CN103903127A - Claims framework and implementation method thereof - Google Patents

Claims framework and implementation method thereof Download PDF

Info

Publication number
CN103903127A
CN103903127A CN201210567971.5A CN201210567971A CN103903127A CN 103903127 A CN103903127 A CN 103903127A CN 201210567971 A CN201210567971 A CN 201210567971A CN 103903127 A CN103903127 A CN 103903127A
Authority
CN
China
Prior art keywords
network address
user
unknown
module
framework
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210567971.5A
Other languages
Chinese (zh)
Inventor
甘灿
徐建新
徐鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Shell Internet Beijing Security Technology Co Ltd
Zhuhai Juntian Electronic Technology Co Ltd
Beijing Kingsoft Internet Science and Technology Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Shell Internet Beijing Security Technology Co Ltd
Zhuhai Juntian Electronic Technology Co Ltd
Beijing Kingsoft Internet Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd, Shell Internet Beijing Security Technology Co Ltd, Zhuhai Juntian Electronic Technology Co Ltd, Beijing Kingsoft Internet Science and Technology Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201210567971.5A priority Critical patent/CN103903127A/en
Publication of CN103903127A publication Critical patent/CN103903127A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Abstract

The invention relates to a claims framework and a realization method thereof. The claims dare framework comprises a judging module, a safety module, a recording module and a service order number generating module, when a user logs in a website, the judging module firstly judges whether the user logs in the website which is a payment platform website, if the user logs in the website which is the payment platform website, an instruction is sent to the safety module, the online shopping mode is entered, the safety level of the system is improved through the safety module, then the online shopping behavior of the user is recorded through the recording module, a behavior log is generated, and the service order number generating module generates a service order number according to the behavior log. Compared with the prior art, the claimed framework improves the security level of the system in the online shopping mode, records the online shopping behavior of the user and generates the service order number. And the online shopping behavior log analysis of the user can be called according to the service ticket number, and corresponding compensation is provided. Thereby ensuring the safety of online shopping and shopping confidence of users.

Description

One dares to pay for framework and its implementation
Technical field
The present invention relates to communications field information security field, be specifically related to one and dare to pay for framework and its implementation.
Background technology
Ecommerce is a kind of means that carry on trade via electronic equipment, and it has accelerated transmission and the covering of information.It provides the chance of worldwide distribution, sell goods and service.Because internet extends to most of potential consumers' great potential, and it is in the validity of scattering about the message of products & services, and people are just attempting implementing transaction to utilize this new platform by suitable website.Along with the development of network technology and ecommerce, the commodity (being commonly called as net purchase) of liking by Online Shopping oneself have become numerous netizens' daily behavior, and the various net purchases website including Taobao, ebay provides various commodity to conclude the business by network.
In net purchase process, buyer's purchasing model is: need to search for and browse extensive stock information on the net according to oneself, find suitable oneself commodity, then click and buy, enter the transaction page of pay invoice, input bank card or credit card account or password, conclude the business by Web bank or third party's payment platform.In online transaction process, some lawless person imitates the mode of shopping website by fishing website, inveigle user to enter Web bank or third party's payment platform, input account and password, money is given to lawless person's account, cause unpredictable loss to buyer, seriously affected the development of on-line finance service, ecommerce.
Thus, method and the software of various detections and interception fishing website arise at the historic moment.But the application of these detections and interception fishing website does not ensure the result that it is final, likely do not intercept certain and go fishing network address and cause damage to user, and these losses are not responsible compensations as the supplier of interception fishing website.Therefore, cannot give the enough use confidence of consumer.
Summary of the invention
The object of the invention is to overcome shortcoming of the prior art with not enough, provide one to dare to pay for framework and its implementation.
The present invention adopts following technical scheme to realize: a kind of implementation method of daring to pay for framework, comprises the steps:
Step 1: whether the network address that judges the current login of user is payment platform network address; If so, enter step 2, if not, detection of end;
Step 2: enter net purchase pattern, Hoisting System safe class;
Step 3: recording user net purchase behavior, and generate user behaviors log;
Step 4: according to user behaviors log, the single numbering of the service that generates.
Further, also comprise step 5: according to the net purchase behavior of the single numbering of service analysis user.
Further, the present invention also provides one to dare to pay for framework, it comprises judge module, security module, logging modle and service odd numbers generation module, in the time that user logins a network address, whether what first this judge module judged this user's login is payment platform network address, if be judged as payment platform network address, send instruction to security module, enter net purchase pattern, by security module Hoisting System safe class, then by logging modle recording user net purchase behavior, and generate user behaviors log, and serve odd numbers generation module according to user behaviors log, the single numbering of the service that generates.
Further, also comprise analysis module, it is according to the net purchase behavior of the single numbering of service analysis user.
With respect to prior art, of the present inventionly dare to pay for framework and its implementation in the time user's net purchase being detected, enter net purchase pattern, the safe class of Hoisting System, the net purchase behavior of recording user also generates service odd numbers.When user does shopping and when entering fishing website and sustaining a loss, can provide this service list numbering under net purchase pattern.Net purchase user behaviors log that can invoke user according to the single numbering of service is analyzed, and corresponding reparation is provided.Thereby safety and the shopping confidence of user's net purchase are ensured.
In order to understand more clearly the present invention, set forth the specific embodiment of the present invention below with reference to brief description of the drawings.
Brief description of the drawings
Fig. 1 is the process flow diagram that the present invention dares to pay for framework.
Fig. 2 is the particular flow sheet of the S13 of step shown in Fig. 1.
Fig. 3 is the module diagram that the present invention dares to pay for framework.
Embodiment
Refer to Fig. 1, it is the process flow diagram that the present invention dares to pay for framework.This implementation method of daring to pay for framework comprises the steps:
Step S11: user logins a network address.
Step S12: whether the network address that judges the current login of user is payment platform network address.
Particularly, be provided with a payment platform network address storehouse in client, in this payment platform network address storehouse, collected current all payment platform network address, comprise bank paying platform, third party's payment platform etc.All network address in the network address of the current login of user and payment platform network address storehouse are compared, if mate with a network address in this payment platform network address storehouse, judge that the network address of the current login of user is payment platform network address, enter step S13.If do not mate with a network address in this payment platform network address storehouse, the network address that judges the current login of user is non-payment platform network address, detection of end.
Step S13: enter net purchase pattern, Hoisting System safe class.Please refer to Fig. 2, concrete, carry out as follows Hoisting System safe class:
Step S131: scanning current system environment, has judged whether suspicious program operation.If so, finish current suspicious program, then enter step S132, if not, directly enter step S132.
Step S132: whether scanning browser has the module of the loading of virus or the unknown.If so, close current browser, open new browser, and show and current network address then enter step S133, if not, directly enter step S133.
Step S133: judged whether unknown modules injection and distorted.If so, forbid unknown modules injection and distort, then entering step S134, if not, directly entering step S134.
Step S134: judge whether this network address is fishing network address.If so, close current network address, then enter step S135, if not, directly enter step S135.
Step S135: forbid that user moves unknown software and bogusware.
Step S14: recording user net purchase behavior, and generate user behaviors log.
Particularly, record following content: 1) user's net purchase network address and payment web site; 2) unknown network address; 3) unknown file of downloading; 4) program of current operation.
Step S15: according to user behaviors log, the single numbering of the service that generates.
Step S16: according to the net purchase behavior of the single numbering of service analysis user.
When user does shopping and when entering fishing website and sustaining a loss, can provide this service list numbering under net purchase pattern.Net purchase user behaviors log that can invoke user according to the single numbering of service is analyzed, and corresponding reparation is provided.Thereby safety and the confidence of user's net purchase are ensured.
Refer to Fig. 2, it is the module diagram of daring to pay for framework of the present invention.This is dared to pay for framework and comprises judge module 22, security module 23, logging modle 24, service odd numbers generation module 25 and analysis module 26.When user logins a network address, whether what first this judge module 21 judged this user's login is payment platform network address, if be judged as payment platform network address, sends instruction to security module 23, enters net purchase pattern, by security module 23 Hoisting System safe classes.Then pass through logging modle 24 recording user net purchase behaviors, and generate user behaviors log.Service odd numbers generation module 25 is according to user behaviors log, and the service that generates is single numbers.When user does shopping and when entering fishing website and sustaining a loss, can provide this service list numbering under net purchase pattern, the net purchase user behaviors log that analysis module 26 can invoke user according to the single numbering of service is analyzed, and corresponding reparation is provided.
Further, this judge module 21 comprises a payment platform network address storehouse 222, and this payment platform network address storehouse 222 is interior has collected current all payment platform network address, comprises bank paying platform, third party's payment platform etc.All network address in the network address of the current login of user and payment platform network address storehouse 222 are compared, if mate with a network address in this payment platform network address storehouse 222, the network address that judges the current login of user is payment platform network address.
This security module 23 further comprises that suspicious program scanning unit 231, virus and unknown load-on module scanning element 232, unknown modules injection judging unit 233, fishing network address judging unit 234, the unknown and bogusware stop unit 235.Enter after net purchase pattern, need sequentially pass through the detection of security module 23 said units.
Wherein, this suspicious program scanning unit 231 scans current system environment, has judged whether suspicious program operation, if so, finishes current suspicious program.Whether this virus and unknown load-on module scanning element 232 scan browser the module of the loading of virus or the unknown, if so, closes current browser, opens new browser, and shows current network address.This unknown modules is injected judging unit 233 and has been judged whether unknown modules injection and distorted, and if so, forbids unknown modules injection and distorts.This fishing network address judging unit 234 judges that whether this network address is fishing network address, if so, closes current network address.This unknown and bogusware stop unit 235 to forbid that user moves unknown software and bogusware.
The content of these logging modle 24 recording user net purchase behaviors comprises user's net purchase network address and payment web site, unknown network address, the unknown file of download, and/or the program of current operation.
With respect to prior art, of the present inventionly dare to pay for framework and its implementation in the time user's net purchase being detected, enter net purchase pattern, the safe class of Hoisting System, the net purchase behavior of recording user also generates service odd numbers.When user does shopping and when entering fishing website and sustaining a loss, can provide this service list numbering under net purchase pattern.Net purchase user behaviors log that can invoke user according to the single numbering of service is analyzed, and corresponding reparation is provided.Thereby safety and the shopping confidence of user's net purchase are ensured.
The present invention is not limited to above-mentioned embodiment, if various changes of the present invention or distortion are not departed to the spirit and scope of the present invention, if within these changes and distortion belong to claim of the present invention and equivalent technologies scope, the present invention is also intended to comprise these changes and distortion.

Claims (8)

1. an implementation method of daring to pay for framework, comprises the steps:
Step 1: whether the network address that judges the current login of user is payment platform network address, if so, enters step 2, if not, detection of end;
Step 2: enter net purchase pattern, Hoisting System safe class;
Step 3: recording user net purchase behavior, and generate user behaviors log;
Step 4: according to user behaviors log, the single numbering of the service that generates.
2. implementation method of daring to pay for framework according to claim 1, is characterized in that: also comprise step 5, according to the net purchase behavior of the single numbering of service analysis user.
3. implementation method of daring to pay for framework according to claim 2, is characterized in that: this step 2 specifically comprises the steps:
Step 1): scanning current system environment, judge whether suspicious program operation, if so, finish current suspicious program, then enter step 2), if not, directly enter step 2);
Step 2): whether scanning browser has the module of virus or unknown loading, if so, closes current browser, opens new browser, and shows and current network address then enter step 3), if not, directly enters step 3);
Step 3): judged whether unknown modules injection and distorted, if so, forbidden unknown modules injection and distort, then having entered step 4), if not, directly having entered step 4);
Step 4): judge whether this network address is fishing network address, if so, closes current network address, then enters step 5), if not, directly enters step 5);
Step 5): forbid that user moves unknown software and bogusware.
4. implementation method of daring to pay for framework according to claim 3, it is characterized in that: in this step 3, the content of recording user net purchase behavior comprises: user's net purchase network address and payment web site, and/or unknown network address, and/or the unknown file of downloading, and/or the program of current operation.
5. dare to pay for framework for one kind, it is characterized in that: comprise judge module, security module, logging modle and service odd numbers generation module, in the time that user logins a network address, whether what first this judge module judged this user's login is payment platform network address, if be judged as payment platform network address, send instruction to security module, enter net purchase pattern, by security module Hoisting System safe class, then by logging modle recording user net purchase behavior, and generate user behaviors log, and serve odd numbers generation module according to user behaviors log, the single numbering of the service that generates.
6. according to claim 5ly dare to pay for framework, it is characterized in that: also comprise analysis module, it is according to the net purchase behavior of the single numbering of service analysis user.
7. according to claim 6ly dare to pay for framework, it is characterized in that: this security module further comprises that suspicious program scanning unit, virus and unknown load-on module scanning element, unknown modules are injected judging unit, fishing network address judging unit and the unknown and bogusware stops unit; Wherein, this suspicious program scanning unit scan current system environment, has judged whether suspicious program operation, if so, finishes current suspicious program; Whether this virus and unknown load-on module scanning element scanning browser have the module of the loading of virus or the unknown, if so, close current browser, open new browser, and show current network address; This unknown modules is injected judging unit and has been judged whether unknown modules injection and distorted, and if so, forbids unknown modules injection and distorts; This fishing network address judging unit judges that whether this network address is fishing network address, if so, closes current network address; This unknown and bogusware stop unit to forbid that user moves unknown software and bogusware.
8. according to claim 7ly dare to pay for framework, it is characterized in that: the content of this logging modle recording user net purchase behavior comprises: user's net purchase network address and payment web site, and/or unknown network address, and/or the unknown file of downloading, and/or the program of current operation.
CN201210567971.5A 2012-12-24 2012-12-24 Claims framework and implementation method thereof Pending CN103903127A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210567971.5A CN103903127A (en) 2012-12-24 2012-12-24 Claims framework and implementation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210567971.5A CN103903127A (en) 2012-12-24 2012-12-24 Claims framework and implementation method thereof

Publications (1)

Publication Number Publication Date
CN103903127A true CN103903127A (en) 2014-07-02

Family

ID=50994437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210567971.5A Pending CN103903127A (en) 2012-12-24 2012-12-24 Claims framework and implementation method thereof

Country Status (1)

Country Link
CN (1) CN103903127A (en)

Similar Documents

Publication Publication Date Title
US8355987B2 (en) Systems and methods to manage information
AU2011219045B2 (en) Systems and methods to process payments
CN204731832U (en) Electronic fare payment system
CN102194177A (en) System for risk control over online payment
CN104732388A (en) Electronic payment method and system
CN104966199B (en) Data processing method, client and payment platform
CN103778531A (en) Method and system for implementing electronic bank card payment on basis of two-dimensional code
CN104616137A (en) Security payment method, server and system
CN103903131A (en) Method and system for achieving electronic transaction based on graphic code
Dudin et al. Mitigation of cyber risks in the field of electronic payments: organizational and legal measures
CA2864171C (en) Authentication platform for pin debit issuers
US20130317896A1 (en) Internet price matching using a mobile wallet
CN103646211A (en) Method and device for loading payment webpage in browser
CN107918911A (en) System and method for performing safe web bank transaction
CN111932223A (en) Multi-information aggregated two-dimensional code payment method, system and device
Kanich et al. No plan survives contact: Experience with cybercrime measurement
US20160283943A1 (en) System and methods thereof for monitoring financial transactions from a credit clearing device
CN107169766A (en) A kind of safety detection method of payment environment, device and electronic equipment
KR20150061540A (en) Providing method and system for preventing fraud trading
KR102282345B1 (en) Transaction processing for payment of simplified and driven structure
US20150317634A1 (en) Secure text initiated payment processing system
CN109636386B (en) System and method for issuing merchant payment code
CN103903127A (en) Claims framework and implementation method thereof
Das et al. A Study of Threat Model on Mobile Wallet Based Payment System
CN103942490A (en) Method and device for preventing webpage content from being tampered

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140702

RJ01 Rejection of invention patent application after publication