocation request exceeds a preset limit or not. In a specific implementation process, the preset limit may be set in the virtual resource allocation system in advance according to an operation of a user, and the specific limit is not limited in this specification.
As a judgment result, if the amount of the virtual resource does not exceed the preset limit, selecting a core number from the plurality of core numbers pre-bound to the resource allocation account according to a preset selection rule as the target core number, or selecting a core number from the plurality of core numbers pre-bound to the resource allocation account according to a user as the target core number.
In a specific implementation process, in an implementation manner that one core number is selected as the target core number from a plurality of core numbers pre-bound to the resource allocation account according to a preset selection rule, the preset selection rule may be a rule for recommending the target core number preset in the virtual resource allocation system, and may be set as needed, for example: and recommending according to the number of times of selecting the number in the historical operation, or recommending according to the risk degree of the number, and the like. Therefore, in this embodiment, one core number may be selected from the plurality of core numbers pre-bound to the resource allocation account as the target core number according to the preset selection rule, and in comparison with a case where only a single core number is not selected, in the virtual resource allocation, in this embodiment, the target core number is selected from the plurality of core numbers pre-bound to the resource allocation account to perform core and virtual resource allocation, so that the reach rate of dynamic verification can be improved, and the OTP core efficiency is improved.
For example, in a specific scenario, the resource allocation account is an account of a merchant B (i.e., B-side), the first number is a mobile phone number of a legal person of the merchant B, and the second number is a mobile phone number of a certain employee (financial staff) of the merchant B. In the historical virtual resource allocation operation, most of the cases are that the financial staff is in charge of operation, but not the legal person is in person, therefore, according to the historical operation times, the times of using the mobile phone number of the financial staff as the target nuclear body number recorded in the virtual resource allocation system are the most, therefore, when the financial staff performs the virtual resource allocation operation and encounters the nuclear body, the system determines the mobile phone number of the financial staff as the recommended number, but not the legal person mobile phone number of the merchant B, at the moment, the financial staff can quickly use the mobile phone of the financial staff to receive the dynamic password to complete the nuclear body authentication, therefore, compared with the situation that only the single non-selected nuclear body number exists, the contact rate of the dynamic authentication is improved, and the disturbance to the legal person is reduced.
In addition, a core number selected from a plurality of core numbers pre-bound by a user from a resource allocation account may be used as a target core number, specifically, all available core numbers may be displayed to an operator through the virtual resource allocation system, and a selection operation of the operator on the target core number is received, so as to determine the target core number. Therefore, according to the fact that the core number selected by the user from the plurality of core numbers pre-bound by the resource allocation account is used as the target core number, the selection operation of the user can be responded, the number selected by the user is determined to be the core number for core (for example, the user can select the number convenient to view), and the reaching rate of the core dynamic verification is improved.
Therefore, in the virtual resource allocation, the embodiment may select a suitable number according to the above situation to perform the coring. Specifically, in the execution process of the virtual resource allocation method of this embodiment, the virtual resource allocation system displays all available core body numbers to the operator, and when the operator for virtual resource allocation is the user, the system may determine that the first number is the target core body number according to the selection operation of the user on the first number, at this time, the first dynamic password may be directly sent to the target core body terminal corresponding to the first number of the user, and the user may view the first dynamic password immediately through the target core body terminal, thereby ensuring the reach rate. When the operator in the virtual resource allocation is not the user, but the owner of the second number, the second number can be determined to be the target core body number, at this time, the first dynamic password can be directly sent to the target core body terminal corresponding to the second number, and the operator can immediately check the first dynamic password through the target core body terminal, so that the reaching rate is ensured. If only the first number is bound, when an operator during virtual resource allocation is not the user, but the owner of the second number, the first number can only be determined to be the target core body number, at this time, the first dynamic password can be directly sent to the target core body terminal corresponding to the first number, and because the operator is not the user of the first number, the operator can obtain the first dynamic password received by the target core body terminal of the user only by contacting with the user, and at this time, the reaching rate of dynamic verification cannot be guaranteed. When there are a plurality of second numbers, the dynamic verification can be analogized according to the foregoing embodiments, and the description thereof is omitted here.
For example, in a specific scenario, the resource allocation account is an account of a merchant B (i.e., a B-side), the first number is a mobile phone number of a legal person of the merchant B, and the second number is a mobile phone number of a certain employee (a financial staff) of the merchant B, when an actual virtual resource allocation operation is performed, most cases are that the financial staff is in charge of the operation, but the legal person is in person, at this time, when the system displays the first number and the second number, the financial staff can select the second number to perform verification, thereby improving the reaching rate of dynamic verification and reducing disturbance to the legal person.
In another specific scenario, the resource allocation account is an account of a personal user C (i.e., a C terminal), the first number is a mobile phone number of the personal user C, the second number is a mobile phone number of a family D of the personal user C, and when the family D logs in the account to replace the personal operation of the user C during the actual virtual resource allocation operation, at this time, when the system displays the first number and the second number, the family D can select the second number to perform verification, so that the reach rate of the dynamic verification is improved.
The above is a specific implementation of determining the target core number when the amount of the virtual resource does not exceed the preset limit.
And then, as another judgment result, if the amount of the virtual resource exceeds a preset limit, selecting the first number as the target core number from a plurality of core numbers bound in advance by the resource allocation account.
In the specific implementation process, because the preset limit is set by the user according to the requirement, if the amount of the virtual resource requested to be allocated in the virtual resource allocation request exceeds the preset limit, the first number of the user is selected for core verification for safety consideration.
Therefore, the mode of the target core body number is determined according to the preset limit, when the preset limit is exceeded, the fund amount is large, and in order to avoid risks and improve the safety of virtual resource allocation, only the first number of the user can be selected as the core body number. Therefore, the virtual resource allocation method provided in one or more embodiments of the present specification can improve the dynamic verification reach rate during virtual resource allocation while ensuring the operational security of the virtual resource of the user.
In addition, in the specific implementation process, the core number may be in an invalid state, for example, the mobile phone number is logged out as an empty number, or the mobile phone number is not used in the virtual resource allocation system for a preset time (for example, half a year), which may be determined as an invalid state by the system, and the determination of the invalid state may be implemented by presetting the virtual resource allocation system. Therefore, before a target core number is determined from a plurality of core numbers pre-bound to the resource allocation account based on the virtual resource allocation request, validity verification can be performed on the core number.
One or more embodiments of the present description provide a validation process comprising: judging whether a second number which is bound in the resource allocation account and is used for verifying the identity is valid or not; if the second number is valid, displaying both the first number and the second number, wherein both the first number and the second number are in an optional state; and if the second number is invalid, displaying the first number and the second number, and the first number is in a selectable state and the second number is in a non-selectable state.
In a specific implementation process, the method for determining whether the second number bound in the resource allocation account and used for verifying the identity is valid may include: and judging whether the second number is a null number or not, or judging whether the second number has a use record in a preset time period or not, and the like. It should be noted that, since the first number as the main number is the number of the user himself, and is used as the registration number of the resource allocation account, the number is valid as long as the account exists; the second number as the auxiliary number may be invalid due to a change of personnel (for example, an employee leaves the work), so that the validity of the second number can be mainly verified, and the determined second number is valid, so as to further ensure the security of virtual resource allocation operation, ensure the effective release of operation risks, reduce the risks caused by account theft, and improve the body verification efficiency.
The above description is a specific implementation process of determining the target core number from a plurality of core numbers pre-bound to the resource allocation account in step 240 in a number core manner, but in the specific implementation process, the core manner preset in the virtual resource allocation system may not be only one type of number core, for example, but may also include but is not limited to: the mailbox core mode only needs to bind mailbox information for the core in the virtual resource allocation system in advance. Therefore, when there are multiple core-body modes, before determining a target core-body number from a plurality of core-body numbers pre-bound to the resource allocation account based on the virtual resource allocation request, the virtual resource allocation system may decide to return an available core-body mode according to a preset policy, and one or more embodiments of the present specification provide the following specific implementation processes:
firstly, based on the virtual resource allocation request, returning an available core mode. In a specific implementation process, the available core mode may be understood as a preset mode that can be used for core in the virtual resource allocation system, for example: each of the number core mode and the mailbox core mode may include a plurality of numbers or addresses for the core mode. Specifically, the available core-body mode may be returned by a decision according to a preset policy, where the preset policy includes but is not limited to: set priority, random, etc. For example, the number verification method may be preferentially returned by setting the number verification method to be preferred. For example, for an international merchant, the core effect becomes a main means for improving the security protection capability of the international merchant, and the OTP core of the mobile phone can be used as a main core mode to improve the core efficiency. For the special characteristics of the merchant, namely the condition that the mobile phone of the legal person is often inconsistent with the mobile phone held by the operator, the number of the mobile phones is increased in a small range, the body check effect can be effectively improved, and the body check experience of portal operation of the merchant is improved.
As an implementation manner, if the returned available core-body mode is a number core-body mode, a step of determining a target core-body number from a plurality of core-body numbers pre-bound to the resource allocation account based on the virtual resource allocation request, and sending a first dynamic password to a target core-body terminal corresponding to the target core-body number is performed. In the specific implementation process, if the returned available core mode is the number core mode, step 240 may be executed.
As another embodiment, if the returned available core mode is another core mode except the number core mode, the first dynamic password is sent to an application program corresponding to the other core mode. In specific embodiments, other core-body modes include, but are not limited to: and E, mailbox core mode. Similar to the number kernel, when the mailbox kernels, the first dynamic password also needs to be sent to the mailbox address bound in the resource allocation account to perform OTP kernel.
In the specific implementation process, the OTP core may be performed in the virtual resource allocation process because there may be various risks to the resource allocation account, for example, an abnormal virtual resource allocation behavior of the account occurs, the real-name identity information of the account itself is expired, whether the user to which the account belongs has a bad credit record, and the like. Specifically, the virtual resource allocation system can periodically or aperiodically perform statistics and analysis on the account itself, the user corresponding to the account and the behavior data of the account, perform risk assessment, obtain the risk condition of the account or the user corresponding to the account, and determine whether to perform verification according to the risk condition. Therefore, as an alternative embodiment, before returning the available core mode based on the virtual resource allocation request, the first risk identification may be performed on the virtual resource allocation account. One or more embodiments of the present description provide that the implementation of the first risk identification comprises:
first, based on the virtual allocation request, performing first risk identification on the resource allocation account. In a specific implementation, the first risk identified object includes: and identifying the resource allocation account and the user corresponding to the account to obtain an identification result. The first risk identification may be implemented by wind control, and the identification method may include: the method comprises the steps of identifying whether an abnormal virtual resource allocation behavior occurs in an account, identifying whether real-name identity information of the account is overdue, identifying whether a user to which the account belongs has a bad credit investigation record, and the like.
And when the result of the first risk identification is no risk, directly allocating the virtual resources based on the virtual allocation request. In a specific implementation process, the risk-free condition can be that the resource allocation account and the user corresponding to the account belong to a secure white list, which indicates that the resource allocation account and the user corresponding to the account belong to a secure account, and the next virtual resource allocation operation can be directly performed without performing OTP core.
And refusing to allocate the virtual resource when the first risk identification result is at risk. In a specific implementation process, the risk may be considered that the resource allocation account or the user corresponding to the account belongs to a blacklist, which indicates that the resource allocation account or/and the user corresponding to the account belong to an account known to have a clear risk. When there is a risk, a risk challenge may be issued, but in order to ensure the security of virtual resource allocation, the operation of allocating virtual resources may also be directly refused.
And when the first risk identification result cannot determine whether the resource allocation account has risks, executing the step of returning to the available core mode based on the virtual resource allocation request. In a specific implementation process, it may be considered that whether the resource allocation account is at risk or not may be that the resource allocation account and a user corresponding to the account do not belong to a blacklist determined to be at risk or a white list determined to be at risk. Therefore, in order to ensure the security of virtual resource allocation, the OTP core may be returned to, and whether to perform the operation of allocating virtual resources is determined according to the result of the core verification, so as to improve the security of virtual resource allocation.
In step 240, since the first dynamic password is used to authenticate the resource allocation account, the virtual resource allocation is performed based on the virtual allocation request after the authentication. Therefore, after the first dynamic password is sent to the target core terminal corresponding to the target core number, the method may further include the following steps 260 and 280:
step 260, obtaining a first dynamic password to be verified, wherein the first dynamic password to be verified is generated according to the first dynamic password received by the target core terminal.
In a specific implementation process, the first dynamic password refers to a dynamic password input by an operator according to the first dynamic password received by the target core terminal. Specifically, since there may be a case of inconsistency with the first dynamic password during input, for example, an operator with no operation authority may not normally input a password without knowing or not completely knowing the first dynamic password, the first to-be-verified dynamic password is used to represent the input dynamic password, and the obtained first to-be-verified dynamic password is to be verified next.
After receiving the first dynamic password, the target core terminal corresponding to the target core number may display or store the first dynamic password on the target core terminal, for example: and receiving and displaying in a short message mode or broadcasting in a call mode. After seeing or hearing the first dynamic password from the target core body terminal, the operator inputs the first dynamic password to be verified on the terminal, and the virtual resource distribution system receives and obtains the first dynamic password to be verified.
Step 280, the first dynamic password to be verified is verified by the first dynamic password, and virtual resources are allocated after the verification is passed.
In a specific implementation process, the virtual resource allocation system may verify the first dynamic password to be verified by using the first dynamic password, specifically, compare whether the first dynamic password to be verified and the first dynamic password are consistent, if so, indicate that the verification is passed, and if not, indicate that the verification is not passed. Further, if the verification passes, the verification shows that the user passes the verification, the resource allocation account and the user in the account are safe users, and the virtual resources are allocated after the verification passes; otherwise, the resource allocation account and the user of the account are risk users, and virtual resource allocation can be refused.
Referring next to fig. 3, fig. 3 is a specific implementation process of implementing payment by using the virtual resource allocation method according to one or more embodiments of the present disclosure.
In a specific implementation process, the portal, the wind control and the core body may be modules inside the virtual resource allocation system, and the wind control and the core body may also be modules outside the system. In particular, a portal may be an application (App) or user interface that interacts with a user.
The process of implementing payment using a portal, a wind control and a core is shown in fig. 3, which is as follows:
an operator submits a payment application to a portal, and submits a payment password and a payment amount when submitting the application;
the portal submits the payment password to the core body for verification, and the core body returns the payment password verification result to the portal;
and after the payment password is verified, the portal carries out wind control consultation, wherein the wind control consultation can be carried out by the system per se or interacts with a wind control system to request the wind control system to carry out wind control analysis on the account. In the process of carrying out wind control analysis on the account, carrying out first risk identification on the currently logged account; if the first risk identification result is no risk/at risk, directly carrying out payment/refusing payment; if the first risk identification result is an unknown risk, calling the core body to carry out core body initialization, and inquiring core body information and quota information from a database by the core body;
the core body decides to return available core body modes (number core body and mailbox core body) according to the inquiry core body information;
the wind control decides to return an available core mode and a number return core mode according to the core mode (here, the number return core mode is decided according to a preset strategy with priority on the number core mode);
the portal displays the first number and the second number (valid) at the same time according to the first number and the second number of the number checking mode and the quota information because the payment amount does not exceed the quota;
the operator selects a second number (the second number is the mobile phone number of the operator) as a target core body number, the portal enters a core body interface and simultaneously sends target core body number information to the core body, and after receiving the target core body number information, the core body sends a first dynamic password to a target core body terminal corresponding to the target core body number;
after the operator checks the first dynamic password, the operator submits the first dynamic password to be verified to the portal, the portal calls the verifying body to verify the obtained first dynamic password to be verified, a result is returned to the portal after the verification is passed, and the portal continues to execute the payment operation.
In the execution process, because the target core number for the core is determined from the core numbers pre-bound to the resource allocation account, when allocating virtual resources, the virtual resource allocation method can determine the target core number, which is more convenient for the operator to view the dynamic password, from the core numbers pre-bound to the resource allocation account according to the selection of the operator, and execute the virtual resource allocation after the core, so that compared with the case of only one core number, the virtual resource allocation method in one or more embodiments of the present specification can improve the reach rate of dynamic verification during virtual resource allocation, thereby improving the OTP core efficiency.
Next, a process of binding the core number before virtual resource allocation will be described.
In an optional implementation manner, before virtual resource allocation, in the case that a first number (primary number) is pre-bound in a resource allocation account based on a request for setting a core number, a second number (secondary number) different from the first number may be bound in the virtual resource allocation account. The core number setting request is used for requesting to set a core number in a resource allocation account.
