CN112396418A - Information processing method, device and system - Google Patents

Information processing method, device and system Download PDF

Info

Publication number
CN112396418A
CN112396418A CN202011418145.5A CN202011418145A CN112396418A CN 112396418 A CN112396418 A CN 112396418A CN 202011418145 A CN202011418145 A CN 202011418145A CN 112396418 A CN112396418 A CN 112396418A
Authority
CN
China
Prior art keywords
information
check
user
terminal
checked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011418145.5A
Other languages
Chinese (zh)
Inventor
赵德来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhibao Yunke Technology Co ltd
Beijing Huada Zhibao Electronic System Co Ltd
Original Assignee
Beijing Zhibao Yunke Technology Co ltd
Beijing Huada Zhibao Electronic System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhibao Yunke Technology Co ltd, Beijing Huada Zhibao Electronic System Co Ltd filed Critical Beijing Zhibao Yunke Technology Co ltd
Priority to CN202011418145.5A priority Critical patent/CN112396418A/en
Publication of CN112396418A publication Critical patent/CN112396418A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

The application discloses an information processing method, a device and a system, comprising the following steps: presenting information to be checked, wherein the information to be checked comprises a first check message; acquiring second check-up information input by a user; when it is determined that first verification information in the information to be verified is consistent with second verification information input by a user, a preset processing operation is executed based on the information to be verified. Therefore, as the first verification information is located in the information to be verified, when the second verification information input by the user is consistent with the first verification information in the information to be verified, it indicates that the user has browsed the information to be verified carefully and determines the verification information from the information to be verified, and the accuracy of the information to be verified can be ensured under the condition that the user browses the information to be verified, so that the safety of subsequent operation on the information to be verified can be improved.

Description

Information processing method, device and system
Technical Field
The present application relates to the field of information processing technologies, and in particular, to an information processing method, apparatus, and system.
Background
In some practical application scenarios, the user may be involved in confirming the information to be checked presented by the terminal, and the user continues to perform the corresponding processing procedure after completing the information confirmation. For example, in a bank transfer scenario, the second generation USBKEY used by a bank can display information to be signed on a screen, a user is required to check whether the information displayed by the USBKEY is consistent with the information displayed by a computer terminal/a mobile phone terminal, and when the information checked by the user is consistent, a subsequent transfer transaction process is executed, so that the risk that the signature information is tampered during transfer transaction is reduced.
However, in practical applications, the user may not carefully read the information to be checked presented by the terminal and directly perform accuracy confirmation, which reduces the security of information processing. For example, the user may directly confirm the information without carefully verifying whether the information displayed by the USBKEY is correct, so that the user cannot find the information in an information verification manner if the signature information is tampered during the transfer transaction, thereby reducing the security of the user during the transfer transaction.
Disclosure of Invention
The embodiment of the application provides an information processing method, device and system, and aims to improve the safety of information processing.
In a first aspect, an embodiment of the present application provides an information processing method, where the method includes:
presenting information to be checked, wherein the information to be checked comprises first checking information;
acquiring second check-up information input by a user;
and when the first check information is determined to be consistent with the second check information, executing preset processing operation based on the information to be checked.
In one possible embodiment, the method further comprises:
presenting first prompt information aiming at the first verification information, wherein the first prompt information comprises text information and/or voice information.
In one possible embodiment, the method further comprises:
and presenting a mark, wherein the mark is used for marking first verification information in the information to be verified.
In a possible embodiment, the information to be verified includes a mark for the first verification information, and the mark is used for marking the first verification information in the information to be verified.
In a possible implementation manner, when it is determined that the first check information is consistent with the second check information, performing a preset processing operation based on the information to be checked includes:
and when the first check information is determined to be consistent with the second check information and a preset key is clicked, executing preset processing operation based on the information to be checked.
In one possible embodiment, the method further comprises:
and presenting second prompt information, wherein the second prompt information is used for prompting the user to click the preset key.
In one possible embodiment, the first verification information includes any one or more of chinese characters, letters, symbols, and numbers.
In a possible implementation manner, before presenting the information to be collated, the method further includes: the first terminal receives the information to be checked from the server through the second terminal;
the determining that the first check-up information is consistent with the second check-up information includes:
the second terminal sends the second check-up information input by the user at the second terminal to the first terminal;
and the first terminal compares the second check information with the first check information from the server to determine whether the first check information is consistent with the second check information.
In a possible implementation manner, before presenting the information to be collated, the method further includes: the first terminal receives the information to be checked from the server through the second terminal;
the determining that the first check-up information is consistent with the second check-up information includes:
and the first terminal compares second check information input by the user at the first terminal with the first check information from the server to determine whether the first check information is consistent with the second check information.
In a possible implementation manner, before presenting the information to be collated, the method further includes: the first terminal receives the information to be checked from the server through the second terminal;
the determining that the first check-up information is consistent with the second check-up information includes:
and the second terminal compares second check information input by the user at the second terminal with the first check information from the server to determine whether the first check information is consistent with the second check information.
In a possible implementation manner, before presenting the information to be collated, the method further includes: the first terminal receives the information to be checked from the server through the second terminal;
the determining that the first check-up information is consistent with the second check-up information includes:
the second terminal sends the second check-up information input by the user at the second terminal to the server;
and the server compares the received second check information with the first check information to determine whether the first check information is consistent with the second check information.
In a second aspect, an embodiment of the present application further provides an information processing apparatus, where the apparatus includes:
the device comprises a first presentation module, a second presentation module and a verification module, wherein the first presentation module is used for presenting information to be verified, and the information to be verified comprises first verification information;
the acquisition module is used for acquiring second check information input by a user;
and the operation execution module is used for executing preset processing operation based on the information to be checked when the first check information is determined to be consistent with the second check information.
In a possible embodiment, the apparatus further comprises:
and the second presentation module is used for presenting first prompt information aiming at the first verification information, and the first prompt information comprises character information and/or voice information.
In a possible embodiment, the apparatus further comprises:
and the third presentation module is used for presenting a mark, and the mark is used for marking the first verification information in the information to be verified.
In a possible embodiment, the information to be verified includes a mark for the first verification information, and the mark is used for marking the first verification information in the information to be verified.
In a possible implementation manner, the operation executing module is specifically configured to execute a preset processing operation based on the information to be checked when it is determined that the first verification information is consistent with the second verification information and a preset key is clicked.
In a possible embodiment, the apparatus further comprises:
and the fourth presentation module is used for presenting second prompt information, and the second prompt information is used for prompting the user to click the preset key.
In one possible embodiment, the first verification information includes any one or more of chinese characters, letters, symbols, and numbers.
In a possible implementation manner, the first presenting module is specifically configured to divide the information to be checked into multiple pages for presentation, and all or part of the information in the first check information is presented in the last page.
In a third aspect, an embodiment of the present application further provides an information processing system, where the system includes:
a target terminal and a server;
the target terminal is used for presenting information to be checked, wherein the information to be checked comprises first check information and acquiring second check information input by a user;
and the server is used for executing preset processing operation based on the information to be checked when the first check information is determined to be consistent with the second check information.
In one possible embodiment, the target terminal includes a first terminal and a second terminal;
the first terminal is used for presenting the information to be checked;
the second terminal is used for acquiring second check-up information input by the user.
In a possible implementation manner, the target terminal is further configured to present first prompt information for the first verification information, where the first prompt information includes text information and/or voice information.
In a possible implementation manner, the target terminal is further configured to present a mark, where the mark is used to mark first verification information in the information to be verified.
In a possible embodiment, the information to be verified includes a mark for the first verification information, and the mark is used for marking the first verification information in the information to be verified.
In a possible implementation manner, the server is specifically configured to, when it is determined that the first verification information is consistent with the second verification information and a preset key is clicked, perform a preset processing operation based on the information to be verified.
In a possible implementation manner, the target terminal is further configured to present second prompt information, where the second prompt information is used to prompt the user to click the preset key.
In one possible embodiment, the first verification information includes any one or more of chinese characters, letters, symbols, and numbers.
In a possible implementation manner, the target terminal presents the information to be verified in a plurality of pages, and all or part of the first verification information is presented in the last page.
In one possible embodiment, the target terminal comprises a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal;
the second terminal is used for sending the second check-up information input by the user at the second terminal to the first terminal;
the first terminal is further configured to compare the second check information with the first check information from the server, and determine whether the first check information is consistent with the second check information.
In one possible embodiment, the target terminal comprises a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal; and the server is further used for comparing second check information input by the user at the first terminal with the first check information from the server to determine whether the first check information is consistent with the second check information.
In one possible embodiment, the target terminal comprises a second terminal;
the second terminal is configured to receive the information to be checked from the server, compare second check information input by the user at the second terminal with the first check information from the server, and determine whether the first check information is consistent with the second check information.
In one possible embodiment, the target terminal comprises a second terminal;
the second terminal is used for receiving the information to be checked from the server and sending second checking information input by the user at the second terminal to the server;
the server is used for comparing the received second check information with the first check information and determining whether the first check information is consistent with the second check information.
In a fourth aspect, an embodiment of the present application further provides an information processing system, where the system includes a target terminal;
the target terminal is used for presenting information to be checked, wherein the information to be checked comprises first check information and acquiring second check information input by a user; and the processing unit is used for executing preset processing operation based on the information to be checked when the first check information is determined to be consistent with the second check information.
In a possible implementation manner, the target terminal is specifically configured to divide the information to be checked into multiple pages for presentation, and all or part of the information in the first check information is presented in the last page.
In one possible embodiment, the target terminal includes a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal;
the second terminal is used for sending the second check-up information input by the user at the second terminal to the first terminal;
the first terminal is further configured to compare the second check information with the first check information from the server, and determine whether the first check information is consistent with the second check information.
In one possible embodiment, the target terminal includes a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal;
the first terminal is further configured to compare second verification information input by the user at the first terminal with the first verification information from the server, and determine whether the first verification information is consistent with the second verification information.
In one possible embodiment, the target terminal includes a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal;
the second terminal is configured to receive the information to be checked from the server, compare second check information input by the user at the second terminal with the first check information from the server, and determine whether the first check information is consistent with the second check information.
In a possible implementation, the system further comprises a server, and the target terminal comprises a second terminal;
the second terminal is used for receiving the information to be checked from the server and sending second checking information input by the user at the second terminal to the server;
the server is used for comparing the received second check information with the first check information and determining whether the first check information is consistent with the second check information.
In the foregoing implementation manner of the embodiment of the application, information to be checked, which includes the first check message, may be presented to a user, and then, the second check message input by the user is acquired, so that, when it is determined that the first check message in the information to be checked is consistent with the second check message input by the user, a preset processing operation may be performed based on the information to be checked. It can be seen that, since the first verification information is located in the information to be verified, the user usually needs to browse the displayed information to be verified carefully to verify the verification information and determine the verification information to be input from the displayed information to be verified, so that when the second verification information input by the user is consistent with the first verification information in the information to be verified, the user is said to browse the information to be verified carefully and determine the verification information from the information to be verified.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a schematic diagram of an application scenario in an embodiment of the present application;
FIG. 2 is a schematic diagram of another application scenario in the embodiment of the present application;
FIG. 3 is a flowchart illustrating an information processing method according to an embodiment of the present application;
fig. 4 is a schematic signaling interaction diagram of an information processing method in an embodiment of the present application;
FIG. 5 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
FIG. 6 is a block diagram of an information handling system according to an embodiment of the present application;
FIG. 7 is a block diagram of an embodiment of an information handling system.
Detailed Description
For the information that the user needs to check, the user may not have sufficient patience in practical application, so that the user may directly confirm the accuracy of the information without checking the information, which reduces the security of further processing the information. For example, when the transfer amount or account information that the user needs to check is falsified, the user directly confirms the transfer amount without carefully checking the information, which makes the transfer operation based on the falsified information easy to cause a large loss to the user.
Based on this, the embodiment of the application provides an information processing method to improve the safety of information processing. In specific implementation, to-be-checked information including a first check message may be presented to a user, and then, second check information input by the user may be acquired, so that, when it is determined that the first check information in the to-be-checked information is consistent with the second check information input by the user, a preset processing operation may be performed based on the to-be-checked information. It can be seen that, since the first verification information is located in the information to be verified, the user usually needs to browse the displayed information to be verified carefully to verify the verification information and determine the verification information to be input from the displayed information to be verified, so that when the second verification information input by the user is consistent with the first verification information in the information to be verified, the user is said to browse the information to be verified carefully and determine the verification information from the information to be verified.
As an example, the embodiment of the present application may be applied to an exemplary information processing system as shown in fig. 1, which may include a terminal 102 and a server 103. In the information processing system, a terminal 102 may present information to be checked, that is, information that a user needs to read and confirm that information is error-free, to a user 101, where the information to be checked includes first check information; after reading the information to be checked, the user 101 may determine the check information therefrom, and input the check information (hereinafter referred to as second check information) into the terminal 102; the terminal 102 may send the first verification information and the second verification information input by the user 101 to the server 103; the server 103 may perform consistency check on the received first check information and the second check information, and when it is determined that the first check information and the second check information are consistent, perform a preset processing operation based on the information to be checked, such as performing corresponding transfer processing based on the information to be checked, and the like.
As another example, the embodiment of the present application may be applied to an exemplary information processing system as shown in fig. 2, which may include a terminal 102 (including a terminal 1021 and a terminal 1022) and a server 103. In the information processing system, 1022 in the terminal 102 (the terminal 1022 may be a signature device or an authentication device, such as KEY; the terminal 1021 may be a mobile terminal, such as a mobile phone) may present information to be checked, which is information that the user needs to read and confirm that the information is correct, to the user 101, where the information to be checked includes first check information; after reading the information to be verified, the user 101 may determine the verification information from the information to be verified, and input the verification information (hereinafter referred to as second verification information) into the terminal 1021 or 1022 (when the user inputs the second verification information at the terminal 1022, the terminal 1022 determines whether the first verification information is consistent with the second verification information, when the user inputs the second verification information at the terminal 1021, there are two schemes, one scheme is that the terminal 1021 determines whether the first verification information is consistent with the second verification information, and sends the consistent or inconsistent information to the terminal 1022, when the terminal 1022 receives the consistent verification information, the terminal 1022 may prompt the user to press a confirmation key, after receiving a confirmation key triggered by the user, the terminal 1022 performs a preprocessing operation, such as a signature operation, and the other scheme is that the terminal 1021 sends the second verification information input by the user to the terminal 1022, the terminal 1022 determines whether the first verification information is consistent with the second verification information, when consistent, perform preprocessing operations, such as performing signature operations on the transaction information), where the preprocessing operations may include signature operations of the terminal 1022, and may also include sending the signature information to a server after the signature operations, performing corresponding transfer processing or other transaction information by the server, and so on.
It is to be understood that the above-mentioned information processing system is only one example of the system provided in the embodiments of the present application, and the embodiments of the present application are not limited to this system. For example, in other possible information processing systems, the terminal 102 may be integrated by multiple devices, as shown in fig. 2, the terminal 102 may include a terminal 1021, a terminal 1022, and the like, where the terminal 1021 may be a computer terminal or a mobile phone terminal in a transfer scenario, and the terminal 1022 may be a usb key in the transfer scenario, and the like. In the information processing system shown in fig. 1, the device for performing consistency check on the first check information and the second check information may be the terminal 102 or the like, and the check result may be transmitted to the server 103. In summary, the various possible technical solutions of the embodiments of the present application may be applied to any usable system, and are not limited to the above system examples.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, various non-limiting embodiments accompanying the present application examples are described below with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 3, fig. 3 is a schematic flowchart illustrating an information processing method in an embodiment of the present application, where the method may be applied to the information processing system shown in fig. 1 or fig. 2, and the method specifically may include:
s301: presenting information to be checked, wherein the information to be checked comprises first checking information.
The information to be checked is information that the user needs to check and confirm the accuracy of the user. For example, in the transfer transaction scenario, the information to be checked may be information including a user name, a user transfer amount, a transfer account number, and the like. In order to ensure the safety and reasonableness of the processing operation performed based on the information to be collated, it is generally necessary for the user to collate the contents of the information to be collated and confirm the accuracy thereof.
In order to improve the reading rate of the information to be checked by the user and further improve the security of processing the information to be checked, in this embodiment, when the information to be checked needs to be correspondingly processed, a part of the content in the information to be checked may be used as the verification information for verifying the security of processing the information to be checked. The user can acquire the verification information only by reading the information to be verified, so that the reading rate of the user on the information to be verified is improved, and the safety of processing the information to be verified can be improved.
As an example, the first check information may include any one or more of chinese characters, letters, symbols, and numbers. For example, in a transfer transaction scenario, the first verification information may include a transfer amount represented by a number, a transfer account (transfer object) represented by letters or Chinese characters, and the like. Alternatively, the first check information may be composed of 4 or 6 chinese characters, letters or numbers.
Further, in order to facilitate the user to determine the first verification information from the information to be verified, in a possible implementation, a first prompt for the first verification information may be presented to the user, and the first prompt may include text information and/or voice information. For example, in a transfer transaction scenario, when the first prompt message is a text prompt, the first prompt message may be "the verification message is a continuous 6-digit number in the transaction message"; or voice prompt information that the verification information is continuous 6 digits in the transaction information is broadcasted to the user.
In yet another possible embodiment, while presenting the information to be verified, a mark for the first verification information may be presented, and the mark may mark the first verification information in the information to be verified. For example, for the content as the first verification information in the information to be verified, it may be marked by using a special color or font (e.g., red, green, etc.), such as that the character content is presented in a special color, or that the character content has a special background color, etc.; alternatively, the content of the first verification information may be indicated by symbols such as "[ ]", "[ ]", "_", "()", "< >", "{ }", and the like. For example, assuming that the transfer amount of the user is 100000 (yuan) as the first verification information, it may be indicated by "[ jj ], i.e., expressed as" [ 100000 ].
In the above embodiment, the information to be verified may not include a special mark itself, but the terminal presents the special mark when presenting the information to be verified, and in another possible embodiment, the information to be verified may carry a special mark such as "[ ]", and the character content marked in the information to be verified by the special mark may be used as the first verification information.
In practical applications, while the first verification information is marked by a special mark, prompt information for the first verification information may be presented, for example, when the amount of user transfer 100000 (yuan) as the first verification information is marked by "[ next to the previous document ], prompt information such as" verification information is a word in [ next to the previous document ] in the transaction information "may be presented to the user.
S302: and acquiring second check-up information input by the user.
In this embodiment, after the user finds the verification information from the information to be verified displayed on the terminal, the found verification information (hereinafter referred to as second verification information) may be input into the terminal, so as to perform consistency verification on the first verification information.
S303: and when the first check information is determined to be consistent with the second check information, executing preset processing operation based on the information to be checked.
In this embodiment, it may be checked whether first check information in the information to be checked is consistent with second check information input by the user, and if so, it indicates that the user has read the information to be checked carefully, and finds out accurate check information therefrom, and in this case, it may be determined that the user has confirmed that the information to be checked has not been tampered or has other errors, at this time, a preset processing operation may be performed based on the information to be checked, for example, a digital signature may be performed on the information to be checked, or, in a transfer transaction scenario, a transfer operation may be performed based on the information to be checked (i.e., transaction information), or in an electronic signature scenario, an electronic signature operation may be performed on an electronic contract (obtaining other electronic documents), and the like. In this case, if the information to be checked is directly executed based on the information to be checked, the security of information processing may be affected, and therefore, in some embodiments, the user may be prompted to re-input the second check information or to reject the execution of the preset processing operation for the information to be checked this time. Further, the number of times that the user inputs the second verification information may also have a certain limitation, for example, the number of times that the user inputs the error verification information may be limited to 5 times at most.
In some possible embodiments, whether to perform a preset processing operation based on the information to be collated may also be confirmation by the user. Specifically, when it is determined that the first verification information is consistent with the second verification information, the user may click a preset key, such as a "confirm" key (or an "OK" key, etc.), where the preset key may be a physical key, or a control configured on the touch screen. When it is determined that the preset key is clicked by the user, indicating that the authorization of the user is obtained, the preset processing operation may be performed based on the information to be checked. Of course, in the case that the first verification information is inconsistent with the second verification information or the user does not click the preset key, the preset processing operation may not be performed on the information to be verified.
Further, in order to prompt the user to click the preset key, in this embodiment, when it is determined that the first verification information is consistent with the second verification information, the second prompt information may be presented to the user, where the second prompt information may be used to prompt the user to click the preset key, for example, the "no error in verification code" may be presented on a display interface of the terminal, and please press an OK key ".
In this embodiment, information to be checked including the first check message may be presented to the user, and then, the second check message input by the user may be acquired, so that, when it is determined that the first check message in the information to be checked is consistent with the second check message input by the user, a preset processing operation may be performed based on the information to be checked. It can be seen that, since the first verification information is located in the information to be verified, the user usually needs to browse the displayed information to be verified carefully to verify the verification information and determine the verification information to be input from the displayed information to be verified, so that when the second verification information input by the user is consistent with the first verification information in the information to be verified, the user is said to browse the information to be verified carefully and determine the verification information from the information to be verified.
In order to facilitate understanding of the technical solution of the embodiment of the present application, the technical solution of the embodiment of the present application is described in detail below with reference to a specific application scenario of a user transfer transaction. As shown in fig. 4, fig. 4 is a schematic signaling interaction diagram of an information processing method in an embodiment of the present application. In the embodiment shown in fig. 4, the terminal may specifically include a usb key and a mobile phone (of course, a computer may also be used), and the method may specifically include:
s401: and the mobile phone establishes connection with the USBKEY.
In this embodiment, the mobile phone may be connected to the USB key, for example, the connection may be established through a communication method such as a USB data line, audio, or bluetooth. In this embodiment, a specific implementation manner of establishing a connection between the mobile phone and the USBKEY is not limited.
The USBKEY is a hardware device with a USB interface, can be internally provided with a single chip microcomputer or an intelligent card chip, has a certain storage space, and can store a private key and a digital certificate of a user so as to realize the authentication of the user identity by using a public key algorithm internally arranged in the USBKEY. Because the user private key is stored in the coded lock and cannot be read by any mode theoretically, the safety of user authentication is ensured.
S402: the user inputs transfer information on the mobile phone, wherein the transfer information comprises a transfer account, a name of the transfer account and a transfer amount.
In practical application, when a user applies for transferring money on a mobile phone, the user usually needs to fill in the transfer amount, a transfer account and the name of the account (namely, when the transfer account is not matched with the name of the other party, the transfer transaction can be cancelled so as to improve the accuracy and the safety of the transfer).
S403: and the mobile phone sends a transfer request to the server, wherein the transfer request comprises transfer information.
After the mobile phone obtains the transfer information input by the user, a corresponding transfer request can be generated based on the transfer information and sent to the bank server so as to request the bank server to process the transfer service for the user.
S404: the server generates an XML message, wherein the XML message at least comprises transaction information, and the transaction information comprises a check code and a special mark corresponding to the check code.
In this embodiment, the server responds to the transfer request, may generate transaction information (that is, information to be checked in the foregoing embodiment) based on the transfer information, and generate a check code (that is, the first check information in the foregoing embodiment) according to the transaction information by using a preset algorithm, specifically, a part of chinese characters, letters, or numbers in the transaction information may be used as the check code, and then the check code is also a part of information in the transaction information. Then, the server may add a mark to the check code in the transaction information, such as marking by a symbol such as "[ ]", "_", "()", "< >," { } "or the like, or a special color, and the like, for indicating the check code, and arrange the check code into an XML message based on the transaction information and other related information.
It should be noted that, when the transaction information is displayed in the USBKEY, all the contents may not be presented in the screen of the USBKEY, and at this time, if the check codes are not all displayed in the same page, at least one chinese character, letter or number in the check code may be included in the last page displayed on the screen of the USBKEY.
S405: and the server sends the XML message to the mobile phone.
S406: the mobile phone analyzes the transaction information from the XML message and sends the transaction information including the special mark to the USBKEY.
The mobile phone sends the transaction information to the USBKEY through the connection established with the USBKEY in advance.
S407: the USBKEY displays the transaction information and prompt information aiming at the check code.
Since the transaction information includes a special mark for marking the check code, the user needs to carefully read the contents of the transaction information when acquiring the complete check code.
In order to facilitate the user to determine which contents in the transaction information are the check codes, the UEBKEY can present prompt information aiming at the check codes while presenting the transaction information, such as presenting "please confirm the transaction information displayed at the USBKEY screen end, and find out the words in [ c ] in the transaction information, and input the words as the check codes into the mobile phone". Alternatively, the prompt information may be presented on a mobile phone, which is not limited in this embodiment.
S408: and the user reads the transaction information displayed by the USBKEY, determines a check code based on the prompt information, and inputs the check code into the mobile phone.
During specific implementation, a user can read information displayed on the USBKEY screen through the USBKEY upturning and downturning keys on the USBKEY screen section, and find out the check code according to the prompt information. Then, the user can input the found check code into the mobile phone.
S409: and the mobile phone sends the check code input by the user to the USBKEY.
S410: and the USBKEY verifies whether the check code input by the user is consistent with the check code in the transaction information, and prompts the user to press an OK key when the check code input by the user is consistent with the check code in the transaction information.
It should be noted that if the check code input by the user is consistent with the check code in the transaction information, which indicates that the user has read the transaction information carefully and searched for the accurate check code, in this case, it can be determined that the user has confirmed that the transaction information has not been tampered or has an error, and then the security of the subsequent processing operation performed based on the transaction information can be guaranteed.
In this embodiment, when processing the transaction information, not only the check code input by the user is required to be consistent with the check code in the transaction information, but also the confirmation authorization of the user needs to be obtained. In order to inform the user of the comparison result of the check code, prompt information can be presented to the user, the prompt information can inform the user of the consistency check result of the check code and can prompt the user to execute the operation of pressing an OK key, for example, a check code is correct and the user asks to press the OK key on a USBKEY screen.
S411: the user clicks the OK button on the USBKEY.
S412: after the USBKEY calculates the hash value of the confirmed transaction information, the USBKEY signs through a personal private key in the USBKEY, and transmits the key operation information and the signature information of the user to the server through the terminal (mobile phone).
S413: the server checks the signature information through a certificate corresponding to a prestored USBKEY public key to obtain a hash value and transaction information in the signature information, calculates the hash value of the transaction information, compares the hash value obtained by checking the signature with the hash value obtained by calculation, and allows the transaction when the comparison is determined to be consistent.
Of course, if the server determines that the hash value obtained by verifying the signature is not consistent with the hash value stored in advance, the transaction may be rejected.
Further, the server can feed back prompt information of transaction success or failure to the mobile phone, so as to prompt the user that the transaction is successful or failed on the mobile phone.
It should be noted that, in the above embodiment, the mobile phone sends the verification information (i.e. the verification code) input by the user to the USBKEY, and the USBKEY verifies the verification information. In other possible embodiments, the USBKEY has a capability of providing information input by the user, for example, the USBKEY may have an input keyboard, such as a numeric keyboard or an alphabetic input keyboard, thereon, so that the user may input the check code on the USBKEY without obtaining the check code input by the user through the mobile phone, so that the USBKEY may verify the check code input by the user and determine whether to prompt the user to press an OK key according to the verification result, or the USBKEY prompts the user to press the OK key on the USBKEY through the mobile phone.
In yet another possible implementation, the device for checking the check code may also be a mobile phone. Specifically, the user can input a check code on the mobile phone, perform consistency check on the check code input by the user by using the check code from the server, and send a check result to the USBKEY, so that the USBKEY determines whether the check code input by the user is consistent with the check code sent by the server according to the received check result, and when it is determined that the two check codes are consistent, the USBKEY prompts the user to press an OK key, or the USBKEY prompts the user to press an OK key on the USBKEY through the mobile phone.
In yet another possible embodiment, the device for verifying the verification code may also be a server. Specifically, after receiving a check code input by a user, the mobile phone can directly send the check code to the server; the server carries out consistency check on the check code sent by the mobile phone by using the check code contained in the transaction information, and sends the check result to the terminal, so that the mobile phone determines whether the check code input by the user is consistent with the check code sent by the server according to the received check result, and prompts the user to press an OK key when the two check codes are consistent, or the mobile phone can prompt the user to press the OK key on the USBKEY through the USBKEY.
Of course, each of the above examples is only an exemplary illustration, and in practical applications, specific implementation such as which device the user specifically inputs the check code, and which device performs a check on the check code input by the user may be set by the user according to the needs of the practical application, which is not limited in this embodiment.
In addition, the embodiment of the application also provides an information processing device. Referring to fig. 5, fig. 5 is a schematic structural diagram illustrating an information processing apparatus in an embodiment of the present application, where the apparatus 500 may specifically include:
a first presenting module 501, configured to present information to be checked, where the information to be checked includes first checking information;
an obtaining module 502, configured to obtain second verification information input by a user;
an operation executing module 503, configured to execute a preset processing operation based on the information to be checked when it is determined that the first check information is consistent with the second check information.
In a possible implementation, the apparatus 500 further includes:
and the second presentation module is used for presenting first prompt information aiming at the first verification information, and the first prompt information comprises character information and/or voice information.
In a possible implementation, the apparatus 500 further includes:
and the third presentation module is used for presenting a mark, and the mark is used for marking the first verification information in the information to be verified.
In a possible embodiment, the information to be verified includes a mark for the first verification information, and the mark is used for marking the first verification information in the information to be verified.
In a possible implementation manner, the operation executing module 503 is specifically configured to execute a preset processing operation based on the information to be checked when it is determined that the first verification information is consistent with the second verification information and a preset key is clicked.
In a possible implementation, the apparatus 500 further includes:
and the fourth presentation module is used for presenting second prompt information, and the second prompt information is used for prompting the user to click the preset key.
In one possible embodiment, the first verification information includes any one or more of chinese characters, letters, symbols, and numbers.
In a possible implementation manner, the first presenting module is specifically configured to divide the information to be checked into multiple pages for presentation, and all or part of the information in the first check information is presented in the last page.
It should be noted that, for the contents of information interaction, execution process, and the like between the modules and units of the apparatus, since the same concept is based on the method embodiment in the embodiment of the present application, the technical effect brought by the contents is the same as that of the method embodiment in the embodiment of the present application, and specific contents may refer to the description in the foregoing method embodiment in the embodiment of the present application, and are not described herein again.
In addition, the embodiment of the application also provides an information processing system. Referring to fig. 6, fig. 6 is a schematic diagram illustrating an architecture of an information processing system according to an embodiment of the present application, where the system 600 may specifically include:
a target terminal 601 and a server 602;
the target terminal 601 is configured to present information to be checked, where the information to be checked includes first check information, and obtain second check information input by a user;
the server 602 is configured to, when it is determined that the first verification information is consistent with the second verification information, perform a preset processing operation based on the to-be-verified information, for example, in a transfer transaction scenario, the server 602 may perform a transfer operation based on the to-be-verified information (i.e., transaction information), and the like.
In one possible embodiment, the target terminal 601 includes a first terminal and a second terminal;
the first terminal is used for presenting the information to be checked;
the second terminal is used for acquiring second check-up information input by the user.
In a possible implementation manner, the target terminal 601 is further configured to present first prompt information for the first verification information, where the first prompt information includes text information and/or voice information.
In a possible implementation manner, the target terminal 601 is further configured to present a mark, where the mark is used to mark first verification information in the information to be verified.
In a possible embodiment, the information to be verified includes a mark for the first verification information, and the mark is used for marking the first verification information in the information to be verified.
In a possible implementation manner, the server 602 is specifically configured to, when it is determined that the first verification information is consistent with the second verification information and a preset key is clicked, perform a preset processing operation based on the information to be verified.
In a possible implementation manner, the target terminal 601 is further configured to present second prompt information, where the second prompt information is used to prompt the user to click the preset key.
In one possible embodiment, the first verification information includes any one or more of chinese characters, letters, symbols, and numbers.
In a possible implementation manner, the target terminal 601 divides the information to be verified into multiple pages for presentation, and all or part of the information in the first verification information is presented in the last page.
In one possible embodiment, the target terminal 601 includes a first terminal and a second terminal;
the first terminal is configured to receive the information to be checked from the server 602 through the second terminal;
the second terminal is used for sending the second check-up information input by the user at the second terminal to the first terminal;
the first terminal is further configured to compare the second check information with the first check information from the server 602, and determine whether the first check information is consistent with the second check information.
In one possible embodiment, the target terminal 601 includes a first terminal and a second terminal;
the first terminal is configured to receive the information to be checked from the server 602 through the second terminal; and is further configured to compare second verification information input by the user at the first terminal with the first verification information from the server 602, and determine whether the first verification information is consistent with the second verification information.
In one possible embodiment, the target terminal 601 comprises a second terminal;
the second terminal is configured to receive the information to be checked from the server 602, compare second checking information input by the user at the second terminal with the first checking information from the server 602, and determine whether the first checking information is consistent with the second checking information.
In one possible embodiment, the target terminal 601 comprises a second terminal;
the second terminal is configured to receive the information to be checked from the server 602, and send second checking information input by the user at the second terminal to the server 602;
the server 602 is configured to compare the received second check information with the first check information, and determine whether the first check information is consistent with the second check information.
Because the first verification information is located in the information to be verified, the user usually needs to browse the displayed information to be verified carefully to ensure that the verification information passes the verification, and determines the verification information to be input from the displayed information to be verified, so that when the second verification information input by the user is consistent with the first verification information in the information to be verified, the user is shown that the user browses the information to be verified carefully and determines the verification information from the information to be verified.
In addition, the embodiment of the application also provides an information processing system. Referring to fig. 7, fig. 7 is a schematic diagram illustrating an architecture of an information processing system in an embodiment of the present application, where the system 700 may specifically include a target terminal 701;
the target terminal 701 is configured to present information to be checked, where the information to be checked includes first check information, and obtain second check information input by a user; and is configured to perform a preset processing operation based on the information to be checked when it is determined that the first check information is consistent with the second check information, for example, the target terminal 701 may digitally sign the information to be checked.
In a possible implementation manner, the target terminal 701 is specifically configured to divide the information to be checked into multiple pages for presentation, and all or part of the information in the first check information is presented in the last page.
In a possible embodiment, the target terminal 701 includes a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal;
the second terminal is used for sending the second check-up information input by the user at the second terminal to the first terminal;
the first terminal is further configured to compare the second check information with the first check information from the server, and determine whether the first check information is consistent with the second check information.
In a possible embodiment, the target terminal 701 includes a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal;
the first terminal is further configured to compare second verification information input by the user at the first terminal with the first verification information from the server, and determine whether the first verification information is consistent with the second verification information.
In a possible embodiment, the target terminal 701 includes a first terminal and a second terminal;
the first terminal is used for receiving the information to be checked from the server through the second terminal;
the second terminal is configured to receive the information to be checked from the server, compare second check information input by the user at the second terminal with the first check information from the server, and determine whether the first check information is consistent with the second check information.
In a possible embodiment, the system 700 further comprises a server 702, and the target terminal 701 comprises a second terminal;
the second terminal is configured to receive the information to be checked from the server 702, and send second checking information input by the user at the second terminal to the server 702;
the server 702 is configured to compare the received second check information with the first check information, and determine whether the first check information is consistent with the second check information.
In the names of "first check information", "first presentation module", and the like, the "first" mentioned in the embodiments of the present application is only used for name identification, and does not represent the first in sequence. The same applies to "second", "third", "fourth", etc.
As can be seen from the above description of the embodiments, those skilled in the art can clearly understand that all or part of the steps in the above embodiment methods can be implemented by software plus a general hardware platform. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a read-only memory (ROM)/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network communication device such as a router) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the device embodiment and the system embodiment are substantially similar to the method embodiment in their specific implementations, so they are described in a relatively simple manner, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only an exemplary embodiment of the present application, and is not intended to limit the scope of the present application.

Claims (10)

1. An information processing method, characterized in that the method comprises:
presenting information to be checked, wherein the information to be checked comprises first checking information;
acquiring second check-up information input by a user;
and when the first check information is determined to be consistent with the second check information, executing preset processing operation based on the information to be checked.
2. The method of claim 1, further comprising:
presenting first prompt information aiming at the first verification information, wherein the first prompt information comprises text information and/or voice information.
3. The method of claim 1, further comprising:
and presenting a mark, wherein the mark is used for marking first verification information in the information to be verified.
4. The method according to claim 1, wherein the information to be collated includes a mark for the first collation information, the mark being used to mark the first collation information in the information to be collated.
5. The method according to claim 1, wherein when it is determined that the first verification information is identical to the second verification information, performing a preset processing operation based on the information to be verified includes:
and when the first check information is determined to be consistent with the second check information and a preset key is clicked, executing preset processing operation based on the information to be checked.
6. The method of claim 5, further comprising:
and presenting second prompt information, wherein the second prompt information is used for prompting the user to click the preset key.
7. The method according to claim 1, wherein the information to be verified is presented in a plurality of pages, and all or part of the information in the first verification information is presented in the last page.
8. An information processing apparatus characterized in that the apparatus comprises:
the device comprises a first presentation module, a second presentation module and a verification module, wherein the first presentation module is used for presenting information to be verified, and the information to be verified comprises first verification information;
the acquisition module is used for acquiring second check information input by a user;
and the operation execution module is used for executing preset processing operation based on the information to be checked when the first check information is determined to be consistent with the second check information.
9. An information processing system, the system comprising:
a target terminal and a server;
the target terminal is used for presenting information to be checked, wherein the information to be checked comprises first check information and acquiring second check information input by a user;
and the server is used for executing preset processing operation based on the information to be checked when the first check information is determined to be consistent with the second check information.
10. An information processing system, characterized in that the system comprises a target terminal;
the target terminal is used for presenting information to be checked, wherein the information to be checked comprises first check information and acquiring second check information input by a user; and the processing unit is used for executing preset processing operation based on the information to be checked when the first check information is determined to be consistent with the second check information.
CN202011418145.5A 2020-12-07 2020-12-07 Information processing method, device and system Pending CN112396418A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011418145.5A CN112396418A (en) 2020-12-07 2020-12-07 Information processing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011418145.5A CN112396418A (en) 2020-12-07 2020-12-07 Information processing method, device and system

Publications (1)

Publication Number Publication Date
CN112396418A true CN112396418A (en) 2021-02-23

Family

ID=74605123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011418145.5A Pending CN112396418A (en) 2020-12-07 2020-12-07 Information processing method, device and system

Country Status (1)

Country Link
CN (1) CN112396418A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779640A (en) * 2021-09-01 2021-12-10 北京橙色云科技有限公司 Contract signing method, contract signing device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1432148A (en) * 2000-05-31 2003-07-23 格姆普拉斯公司 Method for protection against fraudulent modification of data sent to secure electronic medium
CN101334884A (en) * 2008-07-29 2008-12-31 北京飞天诚信科技有限公司 Method and system for enhancing bank transfer safety
CN102497358A (en) * 2011-11-30 2012-06-13 汉口银行股份有限公司 Online banking transaction method
CN108431843A (en) * 2016-11-30 2018-08-21 华为技术有限公司 A kind of transaction processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1432148A (en) * 2000-05-31 2003-07-23 格姆普拉斯公司 Method for protection against fraudulent modification of data sent to secure electronic medium
CN101334884A (en) * 2008-07-29 2008-12-31 北京飞天诚信科技有限公司 Method and system for enhancing bank transfer safety
CN102497358A (en) * 2011-11-30 2012-06-13 汉口银行股份有限公司 Online banking transaction method
CN108431843A (en) * 2016-11-30 2018-08-21 华为技术有限公司 A kind of transaction processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779640A (en) * 2021-09-01 2021-12-10 北京橙色云科技有限公司 Contract signing method, contract signing device and storage medium

Similar Documents

Publication Publication Date Title
EP3499795A1 (en) Authentication system and method, and user equipment, authentication server, and service server for performing same method
CN108667622B (en) Electronic signature authentication method, system, computer device and storage medium
US9773277B2 (en) Method, terminal, server and system for information registration
CN111581653A (en) Contract document signing method, device, equipment and computer readable storage medium
CN109766483B (en) Regular expression generation method, device, computer equipment and storage medium
JP6087452B1 (en) Paper document management system
US20140195811A1 (en) Method And An Apparatus For Securely Signing Application Data
CN112396418A (en) Information processing method, device and system
CN104753940B (en) A kind of method to issue invoice, common invoice self-service terminal and server
US7415615B2 (en) Method and system for user authentication in a digital communication system
CN111050326B (en) Block chain-based short message verification method, device, equipment and medium
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
CN109658041A (en) Generating means and its generation method, the equipment and readable storage medium storing program for executing of file
JP2007249630A (en) Financial transaction system
CN112380577A (en) Multiparty-supported electronic contract repeated signing method and device and computer equipment
KR20230049942A (en) Apparatus and method for verification using mobile id based on user face
KR20180025402A (en) Off-line document tracking method and document tracking system
CN114445072A (en) Block chain transaction method and block chain transaction system
WO2020031245A1 (en) Authentication object issuing device, authentication object issuing system, authentication object issuing method, and program
KR20150105937A (en) Method for loan covenant and apparatus for using the same
CN112633271A (en) Financial transaction system authentication method based on OCR recognition
KR20140142465A (en) Method for loan covenant and apparatus for using the same
CN111190865B (en) Card configuration display method, device and computer readable storage medium
US20200242712A1 (en) Method, apparatus and system for self-service contract for mobile payments
CN116720773B (en) Bid-inviting method and device based on block bid evaluation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination