CN105450404A - Service operation processing method and device - Google Patents

Service operation processing method and device Download PDF

Info

Publication number
CN105450404A
CN105450404A CN201410342309.9A CN201410342309A CN105450404A CN 105450404 A CN105450404 A CN 105450404A CN 201410342309 A CN201410342309 A CN 201410342309A CN 105450404 A CN105450404 A CN 105450404A
Authority
CN
China
Prior art keywords
business operation
user
authentication
information
item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410342309.9A
Other languages
Chinese (zh)
Other versions
CN105450404B (en
Inventor
金伟安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410342309.9A priority Critical patent/CN105450404B/en
Publication of CN105450404A publication Critical patent/CN105450404A/en
Application granted granted Critical
Publication of CN105450404B publication Critical patent/CN105450404B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a service operation processing method and device. The service operation processing method comprises the following steps: when a user needs to carry out service operation, judging whether a subject corresponding to the service operation belongs to a preset trusted subject; and if so, carrying out the service operation directly without carrying out identity authentication on the service operation. The method can determine necessity of the identity authentication and allows no identity authentication when unnecessary, so that user experience can be effectively improved.

Description

The processing method of business operation and device
Technical field
The application relates to identity identifying technology field, particularly relates to a kind of processing method and device of business operation.
Background technology
Authenticating user identification, in order to promote fail safe, is carried out by various safety product in increasing website, to ensure the safety of user account.Wherein, safety product such as accesses to your password or digital certificate carries out the equipment of certification.The basis of authentication can comprise safety protection problem, mailbox checking, mobile phone check code and identity document information and check.
In correlation technique, each business operation all needs to carry out authentication, such as e-commerce purchases flow process comprises client and logs in, suitable commodity are selected to place an order, and complete these three kinds of business operations of advise for payments seller delivery, correlation technique, all needs authentication when carrying out arbitrary business operation in above-mentioned three kinds of business operations.
But this mode all needs authentication because user carries out each business operation, and Consumer's Experience is very bad.
Summary of the invention
The application is intended to solve one of technical problem in correlation technique at least to a certain extent.
For this reason, an object of the application is the processing method proposing a kind of business operation, and the method can determine one's identity the necessity of certification, and does not carry out authentication when inessential, thus effectively can promote Consumer's Experience.
Another object of the application is the processing unit proposing a kind of business operation.
For achieving the above object, the processing method of the business operation that the application's first aspect embodiment proposes, comprising: when user will carry out business operation, judges whether the main body that described business operation is corresponding belongs to the trusted subjects preset; If so, authentication is not carried out to described business operation, directly carry out described business operation.
The processing method of the business operation that the application's first aspect embodiment proposes, by judging whether the main body that business operation is corresponding is trusted subjects, authentication is not carried out when being trusted subjects, and directly carry out business operation, each business operation can not be needed all to carry out authentication, thus promote Consumer's Experience.
For achieving the above object, the processing unit of the business operation that the application's second aspect embodiment proposes, comprising: judge module, for when user will carry out business operation, judges whether the main body that described business operation is corresponding belongs to the trusted subjects preset; Executive Module, for when described judge module judges that the main body that described business operation is corresponding belongs to described trusted subjects, does not carry out authentication to described business operation, directly carries out described business operation.
The processing unit of the business operation that the application's second aspect embodiment proposes, by judging whether the main body that business operation is corresponding is trusted subjects, authentication is not carried out when being trusted subjects, and directly carry out business operation, each business operation can not be needed all to carry out authentication, thus promote Consumer's Experience.
The aspect that the application adds and advantage will part provide in the following description, and part will become obvious from the following description, or be recognized by the practice of the application.
Accompanying drawing explanation
The application above-mentioned and/or additional aspect and advantage will become obvious and easy understand from the following description of the accompanying drawings of embodiments, wherein:
Fig. 1 is the schematic flow sheet of the processing method of the business operation that the application one embodiment proposes;
Fig. 2 is the schematic flow sheet of the processing method of the business operation that another embodiment of the application proposes;
Fig. 3 is the schematic flow sheet that in the embodiment of the present application, step S21 comprises;
Fig. 4 is the safety product schematic diagram of identity-based authentication infrastructure in the embodiment of the present application;
Fig. 5 is the structural representation of the processing unit of the business operation that another embodiment of the application proposes;
Fig. 6 is the structural representation of the processing unit of the business operation that another embodiment of the application proposes.
Embodiment
Be described below in detail the embodiment of the application, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has element that is identical or similar functions from start to finish.Being exemplary below by the embodiment be described with reference to the drawings, only for explaining the application, and the restriction to the application can not being interpreted as.On the contrary, the embodiment of the application comprise fall into attached claims spirit and intension within the scope of all changes, amendment and equivalent.
Fig. 1 is the schematic flow sheet of the processing method of the business operation that the application one embodiment proposes, and the method comprises:
S11: when user will carry out business operation, judges whether the main body that described business operation is corresponding belongs to the trusted subjects preset.
The executive agent of the present embodiment can be specifically safety product.
Wherein, the login in business operation such as e-commerce purchases, place an order, payment etc.
The main body that business operation is corresponding can comprise at least one item in the attribute information of user profile, bank card information, facility information, exchange hour information and transaction agent.
Trusted subjects refers to that user is believable, does not need the main body of authentication.User profile comprises user account, or the ID card No. of user.
Bank card information comprises bank's card number.
Facility information comprises equipment identification information, or the network information.
Wherein, equipment identification information can comprise personal computer (personalcomputer, PC) medium education (MediaAccessControl, MAC) address, or the mobile device international identity code (InternationalMobileEquipmentIdentity of mobile phone, or the international mobile subscriber identity (InternationalMobileSubscriberIdentificationNumber, IMSI) of mobile phone IMEI).
The network information comprises Internet protocol (InternetProtocol, the IP) address of router outlet.
Exchange hour information comprises the time of user operation.
The attribute information of transaction agent comprises transacts for goods type, or transaction amount information.
Wherein, transacts for goods type can comprise type in kind or kind of virtual.
Transaction amount information can comprise dealing money interval, such as 0-100 unit.
Particularly, trusted subjects can preset, and user can the combination of at least one main body of sets itself in aforementioned body in advance, is defined as trusted subjects.
When user carries out business operation, the main body that the current business operation carried out is corresponding can be determined, afterwards this main body and the trusted subjects preset be compared, to judge whether the main body that this business operation is corresponding is trusted subjects.
S12: if do not carry out authentication to described business operation, directly carry out described business operation.
Such as, the trusted subjects that Zhang San presets comprises: user profile is my identification card number, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point every day, transacts for goods type is barter, and amount of money interval is 0-100 unit.If the main body that the current business operation carried out of Zhang San is corresponding meets above-mentioned condition, namely user profile is the identification card number of Zhang San, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point, transacts for goods type is barter, and, amount of money interval is 0-100 unit, so, do not need to carry out authentication to this business operation, directly can carry out this business operation, such as, this business operation logs in directly to carry out register, or, this business operation pays, then directly carry out delivery operation.
The present embodiment by judging whether the main body that business operation is corresponding is trusted subjects, does not carry out authentication, and directly carry out business operation when being trusted subjects, and each business operation can not be needed all to carry out authentication, thus promotes Consumer's Experience.
Fig. 2 is the schematic flow sheet of the processing method of the business operation that another embodiment of the application proposes, and the method comprises:
S21: setting trusted subjects.
Main body can comprise at least one item in the attribute information of user profile, bank card information, facility information, exchange hour information and transaction agent.
User profile comprises user account, or the ID card No. of user.
Bank card information comprises bank's card number.
Facility information comprises equipment identification information, or the network information.
Wherein, equipment identification information can comprise personal computer (personalcomputer, PC) medium education (MediaAccessControl, MAC) address, or the mobile device international identity code (InternationalMobileEquipmentIdentity of mobile phone, or the international mobile subscriber identity (InternationalMobileSubscriberIdentificationNumber, IMSI) of mobile phone IMEI).
The network information comprises Internet protocol (InternetProtocol, the IP) address of router outlet.
Exchange hour information comprises the time of user operation.
The attribute information of transaction agent comprises transacts for goods type, or transaction amount information.
Wherein, transacts for goods type can comprise type in kind or kind of virtual.
Transaction amount information can comprise dealing money interval, such as 0-100 unit.
The occurrence of main body can be exemplified below:
(1) bank's card number: as 6226XXXXXXXX1234;
(2) facility information: as mobile phone IMEI number, mobile phone IMEI number can adopt * #06# to consult voluntarily, or according to the acquisition of information that service end shows, concrete as 353XXXXXXXX1234;
(3) time: as 10-12 point every day.
Further, see Fig. 3, described setting trusted subjects, comprising:
S211: receive user for after the instruction of authorisation body, authentication is carried out to described user.
Wherein, user can carry out authorisation body in the client that business operation is corresponding, such as, provides the option of authorisation body in the client of shopping website, and user can select the option of this authorisation body to produce the instruction for authorisation body.
See Fig. 4, authentication 41 can adopt safety product identity-based authentication infrastructure to carry out.Wherein, safety product can comprise: the equipment accessed to your password, and uses the equipment of digital certificate, USBkey (comprising a generation or two generations), or, use the equipment etc. of mobile phone dynamic password (One-timePassword, OTP).
Authentication basis can comprise: safety protection problem, and mailbox is verified, mobile phone check code, or identity document information is checked.
Which kind of safety product of concrete employing and can pre-setting based on which kind of authentication basis.
Such as, after producing the instruction being used for authorisation body, safety product requires that user inputs identity document information and password etc., and user can be allowed after verification is consistent to continue operation, otherwise can return the message etc. that user haves no right to operate.
S212: described user by after authentication, determine that the main body of described subscriber authorisation is trusted subjects.
When user is by after authentication, the body combination that user selects can be received, and the body combination that user selects is defined as trusted subjects.
Such as, the trusted subjects that Zhang San is determined by selection body combination comprises: user profile is the identification card number of Zhang San, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point every day, transacts for goods type is barter, and amount of money interval is 0-100 unit.
S22: when user will carry out business operation, judges whether the main body that described business operation is corresponding belongs to the trusted subjects preset, and is perform step S23, otherwise performs S24.
Wherein, the login in business operation such as e-commerce purchases, to place an order or payment etc.
Main body corresponding for business operation and the trusted subjects preset can be compared, to obtain judged result by safety product.
S23: determine that main body is credible.S25 can be performed afterwards.
That is, when the main body that described business operation is corresponding belongs to the trusted subjects preset, directly described business operation is carried out.
Such as, the trusted subjects that Zhang San presets comprises: user profile is my identification card number, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point every day, transacts for goods type is barter, and amount of money interval is 0-100 unit.If the main body that the current business operation carried out of Zhang San is corresponding meets above-mentioned condition, namely user profile is the identification card number of Zhang San, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point, transacts for goods type is barter, and, amount of money interval is 0-100 unit, so, do not need to carry out authentication to this business operation, directly can carry out this business operation, such as, this business operation logs in directly to carry out register, or, this business operation pays, then directly carry out delivery operation.
S24: authentication is carried out to described business operation, and described business operation is carried out after really being had by identity.
That is, when the main body that described business operation is corresponding does not belong to the trusted subjects preset, first to carry out authentication, and judge whether to carry out described business operation according to the result of authentication.
S25: carry out described business operation.
Wherein, see Fig. 4, authentication can adopt safety product identity-based authentication infrastructure to carry out.Wherein, safety product can comprise: the equipment accessed to your password, and uses the equipment of digital certificate, USBkey (comprising a generation or two generations), or, use the equipment etc. of mobile phone secret order OTP.
Authentication basis can comprise: safety protection problem, and mailbox is verified, mobile phone check code, or identity document information is checked.
Which kind of safety product of concrete employing and can pre-setting based on which kind of authentication basis.
On the other hand, if business operation is not by authentication, then do not allow to carry out corresponding business operation.
The programming language adopted when the present embodiment realizes can specifically Java programming language, and the database of employing can specifically MySQL or Oracle.
The present embodiment by judging whether the main body that business operation is corresponding is trusted subjects, does not carry out authentication, but directly carry out business operation when being trusted subjects, and each business operation can not be needed all to carry out authentication, thus promotes Consumer's Experience.Because trusted subjects arranges according to the mandate of user in the present embodiment, can subscriber authorisation be realized, meet the individual demand of different user.The present embodiment, when arranging trusted subjects, carries out authentication to user, can improve fail safe.
Fig. 5 is the structural representation of the processing unit of the business operation that another embodiment of the application proposes, and this device 50 comprises judge module 51 and Executive Module 52.
Judge module 51, for when user will carry out business operation, judges whether the main body that described business operation is corresponding belongs to the trusted subjects preset.
The executive agent of the present embodiment can be specifically safety product.
Wherein, the login in business operation such as e-commerce purchases, place an order, payment etc.
The main body that business operation is corresponding can comprise at least one item in the attribute information of user profile, bank card information, facility information, exchange hour information and transaction agent.
Trusted subjects refers to that user is believable, does not need the main body of authentication.
User profile comprises user account, or the ID card No. of user.
Bank card information comprises bank's card number.
Facility information comprises equipment identification information, or the network information.
Wherein, equipment identification information can comprise personal computer (personalcomputer, PC) medium education (MediaAccessControl, MAC) address, or the mobile device international identity code (InternationalMobileEquipmentIdentity of mobile phone, or the international mobile subscriber identity (InternationalMobileSubscriberIdentificationNumber, IMSI) of mobile phone IMEI).
The network information comprises Internet protocol (InternetProtocol, the IP) message address of router outlet.
Exchange hour information comprises the time of user operation.
The attribute information of transaction agent comprises transacts for goods type, or transaction amount information.
Wherein, transacts for goods type can comprise type in kind or kind of virtual.
Transaction amount information can comprise dealing money interval, such as 0-100 unit.
Particularly, trusted subjects can preset, and user can the combination of at least one main body of sets itself in aforementioned body in advance, is defined as trusted subjects.
When user carries out business operation, the main body that the current business operation carried out is corresponding can be determined, afterwards this main body and the trusted subjects preset be compared, to judge whether the main body that this business operation is corresponding is trusted subjects.
Executive Module 52, for when described judge module judges that the main body that described business operation is corresponding belongs to described trusted subjects, does not carry out authentication to described business operation, directly carries out described business operation.
Such as, the trusted subjects that Zhang San presets comprises: user profile is my identification card number, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point every day, transacts for goods type is barter, and, amount of money interval is 0-100 unit, if the main body that the current business operation carried out of Zhang San is corresponding meets above-mentioned condition, namely user profile is the identification card number of Zhang San, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point, transacts for goods type is barter, and, amount of money interval is 0-100 unit, so, do not need to carry out authentication to this business operation, directly can carry out this business operation, such as, this business operation logs in directly to carry out register, or, this business operation pays, then directly carry out delivery operation.
In an embodiment, described device 50 also comprises setting module 53, and as shown in Figure 6, described setting module 53, for setting trusted subjects, comprising:
First module 531, for receiving user for after the instruction of authorisation body, carries out authentication to described user.
Wherein, user can carry out authorisation body in the client that business operation is corresponding, such as, provides the option of authorisation body in the client of shopping website, and user can select the option of this authorisation body to produce the instruction for authorisation body.
See Fig. 4, authentication can adopt safety product identity-based authentication infrastructure to carry out.Wherein, safety product can comprise: the equipment accessed to your password, and uses the equipment of digital certificate, USBkey (comprising a generation or two generations), or, use the equipment etc. of mobile phone dynamic password (One-timePassword, OTP).
Authentication basis can comprise: safety protection problem, and mailbox is verified, mobile phone check code, or identity document information is checked.
Which kind of safety product of concrete employing and can pre-setting based on which kind of authentication basis.
Such as, after producing the instruction being used for authorisation body, safety product requires that user inputs identity document information and password etc., and user can be allowed after verification is consistent to continue operation, otherwise can return the message etc. that user haves no right to operate.
Second unit 532, for after described user passes through authentication, determines that the main body of described subscriber authorisation is trusted subjects.
When user is by after authentication, the body combination that user selects can be received, and the body combination that user selects is defined as trusted subjects.
Such as, the trusted subjects that Zhang San is determined by selection body combination comprises: user profile is the identification card number of Zhang San, bank's card number is China Merchants Bank's debit card of 6226XXXXXXXX0011, mobile phone IMEI number is 353XXXXXXXX1234, on cell phone apparatus, the operating time is 10-12 point every day, transacts for goods type is barter, and amount of money interval is 0-100 unit.
In another embodiment, described device 50 also comprises processing module 54, as shown in Figure 6, when processing module 54 is for judging that the main body that described business operation is corresponding does not belong to the trusted subjects preset at described judge module, authentication is carried out to described business operation, and carry out described business operation after by authentication.
That is, when the main body that described business operation is corresponding does not belong to the trusted subjects preset, first to carry out authentication, and judge whether to carry out described business operation according to the result of authentication.
Wherein, see Fig. 4, authentication can adopt safety product identity-based authentication infrastructure to carry out.Wherein, safety product can comprise: the equipment accessed to your password, and uses the equipment of digital certificate, USBkey (comprising a generation or two generations), or, use the equipment etc. of mobile phone secret order OTP.
Authentication basis can comprise: safety protection problem, and mailbox is verified, mobile phone check code, or identity document information is checked.
Which kind of safety product of concrete employing and can pre-setting based on which kind of authentication basis.
On the other hand, if business operation is not by authentication, then do not allow to carry out corresponding business operation.
The programming language adopted when the present embodiment realizes can specifically Java programming language, and the database of employing can specifically MySQL or Oracle.
The present embodiment by judging whether the main body that business operation is corresponding is trusted subjects, does not carry out authentication, and directly carry out business operation when being trusted subjects, and each business operation can not be needed all to carry out authentication, thus promotes Consumer's Experience.
It should be noted that, in the description of the application, term " first ", " second " etc. only for describing object, and can not be interpreted as instruction or hint relative importance.In addition, in the description of the application, except as otherwise noted, the implication of " multiple " is two or more.
Describe and can be understood in flow chart or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred implementation of the application comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by the embodiment person of ordinary skill in the field of the application.
Should be appreciated that each several part of the application can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple step or method can with to store in memory and the software performed by suitable instruction execution system or firmware realize.Such as, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: the discrete logic with the logic gates for realizing logic function to data-signal, there is the application-specific integrated circuit (ASIC) of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is that the hardware that can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, this program perform time, step comprising embodiment of the method one or a combination set of.
In addition, each functional unit in each embodiment of the application can be integrated in a processing module, also can be that the independent physics of unit exists, also can be integrated in a module by two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.If described integrated module using the form of software function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.
The above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
In the description of this specification, at least one embodiment that specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained in the application or example.In this manual, identical embodiment or example are not necessarily referred to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiment or example.
Although illustrate and described the embodiment of the application above, be understandable that, above-described embodiment is exemplary, can not be interpreted as the restriction to the application, and those of ordinary skill in the art can change above-described embodiment, revises, replace and modification in the scope of the application.

Claims (16)

1. a processing method for business operation, is characterized in that, comprising:
When user will carry out business operation, judge whether the main body that described business operation is corresponding belongs to the trusted subjects preset;
If so, authentication is not carried out to described business operation, directly carry out described business operation.
2. method according to claim 1, is characterized in that, also comprises setting trusted subjects, and described setting trusted subjects, comprising:
Receive user for after the instruction of authorisation body, authentication is carried out to described user;
Described user by after authentication, determine that the main body of described subscriber authorisation is trusted subjects.
3. method according to claim 2, is characterized in that, describedly carries out authentication to described user, comprising:
Adopt at least one item in following item, authentication is carried out to described user: safety protection problem, mailbox are verified, mobile phone check code, identity document information is checked.
4. method according to claim 1, is characterized in that, described trusted subjects comprises at least one item in following item:
User profile;
Bank card information;
Facility information;
Exchange hour information;
The attribute information of transaction agent.
5. method according to claim 4, is characterized in that, described user profile comprises at least one item in following item: user account, the ID card No. of user.
6. method according to claim 4, is characterized in that, described facility information comprises at least one item in following item: equipment identification information, the network information.
7. method according to claim 4, is characterized in that, the attribute information of described transaction agent comprises at least one item in following item: transacts for goods type, transaction amount information.
8. method according to claim 1, is characterized in that, also comprises:
When the main body that described business operation is corresponding does not belong to the trusted subjects preset, authentication is carried out to described business operation, and carry out described business operation after by authentication.
9. a processing unit for business operation, is characterized in that, comprising:
Judge module, for when user will carry out business operation, judges whether the main body that described business operation is corresponding belongs to the trusted subjects preset;
Executive Module, for when described judge module judges that the main body that described business operation is corresponding belongs to described trusted subjects, does not carry out authentication to described business operation, directly carries out described business operation.
10. device according to claim 9, is characterized in that, also comprise the setting module for setting trusted subjects, described setting module comprises:
First module, for receiving user for after the instruction of authorisation body, carries out authentication to described user;
Second unit, for after described user passes through authentication, determines that the main body of described subscriber authorisation is trusted subjects.
11. devices according to claim 10, is characterized in that, described first module specifically for:
Adopt at least one item in following item, authentication is carried out to described user: safety protection problem, mailbox are verified, mobile phone check code, identity document information is checked.
12. devices according to claim 9, is characterized in that, described trusted subjects comprises at least one item in following item:
User profile;
Bank card information;
Facility information;
Exchange hour information;
The attribute information of transaction agent.
13. devices according to claim 12, is characterized in that, described user profile comprises at least one item in following item: user account, the ID card No. of user.
14. devices according to claim 12, is characterized in that, described facility information comprises at least one item in following item: equipment identification information, the network information.
15. devices according to claim 12, is characterized in that, the attribute information of described transaction agent comprises at least one item in following item: transacts for goods type, transaction amount information.
16. devices according to claim 9, is characterized in that, also comprise:
Processing module, during for judging that the main body that described business operation is corresponding does not belong to the trusted subjects preset at described judge module, carries out authentication to described business operation, and carries out described business operation after by authentication.
CN201410342309.9A 2014-07-17 2014-07-17 Service operation processing method and device Active CN105450404B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410342309.9A CN105450404B (en) 2014-07-17 2014-07-17 Service operation processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410342309.9A CN105450404B (en) 2014-07-17 2014-07-17 Service operation processing method and device

Publications (2)

Publication Number Publication Date
CN105450404A true CN105450404A (en) 2016-03-30
CN105450404B CN105450404B (en) 2020-03-03

Family

ID=55560222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410342309.9A Active CN105450404B (en) 2014-07-17 2014-07-17 Service operation processing method and device

Country Status (1)

Country Link
CN (1) CN105450404B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241710A (en) * 2018-08-14 2019-01-18 海南新软软件有限公司 A kind of method, apparatus and system promoting assets security

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457546A (en) * 2010-10-27 2012-05-16 中兴通讯股份有限公司 Method, device and system for logging in netty Web application server by single point
CN103581108A (en) * 2012-07-19 2014-02-12 阿里巴巴集团控股有限公司 Login authentication method, login authentication client, login authentication server and login authentication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457546A (en) * 2010-10-27 2012-05-16 中兴通讯股份有限公司 Method, device and system for logging in netty Web application server by single point
CN103581108A (en) * 2012-07-19 2014-02-12 阿里巴巴集团控股有限公司 Login authentication method, login authentication client, login authentication server and login authentication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241710A (en) * 2018-08-14 2019-01-18 海南新软软件有限公司 A kind of method, apparatus and system promoting assets security

Also Published As

Publication number Publication date
CN105450404B (en) 2020-03-03

Similar Documents

Publication Publication Date Title
CN110097360B (en) Secure payment transaction using a rotary application transaction counter
US11461764B2 (en) Systems and methods for performing a reissue of a contactless card
US11455620B2 (en) Tapping a contactless card to a computing device to provision a virtual number
US11210664B2 (en) Systems and methods for amplifying the strength of cryptographic algorithms
CN114424192A (en) Digital service continuous authentication based on non-contact card positioning
CA3209780A1 (en) Simplify virtual card numbers
CN113439284A (en) Review of authentication Using contactless card
US11902442B2 (en) Secure management of accounts on display devices using a contactless card
CN105450404A (en) Service operation processing method and device
JP2024510940A (en) Technology to automatically and securely provide confidential data in the data electronic field
US11961089B2 (en) On-demand applications to extend web services
US20220335432A1 (en) On-demand applications to extend web services
US20230325810A1 (en) Techniques to perform tap to pay operations in the ios and android operating system environments
US20230376936A1 (en) Configuring applications on a device using a contactless card
US20230419295A1 (en) Mobile web browser authentication and checkout using a contactless card
US20230162187A1 (en) Autofilling data based on account authentication using a contactless card
JP2024516604A (en) On-demand applications that extend web services
WO2023245007A1 (en) Techniques to perform tap to pay operations in the ios and android operating system environments
WO2023113986A1 (en) Key recovery based on contactless card authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20191128

Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, British Cayman Islands

Applicant after: Innovative advanced technology Co., Ltd

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Co., Ltd.

GR01 Patent grant
GR01 Patent grant