It should be noted that the first number in this embodiment may be a number (for example, a mobile phone number) used by a user to whom the resource allocation account belongs, and may also be referred to as a primary number in this embodiment, and is generally a number of a corporate or a user himself. The number of the first numbers can be one or more, and the specific number is set by a user to which the resource allocation account belongs. The second number is a user number to which the non-resource allocation account belongs, and is typically a number of an operator recognized by a corporate legal person or the user himself, for example, a mobile phone number of a company accounting or a mobile phone number of a family of the user himself. The second number may also be referred to as a secondary number in one or more embodiments of the present specification, and thus, in order to improve the efficiency of virtual resource allocation, there may be one or more second numbers.
Referring to fig. 1, the specific implementation process of binding the secondary number is as follows:
and 102, acquiring the number to be checked input in the resource allocation account.
In a specific implementation process, the number to be verified is a number input by an operator, specifically, after the operator logs in through the resource allocation account, the number to be verified is input in the number binding interface, and at this time, the virtual resource allocation system can obtain the number to be verified.
And 104, sending the dynamic password to the core body terminal corresponding to the first number.
In the specific implementation process, the dynamic password is a dynamic verification password sent by the virtual resource system for verifying the virtual resource system when the virtual resource system binds the core number. Specifically, in order to ensure the security of binding the new core number, the core may be performed by using a first number of a user belonging to the bound resource allocation account, and a dynamic password may be sent to a core terminal corresponding to the first number.
And 106, acquiring a dynamic password to be verified, wherein the dynamic password to be verified is generated according to the dynamic password received by the core body terminal.
In the specific implementation process, the second to-be-verified dynamic password and the implementation manner of verification thereof are the same as the first to-be-verified dynamic password, and for the specific implementation manner, reference is made to the implementation manner of the first to-be-verified dynamic password, which is not described herein again.
And 108, verifying the dynamic password to be verified by using the dynamic password, and binding the number to be verified as the second number after the verification is passed.
In the specific implementation process, the virtual resource allocation system verifies the dynamic password to be verified by using the dynamic password; specifically, whether the dynamic password to be verified is consistent with the dynamic password or not can be compared, if so, the verification is passed, and if not, the verification is not passed. Further, if the verification is passed, the verification indicates that the verification is passed, the resource allocation account and the user in the account are safe users, and auxiliary numbers can be added; otherwise, the resource allocation account and the user of the account are risk users, and addition of the auxiliary number can be refused.
As an alternative embodiment, the risk identification may be performed on the resource allocation account before the number to be verified is bound as the second number. An embodiment of the present specification provides a specific implementation manner of binding the number to be verified as the second number after the verification is passed, where the specific implementation process includes:
if the dynamic password passes the verification, performing risk identification on the resource allocation account; if the result of the second risk identification is no risk, directly binding the number to be verified as the second number; if the second risk identification result is at risk, the number to be verified is refused to be bound as the second number; if the resource allocation account is not determined to have risks based on the risk identification result, performing identity verification on the resource allocation account; if the identity verification is passed, binding the number to be verified as the second number; and if the identity verification is not passed, refusing to bind the number to be verified as the second number.
Similar to the foregoing implementation process of the first risk identification, in a specific implementation process, if the result of the risk identification cannot determine whether the resource allocation account has a risk, the available core-body manner in the resource allocation account may be returned, and one core-body manner may be selected from the returned available core-body manners to perform identity verification on the resource allocation account.
Further, if the available core mode includes a standby core mode different from the first number, the result of the second risk identification is an unknown risk, the standby core mode is returned, and the identity of the resource allocation account is verified according to the standby core mode. The standby core mode is different from the first number, and the standby core mode is different from the standby core mode when the auxiliary number is bound, so that the safety can be further improved.
It should be noted that the process of risk identification in this specification is similar to the process of first risk identification in this specification, and the specific implementation process thereof may refer to the implementation process of first risk identification, which is not described in detail herein.
In addition, as an optional embodiment, since the virtual resource allocation system in this specification may not bind any core number, and may also bind a primary number, before obtaining the second number input in the resource allocation account, it may be determined whether the resource allocation account has bound the first number; and if so, returning a second number adding page, and executing the step of obtaining the second number input in the resource allocation account based on the second number adding page.
Further, if the first number is bound, whether a preset number of second numbers are bound is judged; and if the number is not the first number, returning to the page for adding the second number. Wherein the preset number can be set according to the requirement.
Next, referring to fig. 4, fig. 4 is a specific implementation process of binding a secondary number by using the method for setting a core number according to one or more embodiments of the present disclosure.
In a specific implementation process, the portal, the wind control and the core body may be modules inside the virtual resource allocation system, and the wind control and the core body may also be modules outside the system. In particular, a portal may be an application (App) or user interface that interacts with a user. And binding the auxiliary number.
Fig. 4 shows a process of binding the auxiliary number by using the portal, the wind control, and the core, which is as follows:
after the operator logs in by using the resource allocation account at the portal, the operator submits a number adding request to the portal;
the portal judges whether the main number is set or not, and if so, the portal enters an auxiliary number setting interface;
an operator inputs a number to be verified on an auxiliary number setting interface, a portal verifies the validity of the auxiliary number, and main number information is sent to a core body after the validity verification is passed;
after receiving the main number information, the core body sends a dynamic password to a core body terminal corresponding to the main number;
after checking the dynamic password, the operator submits the dynamic password to be verified to the portal, the portal calls the verification body to verify the obtained dynamic password to be verified, and a result is returned to the portal after the verification is passed;
and the portal carries out wind control consultation on the resource allocation account, wherein the wind control consultation can be carried out by the system per se or interacts with a wind control system to request the wind control system to carry out wind control analysis on the account. In the process of carrying out wind control analysis on the account, carrying out risk identification on the currently logged account; if the risk identification result is no risk/risk, directly adding the number to be checked as an auxiliary number/refusing to add; if the risk identification result cannot determine whether the resource allocation account has risks, calling the core body to verify the identity;
and if the identity verification is passed, adding the number to be verified as the auxiliary number.
Based on the same inventive concept, referring to fig. 5, one or more embodiments of the present specification disclose a virtual resource allocation system, comprising:
a request obtaining module 52, configured to obtain a virtual resource allocation request, where the virtual resource allocation request is used to request resource allocation in a resource allocation account;
and a password sending module 53, configured to determine a target core number from the plurality of core numbers pre-bound to the resource allocation account based on the virtual resource allocation request, and send a first dynamic password to a target core terminal corresponding to the target core number, where the first dynamic password is used to core the resource allocation account, so as to perform virtual resource allocation based on the virtual allocation request after the core passes through.
As an optional embodiment, the several core numbers pre-bound to the resource allocation account in the password sending module 53 at least include: the first number of the user to which the resource allocation account belongs and the second number which is bound in the resource allocation account and is used for verifying the identity; the second number is different from the first number.
As an optional embodiment, the password sending module 53 specifically includes:
the first judging module is used for judging whether the amount of the virtual resource requested to be allocated in the virtual resource allocation request exceeds a preset limit or not;
the first selection module is used for selecting one core body number from a plurality of core body numbers pre-bound by the resource allocation account as the target core body number according to a preset selection rule or selecting the core body number from the plurality of core body numbers pre-bound by the resource allocation account as the target core body number according to a user;
and the second selection module is used for selecting the first number from a plurality of core body numbers pre-bound to the resource allocation account as the target core body number if the number exceeds the preset number.
As an alternative embodiment, the system further comprises:
a second judging module, configured to, based on the virtual resource allocation request, judge whether the second number bound in the resource allocation account is valid before determining a target core number from a plurality of core numbers bound in advance in the resource allocation account;
the first display module is used for displaying the first number and the second number if the second number is valid, and the first number and the second number are in selectable states;
and the second display module is used for displaying the first number and the second number if the second number is invalid, wherein the first number is in a selectable state, and the second number is in a non-selectable state. As an alternative embodiment, the system further comprises:
a core body returning module, configured to return an available core body mode based on the virtual resource allocation request before determining a target core body number from a plurality of core body numbers pre-bound to the resource allocation account based on the virtual resource allocation request;
the number core module is used for determining a target core number from a plurality of core numbers pre-bound to the resource allocation account based on the virtual resource allocation request and sending a first dynamic password to a target core terminal corresponding to the target core number if the returned available core mode is the number core mode;
and the other core body module is used for sending the first dynamic password to the application program corresponding to the other core body modes if the returned available core body mode is other core body modes except the number core body mode.
As an alternative embodiment, the system further comprises:
a first risk identification module 51, configured to perform first risk identification on the resource allocation account based on the virtual allocation request before returning an available core-body mode based on the virtual resource allocation request; and if the resource allocation account cannot be determined to have risks based on the first risk identification result, executing the virtual resource allocation request and returning to the available core mode step.
As an alternative embodiment, the system further comprises:
and the number binding module is used for binding the second number in the resource allocation account before the virtual resource allocation request is obtained.
As an optional embodiment, the number binding module specifically includes:
the number obtaining module is used for obtaining the number to be checked and input in the resource allocation account;
the verification binding module is used for sending a second dynamic password to the core body terminal corresponding to the first number; and if a second to-be-verified dynamic password input by the user is acquired, verifying the second to-be-verified dynamic password by using the second dynamic password, and binding the to-be-verified number as the second number after the verification is passed.
As an optional embodiment, the verifying and binding module specifically includes:
the second risk identification module is used for carrying out second risk identification on the resource allocation account if the second dynamic password to be verified is verified; if the resource allocation account is not determined to have risks based on the second risk identification result, performing identity verification on the resource allocation account; and if the identity verification is not passed, refusing to bind the number to be verified as the second number.
As an optional embodiment, the second risk identification module specifically includes:
and the identity verification module is used for returning a standby identity verification mode in the resource allocation account if the resource allocation account cannot be determined to have risks based on the second risk identification result, and verifying the identity of the resource allocation account according to the standby identity verification mode, wherein the standby identity verification mode is different from a number identity verification mode.
Based on the same inventive concept, referring to fig. 6, one or more embodiments of the present specification disclose a system for setting a core number, the system comprising:
a setting request module 61, configured to obtain a core number setting request, where the core number setting request is used to request to bind a core number in a resource allocation account;
a number binding module 62, configured to bind a second number in the resource allocation account based on the core number setting request; and a first number is pre-bound in the resource allocation account, and the second number is different from the first number.
As an optional embodiment, the number binding module specifically includes:
the number obtaining module is used for obtaining the number to be checked and input in the resource allocation account;
the verification binding module is used for sending a dynamic password to the core body terminal corresponding to the first number; and if the dynamic password to be verified input by the user is acquired, verifying the dynamic password to be verified by using the dynamic password, and binding the number to be verified as the second number after the verification is passed.
As an optional embodiment, the verifying and binding module specifically includes:
the risk identification module is used for carrying out risk identification on the resource allocation account if the dynamic password to be verified passes verification; if the resource allocation account is not determined to have risks based on the risk identification result, performing identity verification on the resource allocation account; and if the identity verification is passed, binding the number to be verified as the second number.
As an optional embodiment, the risk identification module specifically includes:
and the identity verification module is used for returning a standby identity verification mode in the resource allocation account if the risk of the resource allocation account cannot be determined based on the risk identification result, and verifying the identity of the resource allocation account according to the standby identity verification mode, wherein the standby identity verification mode is different from a number identity verification mode.
Based on the same inventive concept as in the previous embodiments, one or more embodiments of the present description further provide a readable storage medium having stored thereon a computer program, which when executed by a processor, performs the steps of any of the methods described above.
One or more embodiments of the present specification also provide an electronic apparatus based on the same inventive concept as in the foregoing embodiments. Referring to fig. 7, comprising a memory 704, a processor 702 and a computer program stored on the memory 704 and executable on the processor 702, the processor 702 when executing the program realizes the steps of any of the methods described hereinbefore.
Where in fig. 7 a bus architecture (represented by bus 700) is shown, bus 700 may include any number of interconnected buses and bridges, and bus 700 links together various circuits including one or more processors, represented by processor 702, and memory, represented by memory 704. The bus 700 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 707 provides an interface between the bus 700 and the receiver 701 and transmitter 705. The receiver 701 and the transmitter 703 may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium. The processor 702 is responsible for managing the bus 700 and general processing, and the memory 704 may be used for storing data used by the processor 702 in performing operations.
With one or more of the one or more embodiments of the present description, the one or more embodiments of the present description have the following advantageous effects or advantages:
one or more embodiments of the present specification disclose a virtual resource allocation method and system, in which, after a virtual resource allocation request for resource allocation in a resource allocation account is obtained, a target core number is determined from a plurality of core numbers pre-bound to the resource allocation account, and a first dynamic password is sent to a target core terminal corresponding to the target core number; and then after a first to-be-verified dynamic password generated according to the first dynamic password received by the target core body terminal is obtained, verifying the first to-be-verified dynamic password by using the first dynamic password, and distributing virtual resources after the verification is passed. As can be seen from the above description, since the target core number is determined from the plurality of core numbers pre-bound to the resource allocation account, when allocating virtual resources, the target core number that is more convenient for the user to view the dynamic password can be determined from the plurality of core numbers pre-bound to the resource allocation account according to the selection of the user, and then virtual resource allocation is performed, so that the reaching rate of dynamic verification can be improved when allocating virtual resources.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, one or more embodiments of the present specification are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of one or more embodiments of the present specification and the descriptions of specific languages above are provided to disclose the best modes of one or more embodiments of the present specification.
In the description provided herein, numerous specific details are set forth. It can be appreciated, however, that embodiments of one or more embodiments of the specification may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of one or more embodiments of the description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of one or more embodiments of the specification, various features of one or more embodiments of the specification are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that is, one or more embodiments of the claimed subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of one or more embodiments of this specification.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in one or more embodiments of this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in one or more embodiments of the specification (including the accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those of skill in the art will understand that although some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of one or more embodiments of the present description and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of one or more embodiments of this specification may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components of a gateway, proxy server, system in accordance with one or more embodiments of the present description. One or more embodiments of the present specification can also be implemented as an apparatus or system program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such programs implementing one or more embodiments of the present specification may be stored on a computer-readable medium or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit one or more embodiments of the specification, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. One or more embodiments of the present description may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several systems, several of these systems may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. "several" in one or more embodiments of the present specification means two or more.

Claims (24)

1. A method of virtual resource allocation, the method comprising:
obtaining a virtual resource allocation request, wherein the virtual resource allocation request is used for requesting resource allocation in a resource allocation account;
performing first risk identification on the resource allocation account based on the virtual resource allocation request;
if the resource allocation account cannot be determined to have risks based on the first risk identification result, returning an available core mode in a plurality of core modes according to a preset strategy;
if the returned available core-body mode is a number core-body mode, determining a target core-body number from a plurality of core-body numbers pre-bound to the resource allocation account based on the virtual resource allocation request, and sending a first dynamic password to a target core-body terminal corresponding to the target core-body number, wherein the first dynamic password is used for core-body of the resource allocation account so as to allocate virtual resources based on the virtual resource allocation request after the core-body passes, and the first dynamic password is a one-time password.
2. The method of claim 1, wherein the pre-bound core numbers of the resource allocation account comprise at least: the first number of the user to which the resource allocation account belongs and the second number which is bound in the resource allocation account and is used for verifying the identity; the second number is different from the first number.
3. The method according to claim 2, wherein the determining a target core number from a plurality of core numbers pre-bound to the resource allocation account based on the virtual resource allocation request specifically includes:
judging whether the amount of the virtual resource requested to be allocated in the virtual resource allocation request exceeds a preset limit or not;
if the number of the target core body numbers is not exceeded, selecting one core body number from a plurality of core body numbers pre-bound by the resource allocation account as the target core body number, or selecting the core body number from the plurality of core body numbers pre-bound by the resource allocation account as the target core body number according to a user;
and if so, taking the first number in the plurality of core body numbers pre-bound by the resource allocation account as the target core body number.
4. The method of claim 2, before determining a target core number from a plurality of core numbers pre-bound to the resource allocation account based on the virtual resource allocation request, the method further comprising:
judging whether the second number bound in the resource allocation account is valid;
if the second number is valid, displaying both the first number and the second number, wherein both the first number and the second number are in an optional state;
and if the second number is invalid, displaying the first number and the second number, wherein the first number is in a selectable state, and the second number is in an unselected state.
5. The method of claim 1, further comprising:
and if the returned available core body mode is other core body modes except the number core body mode, sending the first dynamic password to the application programs corresponding to the other core body modes.
6. The method of claim 2, prior to said obtaining a virtual resource allocation request, the method further comprising:
and binding the second number in the resource allocation account.
7. The method of claim 6, wherein the binding the second number to the resource allocation account specifically comprises:
obtaining a number to be checked and checked input in the resource allocation account;
sending a second dynamic password to the core body terminal corresponding to the first number;
and if a second to-be-verified dynamic password input by the user is acquired, verifying the second to-be-verified dynamic password by using the second dynamic password, and binding the to-be-verified number as the second number after the verification is passed.
8. The method according to claim 7, wherein the binding of the number to be verified as the second number after the verification is passed includes:
if the second dynamic password to be verified passes verification, performing second risk identification on the resource allocation account;
if the resource allocation account is determined to have no risk based on the second risk identification result, the number to be verified is bound as the second number;
if the resource allocation account is not determined to have risks based on the second risk identification result, performing identity verification on the resource allocation account;
and if the identity verification is passed, binding the number to be verified as the second number.
9. The method according to claim 8, wherein if it cannot be determined whether the resource allocation account is at risk based on the second risk identification result, performing identity verification on the resource allocation account specifically includes:
if the resource allocation account cannot be determined to have risks based on the second risk identification result, returning to a standby core mode in the resource allocation account, and performing identity verification on the resource allocation account according to the standby core mode, wherein the standby core mode is different from the number core mode.
10. A method of setting a core body number, the method comprising:
acquiring a core number setting request, wherein the core number setting request is used for requesting the binding of a core number in a resource allocation account;
based on the request for setting the core number, binding a second number in the resource allocation account, including: obtaining a number to be checked and checked input in the resource allocation account; sending a dynamic password to a core body terminal corresponding to the first number; if a to-be-verified dynamic password input by a user is obtained, verifying the to-be-verified dynamic password by using the dynamic password; if the dynamic password to be verified passes the verification, performing risk identification on the resource allocation account; if the resource allocation account cannot be determined to have risks based on the risk identification result, returning to a standby core mode in the resource allocation account, and verifying the identity of the resource allocation account according to the standby core mode; if the identity verification is passed, binding the number to be verified as the second number;
the first number is pre-bound in the resource allocation account, the second number is different from the first number, and the standby core mode is different from the number core mode.
11. The method of claim 10, further comprising:
and if the resource allocation account is determined to have no risk based on the risk identification result, binding the number to be verified as the second number.
12. A virtual resource allocation system, the system comprising:
a request obtaining module, configured to obtain a virtual resource allocation request, where the virtual resource allocation request is used to request resource allocation in a resource allocation account;
the first risk identification module is used for carrying out first risk identification on the resource allocation account based on the virtual resource allocation request; if the resource allocation account cannot be determined to have risks based on the first risk identification result, returning an available core mode in a plurality of core modes according to a preset strategy;
and the password sending module is used for determining a target core body number from a plurality of core body numbers pre-bound by the resource allocation account based on the virtual resource allocation request when the returned available core body mode is a number core body mode, and sending a first dynamic password to a target core body terminal corresponding to the target core body number, wherein the first dynamic password is used for core body of the resource allocation account so as to allocate virtual resources based on the virtual resource allocation request after the core body passes, and the first dynamic password is a one-time password.
13. The system of claim 12, wherein the plurality of core numbers pre-bound to the resource allocation account in the password sending module at least comprises: the first number of the user to which the resource allocation account belongs and the second number which is bound in the resource allocation account and is used for verifying the identity; the second number is different from the first number.
14. The system according to claim 13, wherein the password sending module specifically includes:
the first judging module is used for judging whether the amount of the virtual resource requested to be allocated in the virtual resource allocation request exceeds a preset limit or not;
the first selection module is used for selecting one core body number from a plurality of core body numbers pre-bound by the resource allocation account as the target core body number if the number does not exceed the preset number, or selecting the core body number from the plurality of core body numbers pre-bound by the resource allocation account as the target core body number according to the user;
and the second selection module is used for taking the first number in the plurality of core body numbers pre-bound by the resource allocation account as the target core body number if the number exceeds the preset number.
15. The system of claim 13 or 14, further comprising:
a second judging module, configured to, based on the virtual resource allocation request, judge whether the second number bound in the resource allocation account is valid before determining a target core number from a plurality of core numbers bound in advance in the resource allocation account;
the first display module is used for displaying the first number and the second number if the second number is valid, and the first number and the second number are in selectable states;
and the second display module is used for displaying the first number and the second number if the second number is invalid, wherein the first number is in a selectable state, and the second number is in a non-selectable state.
16. The system of claim 12, further comprising:
and the other core body module is used for sending the first dynamic password to the application program corresponding to the other core body modes if the returned available core body mode is other core body modes except the number core body mode.
17. The system of claim 13, further comprising:
and the number binding module is used for binding the second number in the resource allocation account before the virtual resource allocation request is obtained.
18. The system according to claim 17, wherein the number binding module specifically includes:
the number obtaining module is used for obtaining the number to be checked and input in the resource allocation account;
the verification binding module is used for sending a second dynamic password to the core body terminal corresponding to the first number; and if a second to-be-verified dynamic password input by the user is acquired, verifying the second to-be-verified dynamic password by using the second dynamic password, and binding the to-be-verified number as the second number after the verification is passed.
19. The system of claim 18, wherein the verification binding module specifically comprises:
the second risk identification module is used for carrying out second risk identification on the resource allocation account if the second dynamic password to be verified is verified; if the resource allocation account is determined to have no risk based on the second risk identification result, the number to be verified is bound as the second number; if the resource allocation account is not determined to have risks based on the second risk identification result, performing identity verification on the resource allocation account; and if the identity verification is not passed, refusing to bind the number to be verified as the second number.
20. The system according to claim 19, wherein the second risk identification module specifically includes:
and the identity verification module is used for returning a standby identity verification mode in the resource allocation account if the resource allocation account cannot be determined to have risks based on the second risk identification result, and verifying the identity of the resource allocation account according to the standby identity verification mode, wherein the standby identity verification mode is different from the number identity verification mode.
21. A system for setting a core body number, the system comprising:
the device comprises a setting request module, a resource allocation module and a setting module, wherein the setting request module is used for obtaining a core number setting request which is used for requesting to bind a core number in a resource allocation account;
a number binding module, configured to bind, based on the core number setting request, a second number in the resource allocation account, where the number binding module includes: obtaining a number to be checked and checked input in the resource allocation account; sending a dynamic password to a core body terminal corresponding to the first number; if a to-be-verified dynamic password input by a user is obtained, verifying the to-be-verified dynamic password by using the dynamic password; if the dynamic password to be verified passes the verification, performing risk identification on the resource allocation account; if the resource allocation account cannot be determined to have risks based on the risk identification result, returning to a standby core mode in the resource allocation account, and verifying the identity of the resource allocation account according to the standby core mode; if the identity verification is passed, binding the number to be verified as the second number;
the first number is pre-bound in the resource allocation account, the second number is different from the first number, and the standby core mode is different from the number core mode.
22. The system of claim 21, further comprising:
and the risk identification module is used for binding the number to be verified as the second number if the resource allocation account is determined to have no risk based on the risk identification result.
23. A readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 11.
24. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of any one of claims 1-11 when executing the program.
CN202010532749.6A 2020-06-12 2020-06-12 Virtual resource allocation method and system Active CN111784349B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010532749.6A CN111784349B (en) 2020-06-12 2020-06-12 Virtual resource allocation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010532749.6A CN111784349B (en) 2020-06-12 2020-06-12 Virtual resource allocation method and system

Publications (2)

Publication Number Publication Date
CN111784349A CN111784349A (en) 2020-10-16
CN111784349B true CN111784349B (en) 2021-10-22

Family

ID=72757502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010532749.6A Active CN111784349B (en) 2020-06-12 2020-06-12 Virtual resource allocation method and system

Country Status (1)

Country Link
CN (1) CN111784349B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106251140A (en) * 2016-08-02 2016-12-21 中国银联股份有限公司 Method of payment, payment application system and payment system
CN106850518A (en) * 2015-12-07 2017-06-13 阿里巴巴集团控股有限公司 Safety certifying method and device
CN107705130A (en) * 2017-10-30 2018-02-16 商客通尚景科技江苏有限公司 A kind of on-line payment method
CN109347800A (en) * 2018-09-17 2019-02-15 海南新软软件有限公司 A kind of digital cash account processing method, apparatus and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150142658A1 (en) * 2013-11-19 2015-05-21 Tencent Technology (Shenzhen) Company Limited Payment binding management method, payment server, client, and system
CN106411812B (en) * 2015-07-27 2019-10-08 阿里巴巴集团控股有限公司 Verification method, system and the authentication server of user identity
CN106452814B (en) * 2015-08-10 2019-11-26 阿里巴巴集团控股有限公司 A kind of method and apparatus using external account operating resource

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850518A (en) * 2015-12-07 2017-06-13 阿里巴巴集团控股有限公司 Safety certifying method and device
CN106251140A (en) * 2016-08-02 2016-12-21 中国银联股份有限公司 Method of payment, payment application system and payment system
CN107705130A (en) * 2017-10-30 2018-02-16 商客通尚景科技江苏有限公司 A kind of on-line payment method
CN109347800A (en) * 2018-09-17 2019-02-15 海南新软软件有限公司 A kind of digital cash account processing method, apparatus and system

Also Published As

Publication number Publication date
CN111784349A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN108234505B (en) Account login method and system
US10764374B1 (en) Internet-of-things (IoT) device reference network
CN104917749B (en) account registration method and device
CN107426711B (en) Method, device and system for binding or unbinding mobile phone number
US20190139049A1 (en) Order Information Processing Methods, Apparatuses and Systems
US20160219056A1 (en) Methods, apparatus, and systems for resource access permission management
CN106101080A (en) Page access control method and device
CN112532653B (en) Method and device for managing third-party account
KR20180113229A (en) Loan service providing method using black chain and system performing the same
CN109389383A (en) Payment processing method, device, server and the storage medium of service request
CN102388400A (en) Mobile content delivery on a mobile network
CN105046562A (en) Risk control system and risk control data acquisition method
US9866587B2 (en) Identifying suspicious activity in a load test
CN105989484A (en) Password resetting method and apparatus
CN109034603B (en) Business process execution method, device and computer readable storage medium
EP2555145A1 (en) Credit transaction system, apparatus and terminal for granting credit and method thereof
CN111489175A (en) Online identity authentication method, device, system and storage medium
CN104539637B (en) Sending method, server and the user terminal of information of check code
CN108696864B (en) Virtual number request and transmission method, device and storage medium
CN111784349B (en) Virtual resource allocation method and system
US20180131651A1 (en) System and a method for limiting the waste of time of reading non-useful emails
CN109242705A (en) Method for processing business, equipment and storage medium based on alliance's committee member's chain
KR102107454B1 (en) System for multiplication of financial payment networks, method for financial services using the same and computer program for the same
CN104283840A (en) Method, client side and system for improving network access safety
CN106503576A (en) A kind of method and device for inquiring about data of paying taxes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40039481

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant