CN106709733A - Verification strategy selection method and device - Google Patents

Verification strategy selection method and device Download PDF

Info

Publication number
CN106709733A
CN106709733A CN201611163328.0A CN201611163328A CN106709733A CN 106709733 A CN106709733 A CN 106709733A CN 201611163328 A CN201611163328 A CN 201611163328A CN 106709733 A CN106709733 A CN 106709733A
Authority
CN
China
Prior art keywords
server
verification
terminal
security
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611163328.0A
Other languages
Chinese (zh)
Inventor
胡苏�
杨超
刘�东
蒲明刚
李伟
孔文果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Migu Cultural Technology Co Ltd
Original Assignee
Migu Cultural Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Migu Cultural Technology Co Ltd filed Critical Migu Cultural Technology Co Ltd
Priority to CN201611163328.0A priority Critical patent/CN106709733A/en
Publication of CN106709733A publication Critical patent/CN106709733A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a verification strategy selection method, which comprises the following steps: a first server receives a security verification policy inquiry request sent by a second server; the first server acquires the information of the commodity supplier mapped by the commodity identification by inquiring the first server database; the first server queries a verification policy selection mapping relation preset in the first server according to the information of the commodity supplier, determines a security verification policy and sends the security verification policy to the second server. The invention also discloses a verification strategy selection device.

Description

Verification strategy selection method and device
Technical Field
The invention relates to an electronic payment technology in internet communication, in particular to a verification strategy selection method and equipment.
Background
In the prior art, commodities provided by a supplier can be generally sorted according to the sales volume of the commodities when being sorted, and the commodity evaluation is higher when the sales volume of the commodities is larger; the goods provided by the suppliers include: the supplier has copyrighted goods and the supplier agent's goods provider acts as a copyright side of the goods. When a user purchases a product provided by a provider through electronic payment, as shown in fig. 10 and 11, there are two ways in which the user purchases the product: as shown in fig. 10, in a first mode, when a user purchases a product with a copyright of a provider, a terminal sends a purchase request to a server of the provider, and the server of the provider sends a deduction request to a payment platform after receiving the purchase request, so as to complete the purchase; as shown in the second mode of fig. 11, when the user purchases the commodity of the commodity provider of the provider agent as the copyright party, the terminal sends a purchase request to the server of the provider, the provider server sends a deduction request to the payment platform after receiving the purchase request, and after the deduction is successful, the payment platform pays the copyright party. However, in any manner of purchasing commodities, a user tends to purchase a commodity with a high commodity rating in the process of purchasing the commodity. Therefore, some goods providers can use the mechanism, hire personnel use different terminals to purchase goods for many times in a short time, increase sales volume, obtain false goodness information, cause consumers to be misled by the false goodness information, and simultaneously destroy fair competition among the goods providers.
Disclosure of Invention
In view of this, embodiments of the present invention are expected to provide a method and an apparatus for selecting a verification policy, which can improve accuracy and reliability of reference information provided to a user.
In order to achieve the above purpose, the technical solution of the embodiment of the present invention is realized as follows:
the embodiment of the invention provides a verification strategy selection method, which comprises the following steps:
a first server receives a security verification policy inquiry request sent by a second server;
the first server acquires the information of the commodity supplier mapped by the commodity identification by inquiring the first server database;
and the first server inquires a verification strategy selection mapping relation preset in the first server according to the information of the commodity supplier, determines a security verification strategy and sends the security verification strategy to the second server.
In the foregoing solution, the security authentication policy query request includes: the method comprises the steps that a first terminal identification, a purchase account identification, channel information, APP information, attribute information of purchased commodities and commodity identifications are obtained;
the information of the commodity supplier comprises credibility of the commodity supplier.
In the foregoing solution, before the first terminal obtains the information of the commodity supplier mapped by the commodity identifier, the method further includes:
the first server firstly determines the identifier of the first terminal according to the security verification policy inquiry request and determines the security verification policy corresponding to the identifier of the first terminal.
In the foregoing solution, the determining a security verification policy corresponding to an identifier of a first terminal includes: and inquiring the storage position of the first terminal identification in the first server according to the first terminal identification, and searching a security verification strategy corresponding to the storage position.
In the above solution, the verification policy selection mapping relationship preset in the first server includes a verification policy selection mapping table; the parameters included in the verification policy selection mapping table include, but are not limited to: a goods supplier code, a purchase request channel code, an APP channel code, a goods price.
The embodiment of the invention also provides a verification strategy selection method, which comprises the following steps:
the first terminal sends a purchase request to the second server;
the first terminal receives and executes the security verification strategy sent by the second server, and sends a user operation result corresponding to the security verification strategy to the second server; the security verification policy is determined by the second server according to information of a commodity provider;
the first terminal receives a deduction operation result transmitted by a third server and forwarded by the second server; and the third server is used for carrying out deduction operation on the purchase request passing the verification.
In the above solution, the purchase request includes but is not limited to: and purchasing commodities directly provided by the supplier to which the second server belongs and/or purchasing commodities proxied by the supplier to which the second server belongs.
In the above solution, the security authentication policy includes but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification;
the deduction operation result comprises: the deduction is successful or failed.
The embodiment of the invention also provides a verification strategy selection method, which comprises the following steps:
the second server receives a purchase request sent by the first terminal and sends a security verification policy inquiry request to the first server according to the purchase request;
the second server receives the security verification strategy sent by the first server, forwards the security verification strategy to the first terminal, and receives a user operation result which is sent by the first terminal and corresponds to the security verification strategy;
and when the user operation result corresponding to the security verification strategy is judged to be correct, sending a deduction request to a third server, receiving a deduction operation result of the deduction request sent by the third server, and forwarding the deduction operation result to the first terminal.
An embodiment of the present invention further provides a first server, including: the first information receiving and transmitting module and the first information processing module; wherein,
the first information receiving and sending module is used for receiving a security verification policy inquiry request sent by the second server; sending the security verification policy determined by the first information processing module to the second server;
and the first information processing module is used for acquiring the information of the commodity supplier mapped by the commodity identifier by inquiring the first server database, inquiring a verification strategy selection mapping table preset in the first server according to the information of the commodity supplier and determining a security verification strategy.
In the above scheme, the first information processing module is further configured to determine the identifier of the first terminal according to the security verification policy query request before obtaining the information of the commodity provider mapped by the commodity identifier, and determine the security verification policy corresponding to the identifier of the first terminal.
In the foregoing solution, the determining, by the first information processing module, the security verification policy corresponding to the identifier of the first terminal includes: and inquiring the storage position of the first terminal identification in the first server according to the first terminal identification, and searching a security verification strategy corresponding to the storage position.
An embodiment of the present invention further provides a first terminal, including: the second information transceiver module and the second information processing module; wherein,
the second information transceiver module is used for sending a purchase request to the second server; receiving a security verification policy sent by a first server and forwarded by a second server, and sending the user operation result corresponding to the security verification policy to the second server; receiving a deduction operation result transmitted by a third server forwarded by the second server; the security verification policy is determined by the second server according to information of a commodity provider;
the second information processing module is used for executing the security verification policy transmitted by the first server and forwarded by the second server; and the third server is used for carrying out deduction operation on the purchase request passing the verification.
An embodiment of the present invention further provides a second server, including: a third information receiving and transmitting module and a third information processing module; wherein,
the third information transceiver module is used for receiving the purchase request sent by the first terminal; sending a security verification policy query request to a first server according to the purchase request; receiving a security verification policy sent by the first server, forwarding the security verification policy to the first terminal, and receiving a user operation result corresponding to the security verification policy sent by the first terminal; when the user operation result corresponding to the security verification strategy is judged to be correct, a deduction request is sent to a third server, a deduction operation result of the deduction request sent by the third server is received, and the deduction operation result is forwarded to the first terminal;
and the second information processing module is used for judging whether the user operation result corresponding to the security verification strategy is correct or not.
According to the verification policy selection method and device provided by the embodiment of the invention, a first server receives a security verification policy query request sent by a second server; the first server acquires the information of the commodity supplier mapped by the commodity identification by inquiring the first server database; the first server queries a verification policy selection mapping relation preset in the first server according to the information of the commodity supplier, determines a security verification policy and sends the security verification policy to the second server. Therefore, the method and the device can ensure that the user can complete payment through electronic payment when normally purchasing the commodity, can also determine different security verification strategies according to the information of the commodity provider, and effectively prevent bad commodity providers from maliciously purchasing commodity in order to obtain higher commodity evaluation and higher provider credit, so that the accuracy and the credibility of the reference information provided for the user can be improved, misleading the user is avoided, and unnecessary loss of the user is avoided.
The embodiment of the invention can directly realize the verification strategy selection method and equipment, does not need to limit the use environment, is simple and convenient to realize, has wider application range and simultaneously improves the user experience.
Drawings
Fig. 1 is a schematic flow chart illustrating an implementation of a first terminal-side verification policy selection method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating an implementation of a second server-side verification policy selection method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an implementation of a method for performing verification policy selection only according to information of a commodity supplier on a first server side according to an embodiment of the present invention;
fig. 4 is a schematic flow chart illustrating an implementation of a third server-side verification policy selection method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a first terminal according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a second server according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a first server according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a third server according to an embodiment of the present invention;
fig. 9 is a schematic flow chart illustrating an implementation procedure of a security verification policy determination process in a first server-side verification policy selection method according to an embodiment of the present invention;
FIG. 10 is a diagram illustrating a scenario in which a user purchases a product offered by a provider through electronic payment in the prior art;
FIG. 11 is a diagram illustrating a prior art scenario in which a user purchases a non-self-copyrighted good provided by a provider via electronic payment;
fig. 12 is a schematic view of an application scenario of a verification policy selection method according to an embodiment of the present invention.
Detailed Description
So that the manner in which the features and aspects of the embodiments of the present invention can be understood in detail, a more particular description of the embodiments of the invention, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings.
The embodiment of the present invention is applied to a network environment including a first terminal, a first server, a second server, and a third server, where the first terminal may be a terminal used by a user as a user-side terminal, and the first terminal may be a device capable of connecting with the server, including but not limited to: the mobile terminals comprise at least one mobile phone, a tablet computer, a desktop computer and intelligent hardware equipment;
the second server can be used as a server corresponding to the supplier and is respectively connected with the first terminal, the first server and the third server, all data interaction between the first terminal, the first server and the third server, including sending of various requests, returning of request results and the like, is forwarded and stored by the second server, and therefore the supplier can conveniently monitor the whole commodity purchasing process of the user;
the first server can be used as a server for providing security verification policies for the supplier and the first terminal, and the third server can be used as a server for deducting money; specifically, after receiving a security verification policy request sent by a second server, a first server determines a security verification policy and sends the security verification policy to the second server, and the security verification policy is forwarded to a first terminal by the second server; the method comprises the steps that after a first terminal completes a security verification strategy, a user operation result corresponding to the security verification strategy is sent to a second server, if the second server judges that the user operation result corresponding to the security verification strategy is correct, a deduction request is sent to a third server, the third server executes deduction operation corresponding to the deduction request passing verification, then the executed deduction operation result is sent to the second server, and the second server forwards the executed deduction operation result to the first terminal.
In practical application, the first server may determine the security verification policy only according to the information of the commodity provider, and the process of determining the security verification policy only according to the information of the commodity provider by the first server is as follows: after receiving a security verification policy request sent by a second server, a first server firstly obtains information of a commodity supplier mapped by a commodity identifier by querying a first server database; then the first server inquires a verification strategy selection mapping table preset in the first server according to the information of the commodity supplier, determines a security verification strategy and sends the security verification strategy to the second server. Because the information of the commodity supplier comprises the credit worthiness of the commodity supplier, different credit worthiness correspond to different security verification strategies in the verification strategy mapping relation, and the lower the credit worthiness of the commodity supplier is, the higher the security verification strategy is needed.
It can be seen that the three servers have independent functions, and the purchase request of the first terminal is managed, verified and deducted through the cooperation of the three servers, so that one-time electronic payment operation of the first terminal is completed.
Fig. 1 is a schematic diagram of an implementation flow of a first terminal-side verification policy selection method according to an embodiment of the present invention, and as shown in fig. 1, the schematic diagram of the implementation flow of the first terminal-side verification policy selection method includes the following steps:
step 101: the first terminal sends a purchase request to the second server;
in practical application, the number of the first terminals is at least one; the purchase request includes, but is not limited to: purchasing commodities directly provided by a supplier to which a second server belongs and/or commodities proxied by the supplier to which the second server belongs; the second server may allow the first terminal to complete the purchase request after determining that the purchase request is not a malicious operation.
Step 102: the first terminal receives and executes the security verification strategy transmitted by the first server and forwarded by the second server;
in practical applications, the security authentication policy includes but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification; the security of the account encryption code verification is highest, and a user can pass the security verification only by inputting a correct account encryption code; secondly, the verification of the graphic verification code is carried out, a user can pass the safety verification only by inputting a correct graphic verification code according to a graphic displayed by a terminal, and the graphic verification code comprises but is not limited to characters, letters, numbers or at least one icon; secondly, short message verification code verification is carried out, a user can pass safety verification only by inputting correct short message verification information according to the content displayed by the received verification short message, and the content of the verification short message comprises but is not limited to numbers, letters and characters; the lowest security is password-free payment, which comprises that a terminal directly sends a purchase request; the higher the possibility of malicious operation of the first terminal of the purchase request, the more highly secure security authentication policy is required.
Step 103: the first terminal sends the user operation result corresponding to the security verification strategy to the second server;
step 104: the first terminal receives a deduction operation result transmitted by a third server and forwarded by the second server;
in practical application, the deduction operation result comprises: the deduction is successful or unsuccessful and if the deduction fails, the user may initiate the purchase request again.
Fig. 2 is a schematic flow chart illustrating an implementation of a second server-side verification policy selection method according to an embodiment of the present invention; as shown in fig. 2, the implementation flow of the second server-side verification policy selection method includes the following steps:
step 201: the second server receives a purchase request sent by the first terminal;
in practical application, the number of the first terminals is at least one; the purchase request includes, but is not limited to: and purchasing commodities directly provided by the supplier to which the second server belongs and/or commodities proxied by the supplier to which the second server belongs.
Step 202: the second server sends a security verification policy query request to the first server;
in practical application, the first server determines the security authentication policy after receiving the security authentication policy query request, and the function of the first server can be realized by adding the security authentication policy module in the second server, so that the first server is omitted, and the application environment in this way can be only the first terminal, the second server, and the third server.
Step 203: the second server receives the security verification strategy sent by the first server and forwards the security verification strategy to the first terminal;
in practical applications, the security authentication policy includes but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification; the security of account encryption code verification, graphic verification code verification, short message verification code verification and password-free payment is reduced in sequence, and the higher the malicious operation possibility of the first terminal sending the purchase request is, the higher the security verification strategy with high security is required.
Step 204: the second server receives a user operation result which is sent by the first terminal and corresponds to the security verification strategy;
in practical applications, the second server may allow the first terminal to complete the purchase request after determining that the purchase request is not a malicious operation.
Step 205: when the user operation result corresponding to the security verification strategy is judged to be correct, the second server sends a deduction request to a third server;
in practical applications, when the second server determines that the user operation result corresponding to the security authentication policy is incorrect, a user operation result error notification corresponding to the security authentication policy may be sent to the first terminal, and the first terminal may determine whether to send the purchase request again.
Step 206: the first terminal receives the deduction operation result sent by the third server and forwards the deduction operation result to the first terminal;
in practical application, the deduction operation result comprises: the deduction is successful or unsuccessful and if the deduction fails, the user may initiate the purchase request again.
Fig. 3 is a schematic flow chart illustrating an implementation of a method for performing verification policy selection only according to information of a commodity supplier on a first server side according to an embodiment of the present invention; as shown in fig. 3, the implementation flow of the method for performing the verification policy selection only according to the information of the commodity supplier on the first server side includes the following steps:
step 301: a first server receives a security verification policy inquiry request sent by a second server;
step 302: the first server acquires the information of the commodity supplier mapped by the commodity identification by inquiring the first server database;
step 303: the first server inquires a verification strategy selection mapping relation preset in the first server according to the information of the commodity supplier, determines a security verification strategy and sends the security verification strategy to the second server;
in practical application, the first server side can select the verification strategy only according to the information of the commodity supplier; the security verification policy includes, but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification; the security of account encryption code verification, graphic verification code verification, short message verification code verification and password-free payment is reduced in sequence, and the higher the malicious operation possibility of the first terminal sending the purchase request is, the higher the security verification strategy with high security is required.
In practical application, the embodiment of the present invention may further include a third server, where the third server is configured to perform a deduction operation on the purchase request that passes the verification.
Fig. 4 is a schematic flow chart illustrating an implementation of a third server-side verification policy selection method according to an embodiment of the present invention; as shown in fig. 4, the implementation flow of the third server-side verification policy selection method includes the following steps:
step 401: the third server receives a deduction request sent by the second server;
step 402: the third server executes the deduction request and sends the deduction operation result to the second server;
in practical application, the deduction operation result comprises: the deduction is successful or unsuccessful and if the deduction fails, the user may initiate the purchase request again.
Fig. 5 is a schematic structural diagram of a first terminal according to an embodiment of the present invention; as shown in fig. 5, the first terminal has a configuration including: a second information transceiving module 501, a second information processing module 502, wherein,
a second information transceiver module 501, configured to send a purchase request to a second server; receiving a security verification policy sent by the second server, sending the user operation result corresponding to the security verification policy to the second server, and receiving a deduction operation result sent by a third server forwarded by the second server;
in practical application, the number of the first terminals is at least one; the purchase request includes, but is not limited to: purchasing commodities directly provided by a supplier to which a second server belongs and/or commodities proxied by the supplier to which the second server belongs; the second server may allow the first terminal to complete the purchase request after determining that the purchase request is not a malicious operation; the security verification policy includes, but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification; the security of account encryption code verification, graphic verification code verification, short message verification code verification and password-free payment is reduced in sequence, and the higher the malicious operation possibility of the first terminal sending the purchase request is, the higher the security verification strategy with high security is required.
A second information processing module 502 for executing the security authentication policy transmitted via the first server;
in practical applications, the functions of the second information transceiver module 501 and the second information Processing module 502 may be implemented by executing codes by a Central Processing Unit (CPU), a MicroProcessor Unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like located on the first terminal.
FIG. 6 is a schematic diagram of a second server according to an embodiment of the present invention; as shown in fig. 6, the composition structure of the second server includes: a third information transceiver module 601, a third information processing module 602, wherein,
a third information transceiver module 601, configured to receive a purchase request sent by the first terminal; sending a security verification policy query request to a first server according to the purchase request; receiving a security verification policy sent by the first server, and forwarding the security verification policy to the first terminal; receiving a user operation result which is sent by the first terminal and corresponds to the security verification strategy; when the user operation result corresponding to the security verification strategy is judged to be correct, a deduction request is sent to a third server; receiving the deduction operation result sent by the third terminal and forwarding the deduction operation result to the first terminal;
a third information processing module 602, configured to determine whether the user operation result corresponding to the security verification policy is correct;
in practical application, the number of the first terminals is at least one; the purchase request includes, but is not limited to: purchasing goods directly provided by a provider to which the second server belongs and/or goods proxied by the provider to which the second server belongs, wherein the second server can allow the first terminal to complete the purchase request after determining that the purchase request is not malicious operation; the security verification policy includes, but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification; the security of account encryption code verification, graphic verification code verification, short message verification code verification and password-free payment is sequentially reduced, and the higher the malicious operation possibility of the first terminal sending the purchase request is, the more the security verification strategy with high security is needed;
in practical applications, the functions of the third information transceiver module 601 and the third information processing module 602 can be realized by executing codes by a CPU, an MPU, a DSP, an FPGA, or the like located on a server.
Fig. 7 is a schematic structural diagram of a first server according to an embodiment of the present invention; as shown in fig. 7, the first server has a structure including: a first information transceiver module 701, a first information processing module 702, wherein,
a first information transceiver module 701, configured to receive a security verification policy query request sent by a second server; sending the security verification strategy determined by the third information processing module according to a preset rule to the second server;
a first information processing module 702, configured to determine a security verification policy according to a preset rule; specifically, the first terminal identifier is determined according to the security authentication policy query request; then, according to the first terminal identification, inquiring the storage position of the first terminal identification in a first server, and searching a security verification strategy corresponding to the storage position; the first information processing module 702 is further configured to, when the storage location of the first terminal identifier in the first server is not queried according to the first terminal identifier, determine and obtain a reputation of the commodity provider to which the commodity identifier is mapped by querying the database of the first server; inquiring a verification policy selection mapping table preset in the first server according to the credibility of the commodity supplier to determine a security verification policy; the verification policy selection mapping table preset in the first server includes parameters including but not limited to: a goods supplier code, a purchase request channel code, an APP channel code, a goods price.
In practical application, the number of the first terminals is at least one; the purchase request includes, but is not limited to: purchasing goods directly provided by a provider to which the second server belongs and/or goods proxied by the provider to which the second server belongs, wherein the second server can allow the first terminal to complete the purchase request after determining that the purchase request is not malicious operation; the security verification policy includes, but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification; the security of account encryption code verification, graphic verification code verification, short message verification code verification and password-free payment is sequentially reduced, and the higher the malicious operation possibility of the first terminal sending the purchase request is, the more the security verification strategy with high security is needed;
in practical applications, the functions of the first information transceiver module 701 and the first information processing module 702 may be implemented by a CPU, an MPU, a DSP, or an FPGA located on a server by executing codes or the like.
In practical application, the embodiment of the present invention may further include a third server, where the third server is configured to perform a deduction operation on the purchase request that passes the verification.
Fig. 8 is a schematic structural diagram of a third server according to an embodiment of the present invention; as shown in fig. 8, the third server has a composition structure including: a fourth information transceiving module 801, a fourth information processing module 802, wherein,
a fourth information transceiver module 801, configured to receive a deduction request sent by the second server; and the deduction operation result executed by the fourth information processing module is sent to the second server;
a fourth information processing module 802, configured to execute the deduction request by the third server;
in practical application, the deduction operation result comprises: the deduction is successful or failed, and if the deduction is failed, the user can initiate the purchase request again;
in practical applications, the functions of the fourth information transceiver module 801 and the fourth information processing module 802 may be implemented by executing codes by a CPU, an MPU, a DSP, an FPGA, or the like located on a server.
Fig. 9 is a schematic diagram of an implementation flow of a security verification policy determination process in a first server-side verification policy selection method according to an embodiment of the present invention, and as shown in fig. 9, the implementation flow of the security verification policy determination process in the first server-side verification policy selection method according to the embodiment of the present invention includes the following steps:
step 901: a first server receives a security verification policy query request;
in practical applications, the security authentication policy query request includes: the method comprises the steps that a first terminal identification, a purchase account identification, channel information, APP information, the price of purchased commodities and commodity identifications are arranged;
step 902: the first server inquires a storage position of a purchase account identifier in the first server and searches a security verification policy corresponding to the storage position;
in practical applications, the first server provider is provided with different storage locations in the first server, including but not limited to the following: the method comprises the following steps of (1) carrying out a blacklist, a grey list and a red list, and finishing the process if the inquiry result is that the purchase account identifier appears in the blacklist; if the inquiry result is that the purchase account identifier appears in the red list, the security verification strategy can be determined to be password-free payment; if the inquiry result is that the purchase account identifier appears in the grey list, the security verification policy can be determined to be graphical verification code verification (the security level is higher) or account encryption code verification (the security level is highest).
The blacklist is set by the supplier of the first server and is used for recording the purchasing account identification of a purchasing account (such as a risky purchasing account identified by a risky identifying algorithm in the prior art) of which the transaction behavior is recognized to be risky in advance; the red list is used for recording the terminal identification of the user with more active purchasing behavior (such as higher recent purchasing frequency) and normal transaction behavior; and the grey list is used for recording the purchasing account identification with higher transaction behavior risk (such as certain abnormal transaction behavior, such as frequently requesting to purchase the same commodity in a specific time period by the purchasing account) although the risk of the transaction behavior is not clearly identified. In addition, in practical applications, it should be noted that other behaviors besides the abnormal transaction behavior may be determined as the normal transaction behavior.
Step 903: judging whether the query is successful, if so, executing a step 904, otherwise, executing a step 905;
step 904: sending the security verification policy corresponding to the storage position to a second server;
step 905: determining the credit of the commodity supplier;
in practical application, the reputation information of the commodity supplier is stored in the first server, and when the first server fails to inquire the storage position of the purchase account identifier in the first server, the reputation information of the commodity supplier is used for searching a verification policy selection mapping table to determine a security verification policy; the credit of the suppliers can be divided into different grades, for example, good, medium or poor scores are given to the commodity suppliers after the commodities are purchased by users, the good, medium and poor scores represent +1, 0 and-1 scores respectively, the credit of the commodity suppliers with higher scores after cumulative addition is higher, or the credit of the commodity suppliers is classified by adopting a grading system, and the preferred credit of the suppliers is divided into 3 grades, i, ii and iii respectively, which correspond to high credit, medium credit and low credit respectively.
Step 906: inquiring a verification strategy selection mapping table according to the credit of the commodity supplier to determine a security verification strategy;
in practical application, the verification policy selection mapping table may be set in various ways, is preset and stored in the first server, and preferably adopts a way of exhausting as much as possible, wherein the verification policy selection mapping table includes a mapping relationship between a parameter value combination composed of parameter values of different parameters and a corresponding verification policy;
for example: determining that the credibility of the commodity supplier III is low through the step 905, and determining that the channel information, the APP information and the price of the purchased commodity respectively accord with the following conditions through the security verification strategy query request: the corresponding channel represented by the channel information is 'web access', the APP information is the APP name 'migu music', and the price of the commodity belongs to the interval '(0, 100)'; the preset verification policy selection mapping table comprises:
TABLE 1
When the processing is completed by performing step 906, "CP — iii is obtained; channel ═ web access'; APP ═ migu ·'; when the price of the commodity is less than 100 ', the verification strategy mapped in the table is ' graphic verification code verification '; the first server may thus determine the authentication policy to be a graphical authentication code authentication.
In practical application, the parameter value sets may have different combination forms, and may be a combination of any two or more of several parameter values of a commodity supplier code, a purchase request channel code, an APP channel code, and a price of a commodity, and the number of the parameters may also be set by the first server supplier.
Fig. 12 is a schematic view of an application scenario of a verification policy selection method according to an embodiment of the present invention, and as shown in fig. 12, an application process of the verification policy selection method according to the embodiment of the present invention includes: a user sends a purchase request to a provider server through a terminal; after receiving the purchase request, the supplier server firstly sends a request to the security verification strategy server, and the security verification strategy server returns the determined security verification strategy to the supplier server; when the security verification strategy result input by the terminal is correct, the supplier server sends a money deduction request to the payment platform to complete money deduction; here, if the goods are non-self-copyrighted goods of the provider, the provider also pays the copyright side.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, embodiments of the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements, etc. that are within the spirit and principle of the present invention should be included in the present invention.

Claims (14)

1. A method of verification policy selection, the method comprising:
a first server receives a security verification policy inquiry request sent by a second server;
the first server acquires the information of the commodity supplier mapped by the commodity identification by inquiring the first server database;
and the first server inquires a verification strategy selection mapping relation preset in the first server according to the information of the commodity supplier, determines a security verification strategy and sends the security verification strategy to the second server.
2. The method of claim 1, wherein the security authentication policy query request comprises: the method comprises the steps that a first terminal identification, a purchase account identification, channel information, APP information, attribute information of purchased commodities and commodity identifications are obtained;
the information of the commodity supplier comprises credibility of the commodity supplier.
3. The method of claim 1, wherein the obtaining of the information of the goods supplier mapped by the goods identifier by the first terminal further comprises:
the first server firstly determines the identifier of the first terminal according to the security verification policy inquiry request and determines the security verification policy corresponding to the identifier of the first terminal.
4. The method of claim 3, wherein determining the security authentication policy corresponding to the identity of the first terminal comprises: and inquiring the storage position of the first terminal identification in the first server according to the first terminal identification, and searching a security verification strategy corresponding to the storage position.
5. The method of claim 1, wherein the pre-arranged verification policy selection mapping relationship within the first server comprises a verification policy selection mapping table; the parameters included in the verification policy selection mapping table include, but are not limited to: a goods supplier code, a purchase request channel code, an APP channel code, a goods price.
6. A method of verification policy selection, the method comprising:
the first terminal sends a purchase request to the second server;
the first terminal receives and executes the security verification strategy sent by the second server, and sends a user operation result corresponding to the security verification strategy to the second server; the security verification policy is determined by the second server according to information of a commodity provider;
the first terminal receives a deduction operation result transmitted by a third server and forwarded by the second server; and the third server is used for carrying out deduction operation on the purchase request passing the verification.
7. The method of claim 5, wherein the purchase request includes, but is not limited to: and purchasing commodities directly provided by the supplier to which the second server belongs and/or purchasing commodities proxied by the supplier to which the second server belongs.
8. The method of claim 5, wherein the security authentication policy includes, but is not limited to: password-free payment, short message verification code verification, graphic verification code verification and account encryption code verification;
the deduction operation result comprises: the deduction is successful or failed.
9. A method of verification policy selection, the method comprising:
the second server receives a purchase request sent by the first terminal and sends a security verification policy inquiry request to the first server according to the purchase request;
the second server receives the security verification strategy sent by the first server, forwards the security verification strategy to the first terminal, and receives a user operation result which is sent by the first terminal and corresponds to the security verification strategy;
and when the user operation result corresponding to the security verification strategy is judged to be correct, sending a deduction request to a third server, receiving a deduction operation result of the deduction request sent by the third server, and forwarding the deduction operation result to the first terminal.
10. A first server, wherein the first server comprises: the first information receiving and transmitting module and the first information processing module; wherein,
the first information receiving and sending module is used for receiving a security verification policy inquiry request sent by the second server; sending the security verification policy determined by the first information processing module to the second server;
and the first information processing module is used for acquiring the information of the commodity supplier mapped by the commodity identifier by inquiring the first server database, inquiring a verification strategy selection mapping table preset in the first server according to the information of the commodity supplier and determining a security verification strategy.
11. The first server according to claim 10, wherein the first information processing module is further configured to determine the identifier of the first terminal according to the security authentication policy query request before obtaining the information of the commodity provider mapped to the commodity identifier, and determine the security authentication policy corresponding to the identifier of the first terminal.
12. The first server of claim 11, wherein the first information processing module determining the security authentication policy corresponding to the identity of the first terminal comprises: and inquiring the storage position of the first terminal identification in the first server according to the first terminal identification, and searching a security verification strategy corresponding to the storage position.
13. A first terminal, characterized in that the first terminal comprises: the second information transceiver module and the second information processing module; wherein,
the second information transceiver module is used for sending a purchase request to the second server; receiving a security verification policy sent by a first server and forwarded by a second server, and sending the user operation result corresponding to the security verification policy to the second server; receiving a deduction operation result transmitted by a third server forwarded by the second server; the security verification policy is determined by the second server according to information of a commodity provider;
the second information processing module is used for executing the security verification policy transmitted by the first server and forwarded by the second server; and the third server is used for carrying out deduction operation on the purchase request passing the verification.
14. A second server, characterized in that the second server comprises: a third information receiving and transmitting module and a third information processing module; wherein,
the third information transceiver module is used for receiving the purchase request sent by the first terminal; sending a security verification policy query request to a first server according to the purchase request; receiving a security verification policy sent by the first server, forwarding the security verification policy to the first terminal, and receiving a user operation result corresponding to the security verification policy sent by the first terminal; when the user operation result corresponding to the security verification strategy is judged to be correct, a deduction request is sent to a third server, a deduction operation result of the deduction request sent by the third server is received, and the deduction operation result is forwarded to the first terminal;
and the second information processing module is used for judging whether the user operation result corresponding to the security verification strategy is correct or not.
CN201611163328.0A 2016-12-15 2016-12-15 Verification strategy selection method and device Pending CN106709733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611163328.0A CN106709733A (en) 2016-12-15 2016-12-15 Verification strategy selection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611163328.0A CN106709733A (en) 2016-12-15 2016-12-15 Verification strategy selection method and device

Publications (1)

Publication Number Publication Date
CN106709733A true CN106709733A (en) 2017-05-24

Family

ID=58937995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611163328.0A Pending CN106709733A (en) 2016-12-15 2016-12-15 Verification strategy selection method and device

Country Status (1)

Country Link
CN (1) CN106709733A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087084A (en) * 2018-08-21 2018-12-25 卓望数码技术(深圳)有限公司 The acquisition methods and system, equipment, storage medium of charging security management and control strategy
CN109684819A (en) * 2018-12-26 2019-04-26 北京字节跳动网络技术有限公司 Data verification method and device
CN111212066A (en) * 2019-12-31 2020-05-29 浙江工业大学 Dynamic allocation request verification method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867475A (en) * 2010-05-27 2010-10-20 华为终端有限公司 Access authentication method and related device of remote control terminal service and communication system
CN102542687A (en) * 2010-12-29 2012-07-04 盛大计算机(上海)有限公司 Micropayment system and implementation method thereof
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103034941A (en) * 2012-12-05 2013-04-10 北京奇虎科技有限公司 Internet payment method and system
CN105391724A (en) * 2015-11-25 2016-03-09 用友网络科技股份有限公司 Authorization management method and authorization management device used for information system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867475A (en) * 2010-05-27 2010-10-20 华为终端有限公司 Access authentication method and related device of remote control terminal service and communication system
CN102542687A (en) * 2010-12-29 2012-07-04 盛大计算机(上海)有限公司 Micropayment system and implementation method thereof
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103034941A (en) * 2012-12-05 2013-04-10 北京奇虎科技有限公司 Internet payment method and system
CN105391724A (en) * 2015-11-25 2016-03-09 用友网络科技股份有限公司 Authorization management method and authorization management device used for information system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087084A (en) * 2018-08-21 2018-12-25 卓望数码技术(深圳)有限公司 The acquisition methods and system, equipment, storage medium of charging security management and control strategy
CN109684819A (en) * 2018-12-26 2019-04-26 北京字节跳动网络技术有限公司 Data verification method and device
CN111212066A (en) * 2019-12-31 2020-05-29 浙江工业大学 Dynamic allocation request verification method
CN111212066B (en) * 2019-12-31 2022-04-01 浙江工业大学 Dynamic allocation request verification method

Similar Documents

Publication Publication Date Title
US11580548B2 (en) Device reputation
US11107059B2 (en) Method and system for data security utilizing user behavior and device identification
CN105933266B (en) A kind of verification method and server
US11916954B2 (en) Predicting online electronic attacks based on other attacks
CN109257321B (en) Secure login method and device
CN110399561B (en) Information recommendation method, information recommendation device and electronic equipment
US8060409B2 (en) Certification and activation of used phones purchased through an online auction
US20230050176A1 (en) Method of processing a transaction request
CN106709785B (en) Display method and device
CN113179282A (en) Method and device for merging account numbers and server
CN106709733A (en) Verification strategy selection method and device
US20150248673A1 (en) Methods and apparatus for a token management system for transactions
US10565210B2 (en) Generating and verifying a reputational profile
KR20090080241A (en) Method and system for mobile stock management service using mobile communication terminal
KR102111838B1 (en) Data processing method and device
JP2020187589A (en) Information processing device, information processing method and program
CN106326284A (en) Historical record acquisition method, server and terminal
US20170206530A1 (en) Method and system for call authentication and providing reliability
CN113822673B (en) Transaction quotation obtaining method and device based on ring signature
CN114596097B (en) User identification method, device, electronic equipment and computer readable storage medium
JP2019020979A (en) Information processing device and credibility calculation method
JP6155348B1 (en) User authentication and reliability providing method and user authentication and reliability providing system
CN114971901A (en) Transaction data processing method and device, server and client
CN116681505A (en) Bank card management method, device, storage medium and equipment
CN116173508A (en) Data configuration method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524

RJ01 Rejection of invention patent application after publication