CN113205343A - Method, equipment and system for recognizing and protecting fraud messages based on biological recognition - Google Patents

Method, equipment and system for recognizing and protecting fraud messages based on biological recognition Download PDF

Info

Publication number
CN113205343A
CN113205343A CN202110629679.0A CN202110629679A CN113205343A CN 113205343 A CN113205343 A CN 113205343A CN 202110629679 A CN202110629679 A CN 202110629679A CN 113205343 A CN113205343 A CN 113205343A
Authority
CN
China
Prior art keywords
white list
url
mobile terminal
link
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110629679.0A
Other languages
Chinese (zh)
Inventor
雷雨
薛贝娜
赵旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202110629679.0A priority Critical patent/CN113205343A/en
Publication of CN113205343A publication Critical patent/CN113205343A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method, equipment and a system for identifying and protecting fraud messages based on biological identification, which relate to the technical field of mobile interconnection, and the method comprises the following steps: acquiring a URL white list through a mobile phone bank; the wearable device brings the URL white list into a white list library; when a popup appears in a mobile phone bank in the using process or a short message sent by the bank is received, and the popup or a link on the short message needs to be accessed, the mobile terminal initiates an access request; the wearable device judges whether the linked URL is in a URL white list or not; if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed; if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed; if no forced access is made, the link is ignored.

Description

Method, equipment and system for recognizing and protecting fraud messages based on biological recognition
Technical Field
The invention relates to the technical field of mobile interconnection, in particular to a method, equipment and a system for recognizing and protecting fraud messages based on biological identification.
Background
With the explosion of internet finance, message-based financial fraud is increasing. Due to the traversals of the pseudo base station (short message counterfeiting) and the malicious APP (APP message counterfeiting, malicious pop-up window and the like), many users cannot correctly identify real bank information and fraud information, and access to the malicious URL is cheated to obtain personal information, passive transaction and the like. For example, a user receives a short message sent by a pseudo base station (by modifying a sending number) to imitate a certain bank, if the identity card number is expired, the user needs to visit a xxx.com website for re-entry, and after the user enters the identity card number, the user information is stolen to carry out other transactions and fund embezzlement. This is often prohibited and there is no effective containment.
In view of the above, a technical solution that can solve the above problems, recognize fraud messages, uniformly protect fraud, and reduce the risk of financial fraud for users is needed.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a method, equipment and a system for recognizing and protecting fraud messages based on biological recognition. The method and the system mainly identify the fraud messages through the wearable equipment, reduce the risk of financial fraud of the user, and uniformly protect fraud. In order to prevent financial fraud of the user, the functions of accessing the external link by the mobile phone browser are all closed; the method comprises the steps that only a wearable device is opened to call a browser, a business link white list set by a bank is stored in the wearable device, all mobile phone devices access external links according to requirements, requests are sent to the wearable device through Bluetooth, the wearable device judges whether the mobile phone devices are in an allowed call list or not through judgment, if yes, the wearable device initiates link access, if not, a risk prompting is carried out on a user, namely fraud link possibly exists, the user initiates calling after fingerprint verification confirmation, and if not, the user cannot initiate access. The whole scheme can effectively reduce the financial fraud risk of the user, and the fraud is uniformly protected.
In a first aspect of an embodiment of the present invention, a method for recognizing and protecting fraud messages based on biometric identification is provided, the method including:
the method comprises the steps that a URL white list is obtained through a mobile phone bank, and the URL white list is sent to wearable equipment;
the wearable device brings the URL white list into a white list library;
when a pop window appears in a mobile phone bank in the using process or a short message sent by the bank is received, and the link on the pop window or the short message needs to be accessed, initiating an access request by the mobile terminal and sending the access request to the wearable equipment;
the wearable device judges whether the linked URL is in a URL white list or not according to the URL white list stored in the white list library; wherein the content of the first and second substances,
if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; wherein the content of the first and second substances,
if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed;
if no forced access is made, the link is ignored.
Further, acquire URL white list through cell-phone bank to send URL white list to wearable equipment, include:
downloading a mobile phone bank at the mobile terminal, and acquiring a URL white list at a corresponding bank system through the mobile phone bank;
the communication connection between the mobile terminal and the wearable device is established through the Bluetooth connection module, and the URL white list is sent to the wearable device.
Further, the wearable device incorporates the URL whitelist into a whitelist library, including:
and after receiving the new URL white list, updating the white list library, and prompting the user to add a new URL through a popup window.
Further, if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed, including:
the biometric authentication mode at least comprises one or more combinations of fingerprint identification, face identification, iris identification and lip language identification.
In a second aspect of the embodiments of the present invention, a wearable device for recognizing and protecting fraud messages based on biometric identification is provided, the wearable device comprising: the system comprises a communication module, a white list library, an inquiry module and a biological identification authentication module; wherein the content of the first and second substances,
the communication module is used for establishing communication connection between the wearable device and the mobile terminal;
the communication module is also used for acquiring a URL white list sent by the mobile terminal and bringing the URL white list into a white list library; the URL white list is acquired by a corresponding bank system of a mobile phone bank of the mobile terminal and is sent to the wearable device;
the white list library is used for storing URL white lists;
the communication module is also used for acquiring an access request sent by the mobile terminal; when a pop window appears in a mobile phone bank in the using process or a short message sent by the bank is received and a link on the pop window or the short message needs to be accessed, the mobile terminal initiates an access request and sends the access request to the wearable equipment;
the query module is used for querying whether the linked URL is in a URL white list stored in a white list library or not according to the access request; wherein the content of the first and second substances,
if the verification pass information is in the URL white list, generating verification pass information and sending the verification pass information to the mobile terminal to allow the access link;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly;
the biometric authentication module is used for carrying out biometric authentication on the user when the user carries out forced access, generating authentication passing information after the authentication is passed, and sending the authentication passing information to the mobile terminal to allow the user to continue accessing the link;
if no forced access is made, the link is ignored.
Furthermore, the communication module is a bluetooth connection module and is used for establishing bluetooth connection between the mobile terminal and the wearable device.
Further, the white list library is further configured to:
and after receiving the new URL white list, updating the URL white list in the white list library, and prompting the user to add a new URL through a popup window.
Furthermore, the biometric authentication mode of the biometric authentication module at least comprises one or more combinations of fingerprint identification, face identification, iris identification and lip language identification.
In a third aspect of the embodiments of the present invention, a system for recognizing and protecting fraud messages based on biometric identification is provided, the system comprising: a mobile terminal and a wearable device; wherein the content of the first and second substances,
the mobile terminal acquires the URL white list through a mobile phone bank and sends the URL white list to the wearable device;
the wearable device brings the URL white list into a white list library;
when a popup occurs in a mobile phone bank of the mobile terminal in the using process or a short message sent by the bank is received and a link on the popup or the short message needs to be accessed, the mobile terminal initiates an access request and sends the access request to the wearable equipment;
the wearable device judges whether the linked URL is in a URL white list or not according to the URL white list stored in the white list library; wherein the content of the first and second substances,
if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; wherein the content of the first and second substances,
if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed;
if no forced access is made, the link is ignored.
In a fourth aspect of the embodiments of the present invention, a computer device is presented, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method of biometric-based fraud message identification and protection when executing the computer program.
In a fifth aspect of embodiments of the present invention, a computer-readable storage medium is presented, which stores a computer program that, when executed by a processor, implements a method for biometric-based fraud message identification and protection.
According to the method, the device and the system for recognizing and protecting the fraud message based on the biological recognition, the URL white list is obtained through the mobile phone bank, and the URL white list is sent to the wearable device; the wearable device brings the URL white list into a white list library; when a pop window appears in a mobile phone bank in the using process or a short message sent by the bank is received, and the link on the pop window or the short message needs to be accessed, initiating an access request by the mobile terminal and sending the access request to the wearable equipment; the wearable device judges whether the linked URL is in a URL white list or not according to the URL white list stored in the white list library; if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed; if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed; if not, ignoring the link; according to the method and the device, the wearable device is arranged, the Bluetooth transmission between the wearable device and the mobile terminal is established, the security risks that a white list is tampered, a matching result is tampered, the Internet transmission is tampered and the like caused by the mobile terminal being attacked are avoided, the fraud messages can be identified through the whole scheme, the fraud unified protection is realized, the financial fraud risk of a user is effectively reduced, and the property security of the user is protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of a method for recognizing and protecting fraud messages based on biometric identification according to an embodiment of the present invention.
Fig. 2 is a detailed flowchart illustrating the process of obtaining the white list of URLs according to an embodiment of the present invention.
FIG. 3 is a schematic diagram of wearable device architecture for biometric-based fraud message identification and protection according to an embodiment of the present invention.
FIG. 4 is a system architecture diagram of the biometric-based fraud message identification and protection according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The principles and spirit of the present invention will be described with reference to a number of exemplary embodiments. It is understood that these embodiments are given solely for the purpose of enabling those skilled in the art to better understand and to practice the invention, and are not intended to limit the scope of the invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
According to the embodiment of the invention, a method, equipment and a system for recognizing and protecting fraud messages based on biological recognition are provided, and the technical field of mobile interconnection is involved. The wearable device is in the shape of a bracelet, and in order to prevent financial fraud of a user, the functions of accessing external links by a mobile phone browser are all closed. The method comprises the steps that only a bracelet is opened to call a browser, the bracelet stores a business link white list set by a bank, all mobile phone equipment accesses the external link requirements, a request is sent to the bracelet through Bluetooth, the bracelet judges whether the mobile phone equipment is in an allowed call list or not through judgment, if the mobile phone equipment is in the allowed call list, link access is initiated by the bracelet, if the mobile phone equipment is not in the allowed call list, a risk prompt is given to a user, namely fraud link is possible, the user initiates calling after fingerprint verification is confirmed, and if the user is not in the allowed call list, the user cannot initiate calling.
The principles and spirit of the present invention are explained in detail below with reference to several representative embodiments of the invention.
FIG. 1 is a flow chart of a method for recognizing and protecting fraud messages based on biometric identification according to an embodiment of the present invention. As shown in fig. 1, the method includes:
step S1, acquiring a URL white list through a mobile phone bank, and sending the URL white list to wearable equipment;
step S2, the wearable device brings the URL white list into a white list library;
step S3, when the mobile phone bank has a popup window or receives a short message sent by the bank and needs to access the popup window or a link on the short message, the mobile terminal initiates an access request and sends the access request to the wearable device;
step S4, the wearable device judges whether the linked URL is in the URL white list according to the URL white list stored in the white list library; wherein the content of the first and second substances,
step S5, if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed;
step S6, if not in the URL white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; wherein the content of the first and second substances,
step S7, if the user accesses forcibly, the user is authenticated by biological identification and the access to the link is allowed after the authentication is passed;
in step S8, if no forced access is made, the link is ignored.
Fig. 2 is a schematic diagram illustrating a detailed process of obtaining a URL white list according to an embodiment of the present invention. As shown in fig. 2, the specific flow of step S1 is:
step S101, downloading a mobile phone bank at a mobile terminal, and acquiring a URL white list at a corresponding bank system through the mobile phone bank;
and S102, establishing communication connection between the mobile terminal and the wearable device through the Bluetooth connection module, and sending the URL white list to the wearable device.
In step S2, the specific process further includes:
and after receiving the new URL white list, updating the white list library, and prompting the user to add a new URL through a popup window. Because the URL white list can be adjusted, newly added or deleted according to actual conditions, after the URL white list in the bank system changes, the URL white list in the white list library can be updated through the bank system, the mobile phone bank and the wearable device.
In step S7, the biometric authentication method at least includes one or more of fingerprint recognition, face recognition, iris recognition and lip language recognition.
According to the fraud message identification and protection method based on biological identification, fraud unified protection can be performed through the URL white list stored in the wearable device and biological identification authentication, the risk of financial fraud of a user is reduced, and safety risks such as white list tampering, matching result tampering, internet transmission tampering and the like caused by attack of a mobile phone of the user are avoided by adopting Bluetooth transmission. Additionally, whitelists may be block-chained to prevent attacks from wearable devices from being tampered with.
For a more clear explanation of the above method for recognizing and protecting fraud messages based on biometric identification, the following description is given with reference to a specific embodiment.
After a user downloads a mobile phone bank, the mobile phone sends the URL white list of the bank corresponding to the mobile phone bank to the bracelet through Bluetooth.
And after the bracelet receives the URL white list, the bracelet brings the white list into a total URL white list, and a popup window reminds the user of adding a new URL.
When the popup window appears in the APP in the using process, or a user receives a short message sent by a bank and needs to access an unknown link on the popup window or the short message, the mobile phone sends a request to the bracelet, and the bracelet judges whether the request is in the white list or not according to the white list.
If the verification result is in the white list, the verification result is directly sent like a mobile phone to access.
And if the bracelet is not found in the white list, alarming the user to 'possibly be a fraud link', prompting to inquire whether to access forcibly, if the user agrees, authorizing through fingerprint verification, and if not, ignoring.
The bracelet sends the verification result to the mobile phone and carries out the next operation.
It should be noted that although the operations of the method of the present invention have been described in the above embodiments and the accompanying drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the operations shown must be performed, to achieve the desired results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Having described the method of the exemplary embodiment of the present invention, the wearable device and system for biometric-based fraud message identification and protection of the exemplary embodiment of the present invention will be described with reference to fig. 3 to 4.
The implementation of the wearable device and the system for recognizing and protecting fraud messages based on biometric identification can be referred to the implementation of the above method, and repeated details are omitted. The term "module" or "unit" used hereinafter may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Referring to fig. 3, a wearable device architecture for biometric-based fraud message identification and protection according to an embodiment of the present invention is shown.
As shown in fig. 3, the wearable device includes: a communication module 310, a white list library 320, a query module 330 and a biometric authentication module 340; wherein the content of the first and second substances,
the communication module 310 is configured to establish a communication connection between the wearable device and the mobile terminal;
the communication module 310 is further configured to obtain a URL white list sent by the mobile terminal, and bring the URL white list into the white list library 320; the URL white list is acquired by a corresponding bank system of a mobile phone bank of the mobile terminal and is sent to the wearable device;
the white list library 320 is used for storing URL white lists;
the communication module 310 is further configured to obtain an access request sent by the mobile terminal; when a pop window appears in a mobile phone bank in the using process or a short message sent by the bank is received and a link on the pop window or the short message needs to be accessed, the mobile terminal initiates an access request and sends the access request to the wearable equipment;
the query module 330 is configured to query whether the linked URL is in a URL white list stored in a white list repository according to the access request; wherein the content of the first and second substances,
if the verification pass information is in the URL white list, generating verification pass information and sending the verification pass information to the mobile terminal to allow the access link;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly;
the biometric authentication module 340 is configured to perform biometric authentication on the user when the user performs forced access, generate authentication passing information after the user passes the authentication, and send the authentication passing information to the mobile terminal to allow the user to continue accessing the link;
if no forced access is made, the link is ignored.
In this embodiment, the communication module 310 is a bluetooth connection module, and is configured to establish a bluetooth connection between the mobile terminal and the wearable device.
In this embodiment, the white list library 320 is further configured to:
and after receiving the new URL white list, updating the URL white list in the white list library, and prompting the user to add a new URL through a popup window.
In this embodiment, the biometric authentication performed by the biometric authentication module 340 at least includes one or more combinations of fingerprint recognition, face recognition, iris recognition and lip language recognition.
Based on the same inventive concept, the present invention further provides a system for recognizing and protecting fraud messages based on biometric identification, as shown in fig. 4, the system comprises: a mobile terminal 410 and a wearable device 420; wherein the content of the first and second substances,
the mobile terminal 410 acquires a URL white list through a mobile banking, and sends the URL white list to the wearable device 420;
the wearable device 420 brings the URL whitelist into a whitelist library;
when a pop window appears in a mobile phone bank of the mobile terminal 410 in the using process or a short message sent by the bank is received and a link on the pop window or the short message needs to be accessed, the mobile terminal 410 initiates an access request and sends the access request to the wearable device 420;
the wearable device 420 determines whether the linked URL is in the URL white list according to the URL white list stored in the white list library; wherein the content of the first and second substances,
if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal 410 to allow the link to be accessed;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal 410, reminding the user of the risk through the mobile terminal 410, and inquiring whether to access forcibly; wherein the content of the first and second substances,
if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed;
if no forced access is made, the link is ignored.
It should be noted that although several modules of the system of biometric-based fraud message identification and protection are mentioned in the above detailed description, such partitioning is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the modules described above may be embodied in one module according to embodiments of the invention. Conversely, the features and functions of one module described above may be further divided into embodiments by a plurality of modules.
Based on the aforementioned inventive concept, as shown in fig. 5, the present invention further proposes a computer device 500, comprising a memory 510, a processor 520 and a computer program 530 stored on the memory 510 and being executable on the processor 520, wherein the processor 520 executes the computer program 530 to implement the aforementioned method for recognizing and protecting fraud messages based on biometric identification.
Based on the foregoing inventive concept, the present invention proposes a computer-readable storage medium storing a computer program, which when executed by a processor implements the foregoing method for recognizing and protecting fraud messages based on biometric identification.
According to the method, the device and the system for recognizing and protecting the fraud message based on the biological recognition, the URL white list is obtained through the mobile phone bank, and the URL white list is sent to the wearable device; the wearable device brings the URL white list into a white list library; when a pop window appears in a mobile phone bank in the using process or a short message sent by the bank is received, and the link on the pop window or the short message needs to be accessed, initiating an access request by the mobile terminal and sending the access request to the wearable equipment; the wearable device judges whether the linked URL is in a URL white list or not according to the URL white list stored in the white list library; if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed; if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed; if not, ignoring the link; according to the method and the device, the wearable device is arranged, the Bluetooth transmission between the wearable device and the mobile terminal is established, the security risks that a white list is tampered, a matching result is tampered, the Internet transmission is tampered and the like caused by the mobile terminal being attacked are avoided, the fraud messages can be identified through the whole scheme, the fraud unified protection is realized, the financial fraud risk of a user is effectively reduced, and the property security of the user is protected.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (11)

1. A method of biometric-based fraud message identification and protection, the method comprising:
the method comprises the steps that a URL white list is obtained through a mobile phone bank, and the URL white list is sent to wearable equipment;
the wearable device brings the URL white list into a white list library;
when a pop window appears in a mobile phone bank in the using process or a short message sent by the bank is received, and the link on the pop window or the short message needs to be accessed, initiating an access request by the mobile terminal and sending the access request to the wearable equipment;
the wearable device judges whether the linked URL is in a URL white list or not according to the URL white list stored in the white list library; wherein the content of the first and second substances,
if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; wherein the content of the first and second substances,
if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed;
if no forced access is made, the link is ignored.
2. The method of biometric-based fraud message identification and protection according to claim 1, wherein obtaining the URL whitelist by a cell phone bank and sending the URL whitelist to the wearable device comprises:
downloading a mobile phone bank at the mobile terminal, and acquiring a URL white list at a corresponding bank system through the mobile phone bank;
the communication connection between the mobile terminal and the wearable device is established through the Bluetooth connection module, and the URL white list is sent to the wearable device.
3. The method of biometric-based fraud message identification and protection according to claim 1, wherein the wearable device incorporates a URL whitelist into a whitelist library, comprising:
and after receiving the new URL white list, updating the white list library, and prompting the user to add a new URL through a popup window.
4. The method of biometric-based fraud message identification and protection according to claim 1, wherein if the user has forced access, the user is biometrically authenticated and access to said link is allowed after authentication, comprising:
the biometric authentication mode at least comprises one or more combinations of fingerprint identification, face identification, iris identification and lip language identification.
5. A wearable device for biometric-based fraud message identification and protection, the wearable device comprising: the system comprises a communication module, a white list library, an inquiry module and a biological identification authentication module; wherein the content of the first and second substances,
the communication module is used for establishing communication connection between the wearable device and the mobile terminal;
the communication module is also used for acquiring a URL white list sent by the mobile terminal and bringing the URL white list into a white list library; the URL white list is acquired by a corresponding bank system of a mobile phone bank of the mobile terminal and is sent to the wearable device;
the white list library is used for storing URL white lists;
the communication module is also used for acquiring an access request sent by the mobile terminal; when a pop window appears in a mobile phone bank in the using process or a short message sent by the bank is received and a link on the pop window or the short message needs to be accessed, the mobile terminal initiates an access request and sends the access request to the wearable equipment;
the query module is used for querying whether the linked URL is in a URL white list stored in a white list library or not according to the access request; wherein the content of the first and second substances,
if the verification pass information is in the URL white list, generating verification pass information and sending the verification pass information to the mobile terminal to allow the access link;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly;
the biometric authentication module is used for carrying out biometric authentication on the user when the user carries out forced access, generating authentication passing information after the authentication is passed, and sending the authentication passing information to the mobile terminal to allow the user to continue accessing the link;
if no forced access is made, the link is ignored.
6. The wearable apparatus for biometric-based fraud message identification and protection according to claim 5, wherein said communication module is a Bluetooth connection module for establishing a Bluetooth connection of a mobile terminal with a wearable apparatus.
7. The wearable apparatus for biometric-based fraud message identification and protection according to claim 5, wherein said whitelist library is further for:
and after receiving the new URL white list, updating the URL white list in the white list library, and prompting the user to add a new URL through a popup window.
8. The wearable apparatus for biometric-based fraud message identification and protection according to claim 5, wherein the manner of biometric authentication by said biometric authentication module comprises at least a combination of one or more of fingerprint recognition, face recognition, iris recognition and lip language recognition.
9. A system for biometric-based fraud message identification and protection, the system comprising: a mobile terminal and a wearable device; wherein the content of the first and second substances,
the mobile terminal acquires the URL white list through a mobile phone bank and sends the URL white list to the wearable device;
the wearable device brings the URL white list into a white list library;
when a popup occurs in a mobile phone bank of the mobile terminal in the using process or a short message sent by the bank is received and a link on the popup or the short message needs to be accessed, the mobile terminal initiates an access request and sends the access request to the wearable equipment;
the wearable device judges whether the linked URL is in a URL white list or not according to the URL white list stored in the white list library; wherein the content of the first and second substances,
if the link is in the white list, generating verification passing information and sending the verification passing information to the mobile terminal to allow the link to be accessed;
if the URL is not in the white list, generating alarm information and sending the alarm information to the mobile terminal, reminding the user of the risk through the mobile terminal, and inquiring whether to access forcibly; wherein the content of the first and second substances,
if the user performs forced access, performing biometric authentication on the user, and allowing access to the link after the authentication is passed;
if no forced access is made, the link is ignored.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 4 when executing the computer program.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any of claims 1 to 4.
CN202110629679.0A 2021-06-07 2021-06-07 Method, equipment and system for recognizing and protecting fraud messages based on biological recognition Pending CN113205343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110629679.0A CN113205343A (en) 2021-06-07 2021-06-07 Method, equipment and system for recognizing and protecting fraud messages based on biological recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110629679.0A CN113205343A (en) 2021-06-07 2021-06-07 Method, equipment and system for recognizing and protecting fraud messages based on biological recognition

Publications (1)

Publication Number Publication Date
CN113205343A true CN113205343A (en) 2021-08-03

Family

ID=77024034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110629679.0A Pending CN113205343A (en) 2021-06-07 2021-06-07 Method, equipment and system for recognizing and protecting fraud messages based on biological recognition

Country Status (1)

Country Link
CN (1) CN113205343A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113660238A (en) * 2021-08-10 2021-11-16 建信金融科技有限责任公司 Man-machine recognition method, device, system, equipment and readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113660238A (en) * 2021-08-10 2021-11-16 建信金融科技有限责任公司 Man-machine recognition method, device, system, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
AU2019221570B2 (en) Asset management method and apparatus, and electronic device
JP6875178B2 (en) Fraud-proof permissions and authentication on smartphones for secure interaction
US9801048B1 (en) Uniquely identifying a mobile electronic device
JP2021511561A (en) Asset management methods and equipment as well as electronic devices
JP2021509983A (en) Asset management methods and equipment as well as electronic devices
US20220201478A1 (en) Intelligent method for sim-swap fraud detection and prevention
US11924201B1 (en) Authentication for application downloads
US10789957B1 (en) Home assistant wireless communication service subscriber self-service
US11887124B2 (en) Systems, methods and computer program products for securing electronic transactions
CN108595950A (en) A kind of safe Enhancement Methods of SGX of combination remote authentication
CN109496443A (en) Mobile authentication method and system for it
GB2551246A (en) Smartphone fraud-proof authorization and authentication for secure interactions
WO2018176020A1 (en) System and method for confirming a person's identity
CN113205343A (en) Method, equipment and system for recognizing and protecting fraud messages based on biological recognition
Moon et al. Towards the advancement of cashless transaction: A security analysis of electronic payment systems
WO2022093353A1 (en) Using multi-factor and/or inherence-based authentication to selectively enable performance of an operation prior to or during release of code
KR101879843B1 (en) Authentication mehtod and system using ip address and short message service
KR101876672B1 (en) Digital signature method using block chain and system performing the same
CN113411322A (en) Network traffic monitoring method and device for preventing financial fraud based on block chain
Egners et al. Hackers in your pocket: A survey of smartphone security across platforms
JP2016031625A (en) User authentication system
CN115208611A (en) Identity authentication method, identity authentication device, computer equipment, storage medium and program product
US20230130024A1 (en) System and method for storing encryption keys for processing a secured transaction on a blockchain
US11394766B2 (en) Systems and methods for establishing, using, and recovering universal digital identifiers
US9875474B2 (en) Method for securing a transaction performed by bank card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination