CN107230080A - A kind of method for processing business, device and intelligent terminal - Google Patents

A kind of method for processing business, device and intelligent terminal Download PDF

Info

Publication number
CN107230080A
CN107230080A CN201610174148.6A CN201610174148A CN107230080A CN 107230080 A CN107230080 A CN 107230080A CN 201610174148 A CN201610174148 A CN 201610174148A CN 107230080 A CN107230080 A CN 107230080A
Authority
CN
China
Prior art keywords
user
request
information
business
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610174148.6A
Other languages
Chinese (zh)
Other versions
CN107230080B (en
Inventor
裘绍翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banma Zhixing Network Hongkong Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610174148.6A priority Critical patent/CN107230080B/en
Publication of CN107230080A publication Critical patent/CN107230080A/en
Application granted granted Critical
Publication of CN107230080B publication Critical patent/CN107230080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

The embodiment of the present application provides a kind of method for processing business, device and intelligent terminal, and method therein is specifically included:Receive the service request of the first user;The corresponding checking request of the service request is sent to the second client of second user;Wherein, the second user has pre-set user relation with first user;Receive the result of second client to the checking request;When the result meets presetting rule, the processing to the service request is terminated.The embodiment of the present application can effectively prevent the execution of unusual traffic, so as to improve the security of business processing.

Description

A kind of method for processing business, device and intelligent terminal
Technical field
The application is related to network communication technology field, more particularly to a kind of method for processing business, one kind Business processing device and a kind of intelligent terminal.
Background technology
With the development of the communication technology, people change the custom paid in cash more and more, using logical The instrument for crossing the electronic forms such as internet and mobile phone is paid.For example, user is in shopping at network platform During buying article, the fund of the article can be paid by the instrument of electronic form. And for example, user can be by the instrument of electronic form to other users payment etc..
In existing payment scheme, user mainly completes to pay by inputting user rs credentials.Above-mentioned use Family authority can specifically include:Login password, payment cipher, certificate, USB key etc. can show that use The information or device of family identity.
However, above-mentioned user rs credentials have the characteristic easily revealed, and in the situation of user's voucher leakage Under, the loss of user's property will be easily caused, that is, existing payment scheme has more serious peace Full hidden danger.For example, after the login password and payment cipher of user are stolen, easily fund quilt will occur The illegal situation for shifting or using.
The content of the invention
The embodiment of the present application technical problem to be solved is to provide a kind of method for processing business, Ke Yiyou Effect prevents the execution of unusual traffic, so as to improve the security of business processing.
Accordingly, the embodiment of the present application additionally provides a kind of business processing device and a kind of intelligent terminal, Realization and application to ensure the above method.
In order to solve the above problems, this application discloses a kind of method for processing business, including:
A kind of method for processing business, including:
Receive the service request of the first user;
The corresponding checking request of the service request is sent to the second client of second user;Wherein, The second user has pre-set user relation with first user;
Receive the result of second client to the checking request;
When the result meets presetting rule, the processing to the service request is terminated.
Alternatively, the second user is determined as follows:
According to the corresponding proof rule of first user, the second user is determined;Or
The first user profile and business information carried according to the service request, in the first user letter Searched in mapping relations between breath, proof rule and second user information, to obtain described the The information of two users;Or
The first user profile carried according to the service request, in the first user profile and second user Mapping relations between information are searched, to obtain the information of the second user.
Alternatively, it is described according to the corresponding proof rule of first user, determine the second user Step, including:
The business information carried in the service request and/or taken in the service request in preset time period When the business information of band meets the proof rule, according to the proof rule and second user pre-established Mapping relations between information, obtain the corresponding second user information of the proof rule, as described The information of second user.
Alternatively, methods described also includes:
Termination messages are sent to the first client of first user;The termination messages are used to indicate institute State the termination of service request.
Alternatively, methods described also includes:
Receive and request is set;Wherein, described set in request carries the first user profile, second user Information and corresponding proof rule;
According to the second user information, described set is sent to the second client of correspondence second user Request;
Receive the first confirmation message that second client is returned, for the setting request;
After first confirmation message is received, reflecting between proof rule and second user information is set up The mapping relations penetrated between relation or the first user profile and second user information or the first use Mapping relations between family, proof rule and second user.
Alternatively, methods described also includes:
The current state of user account corresponding to first user profile is determined, in the current state During for preset condition, refuse described set and ask;Or
First refuse information being returned according to second client, for the setting request, is refused It is described absolutely that request is set;Or
It is determined that the corresponding to proof rule of the checking scope beyond proof rule correspondence checking scope Three users, send described set to the 3rd client of the 3rd user and ask, receive the described 3rd 3rd refuse information that client is returned, for the setting request, and disappear according to the described 3rd refusal Breath, refuses described set and asks.
Alternatively, methods described also includes:
Receive cancellation request or change request;Wherein, the is carried in the cancellation request or change request One user profile, second user information and its corresponding proof rule;
According to the second user information, described cancel is sent to the second client of correspondence second user Request or change request;
Receive it is that second client is returned, for the second true of the cancellation request or change request Recognize message;
After second confirmation message is received, delete between correspondence proof rule and second user information Mapping relations or the first user profile and second user information between mapping relations or first Mapping relations between user, proof rule and second user.
Alternatively, methods described also includes:
Receive it is that second client is returned, refused for the second of the cancellation request or change request Exhausted message;
After second refuse information is received, maintain between correspondence proof rule and second user information Mapping relations or the first user profile and second user information between mapping relations or first Mapping relations between user, proof rule and second user.
Alternatively, the result includes:Prevent or allow, then the presetting rule, including:
At least one the result includes preventing;Or
The number of times of prevention is more than first threshold;Or
The number of times of prevention is more than Second Threshold relative to the ratio of the number of times of refusal.
Alternatively, the proof rule includes:The corresponding rule of one or more business information;
The business information includes at least one of following information:Business correspondence parameter, business pair Business as, business source, business time of origin, business scene and in preset time period occurs Number of times;
The proof rule includes at least one of following rule:
Business correspondence parameter is in the range of preset amount;
Business object is in preset object range;
Business is originated in the range of preset source;
Business time of origin is in the range of preset time;
Business scene is in the range of preset location;And
Business frequency in preset time period is in the range of predetermined times.
On the other hand, this application discloses a kind of method for processing business, including:
Checking request corresponding to service request that the reception server is sent, the first user;
The checking request is verified by second user, to obtain corresponding the result;Its In, the second user has pre-set user relation with first user;
The result is sent to the server.
Alternatively, methods described also includes:
The setting request that the reception server is sent;Wherein, described set carries the first user letter in request Breath, second user information and corresponding proof rule;
Obtained by second user and the first confirmation message asked is set for described;
First confirmation message is sent to the server.
Alternatively, methods described also includes:
Acquired by second user and the first refuse information asked is set for described;
First refuse information is sent to the server.
Alternatively, methods described also includes:
Cancellation request or change request that the reception server is sent;Wherein, the cancellation request or change please The first user profile, second user information and its corresponding proof rule are carried in asking;
The second confirmation message for the cancellation request or change request is obtained by second user;
Second confirmation message is sent to the server.
Alternatively, methods described also includes:
Obtained by second user and cancel message for the second of the cancellation request or change request;
Described second, which is sent, to the server cancels message.
Another further aspect, this application discloses a kind of method for processing business, including:
The service request of the first user is sent to server, so that the server is to the second of second user Client sends the corresponding checking request of the service request, and second user is entered the checking request Row checking, to obtain corresponding the result;Wherein, the second user has with first user There is pre-set user relation.
Alternatively, methods described also includes:
Receive the server and be directed to the termination messages that the service request is returned;The termination messages are used for Indicate the termination of the service request.
Alternatively, methods described also includes:
Sent to server and request is set;Wherein, it is described set request in carry the first user profile, Second user information and corresponding proof rule.
Alternatively, methods described also includes:
Cancellation request or change request are sent to server;Wherein, during the cancellation request or change are asked Carry the first user profile, second user information and its corresponding proof rule.
Another aspect, this application discloses a kind of business processing device, including:
First receiving module, the service request for receiving the first user;
First sending module, it is corresponding for sending the service request to the second client of second user Checking request;Wherein, the second user has pre-set user relation with first user;
Second receiving module, for receiving the result of second client to the checking request; And
Module is terminated, for when the result meets presetting rule, terminating to the service request Processing.
Alternatively, described device also includes:Determining module, for determining the second user;
The determining module, including:
First determination sub-module, according to the corresponding proof rule of first user, determines described second User;Or
Second determination sub-module, the first user profile carried according to the service request and business letter Looked into breath, the mapping relations between the first user profile, proof rule and second user information Look for, to obtain the information of the second user;Or
3rd determination sub-module, the first user profile carried according to the service request is used first Mapping relations between family information and second user information are searched, to obtain the second user Information.
Alternatively, first determination sub-module, including:
Searching unit, for the business information carried in the service request and/or in preset time period Service request in the business information that carries when meeting the proof rule, according to the checking pre-established Mapping relations between rule and second user information, obtain the corresponding second user of the proof rule Information, is used as the information of the second user.
Alternatively, described device also includes:
Second sending module, for sending termination messages to the first client of first user;It is described Termination messages are used for the termination for indicating the service request.
Alternatively, described device also includes:
3rd receiving module, request is set for receiving;Wherein, described set in request carries first User profile, second user information and corresponding proof rule;
3rd sending module, for according to the second user information, to the second visitor of correspondence second user Family end sends described set and asked;
4th receiving module, it is that second client is returned, for the setting request for receiving First confirmation message;
Module is set up, for after first confirmation message is received, setting up proof rule and second user Mapping relations between mapping relations or the first user profile and second user information between information, Or the mapping relations between first user, proof rule and second user.
Alternatively, described device also includes:
First refusal module, the current shape for determining user account corresponding to first user profile State, when the current state is preset condition, refuses described set and asks;Or
Second refusal module, for it is being returned according to second client, for it is described set request The first refuse information, refuse it is described set request;Or
Second refusal module, for determining checking scope beyond proof rule correspondence checking scope The 3rd user corresponding to proof rule, described set is sent to the 3rd client of the 3rd user Request, receives the 3rd refuse information that the 3rd client is returned, for the setting request, and According to the 3rd refuse information, refuse described set and ask.
Alternatively, described device also includes:
5th receiving module, for receiving cancellation request or change request;Wherein, the cancellation request or The first user profile, second user information and its corresponding proof rule are carried in change request;
4th sending module, for according to the second user information, to the second visitor of correspondence second user Family end sends the cancellation request or change request;
6th receiving module, for receive it is that second client is returned, for the cancellation request or Change the second confirmation message of request;
Removing module, for after second confirmation message is received, deleting correspondence proof rule and second Mapping between mapping relations or the first user profile and second user information between user profile is closed System or the mapping relations between the first user, proof rule and second user.
Alternatively, described device also includes:
7th receiving module, for receive it is that second client is returned, for the cancellation request or Change the second refuse information of request;
Maintenance module, for after second refuse information is received, maintaining correspondence proof rule and second Mapping between mapping relations or the first user profile and second user information between user profile is closed System or the mapping relations between the first user, proof rule and second user.
On the other hand, this application discloses a kind of business processing device, including:
First receiving module, for corresponding to the reception server transmission, the first user service request Checking request;
Authentication module, it is corresponding to obtain for being verified by second user to the checking request The result;Wherein, the second user has pre-set user relation with first user;And
First sending module, for sending the result to the server.
Alternatively, described device also includes:
Second receiving module, the setting request sent for the reception server;Wherein, it is described that request is set In carry the first user profile, second user information and corresponding proof rule;
First acquisition module, sets the first of request to confirm to disappear for being obtained by second user for described Breath;
Second sending module, for sending first confirmation message to the server.
Alternatively, described device also includes:
Second acquisition module, sets the first of request to refuse for being acquired by second user for described Exhausted message;
3rd sending module, for sending first refuse information to the server.
Alternatively, described device also includes:
3rd receiving module, the cancellation request sent for the reception server or change request;Wherein, institute State and carry the first user profile, second user information in cancellation request or change request and its corresponding test Card rule;
3rd acquisition module, for obtaining what is asked for the cancellation request or change by second user Second confirmation message;
4th sending module, for sending second confirmation message to the server.
Alternatively, described device also includes:
4th acquisition module, for obtaining what is asked for the cancellation request or change by second user Second cancels message;
5th sending module, message is cancelled for sending described second to the server.
Another further aspect, this application discloses a kind of business processing device, including:
First sending module, the service request for sending the first user to server, so that the service Device sends the corresponding checking request of the service request to the second client of second user, and makes the second use Family is verified to the checking request, to obtain corresponding the result;Wherein, described second use Family has pre-set user relation with first user.
Alternatively, described device also includes:
Receiving module, the termination messages that the service request is returned are directed to for receiving the server;Institute State the termination that termination messages are used to indicate the service request.
Alternatively, described device also includes:
Second sending module, request is set for being sent to server;Wherein, described set in request is taken With the first user profile, second user information and corresponding proof rule.
Alternatively, described device also includes:
3rd sending module, for sending cancellation request or change request to server;Wherein, it is described to take Disappear to ask or change and the first user profile, second user information and its corresponding checking rule are carried in request Then.
Another aspect, this application discloses a kind of intelligent terminal, includes memory, and one or More than one program, one of them or more than one program storage is configured in memory By one or more than one computing device is one or more than one program bag contains and is used to carry out The instruction operated below:
Receive the service request of the first user;
The corresponding checking request of the service request is sent to the second client of second user;Wherein, The second user has pre-set user relation with first user;
Receive the result of second client to the checking request;
When the result meets presetting rule, the processing to the service request is terminated.
Compared with prior art, the embodiment of the present application includes advantages below:
The embodiment of the present application is used in the handling process of service request by second outside the first user Family performs verification operation;Because the second user is usually to have pre-set user relation with the first user User, therefore it possesses the ability being control effectively to the risk of service request, therefore the application is real The execution of unusual traffic can effectively be prevented by applying example, so as to improve the security of business processing.
For example, second user can be the good friend of the first user, it can learn the first user's in time The stolen situation of user account, therefore it can be prevented after it is determined that the user account of the first user is stolen The corresponding illegal traffic of user account of first user.
And for example, second user can be the guardian of the first user, and it possesses prevention and guards user's The ability of the corresponding unusual traffic of user account, therefore it can be to the corresponding business of account of its children It is controlled, to prevent its children from bad payment being occurred when deceiving.
For another example, second user can be any user with the first user with pre-set user relation, when First user is when triggering service request in the case of maloperation, the second user can be learnt in time The situation of above-mentioned maloperation, therefore, it can prevent the corresponding maloperation industry of user account of the first user Business.
Brief description of the drawings
Fig. 1 is a kind of step flow chart of method for processing business embodiment one of the application;
Fig. 2 is a kind of step flow chart of the method for setting second user of the application;
Fig. 3 is a kind of side of mapping relations set up between proof rule and second user information of the application The step flow chart of method;
Fig. 4 is a kind of step flow chart of method for processing business embodiment two of the application;
Fig. 5 is a kind of step flow chart of method for processing business embodiment three of the application;
Fig. 6 is a kind of structural representation of payment transaction processing system of the application;
Fig. 7 is a kind of structured flowchart of business processing device embodiment one of the application;
Fig. 8 is a kind of structured flowchart of business processing device embodiment two of the application;And
Fig. 9 is a kind of structured flowchart of intelligent terminal embodiment of the application.
Embodiment
To enable above-mentioned purpose, the feature and advantage of the application more obvious understandable, with reference to attached Figure and embodiment are described in further detail to the application.
In existing payment scheme, usual user is inputted after authority in intelligent terminal, i.e., no longer to branch The business of paying has control ability.And actually because intelligent terminal lacks effective judgement energy to user Power, causes various safety of payment problems.Such as user is after account is stolen, and extensive fund is illegally turned Move or use.
Inventor herein it has been investigated that, user generally have extensive interpersonal relationships (hereinafter referred to as use Family relation), such as there are various effective information communications and identity validation mode between user, and illegally use Family (such as network attack person, terminal thief) generally can not understand customer relationship, thus also it is more difficult pretend to be with The user that validated user has customer relationship is cheated.
Therefore, one of core idea of the embodiment of the present application is, in the handling process of service request Checking link is introduced, the checking link performs checking behaviour by the second user outside the first user Make;Because the second user is usually to have the user of pre-set user relation with the first user, therefore it can It is control effectively with the risk to service request, therefore the embodiment of the present application can effectively prevent anon-normal The execution of normal business, so as to improve the security of business processing.For example, second user can be The good friend of first user, it can learn the stolen situation of the user account of the first user in time, therefore its After it is determined that the user account of the first user is stolen, the user account of the first user can be prevented corresponding Illegal traffic.And for example, second user can be the guardian of the first user, and it possesses prevention and guarded The ability of the corresponding unusual traffic of user account of user, therefore it can be corresponded to the account of its children Business be controlled, to prevent its children from bad payment being occurred when deceiving.For another example, Second user can be any user with the first user with pre-set user relation, when the first user exists When triggering service request in the case of maloperation, the second user can learn above-mentioned maloperation in time Situation, therefore, it can prevent the first user the corresponding maloperation business of user account.
Embodiment of the method one
Reference picture 1, shows a kind of step flow chart of method for processing business embodiment one of the application, Specifically it may include steps of:
Step 101, the service request for receiving the first user;
Step 102, send the corresponding checking of the service request to the second client of second user please Ask;Wherein, the second user can have pre-set user relation with first user;
The result of step 103, reception second client to the checking request;
Step 104, when the result meets presetting rule, terminate to the place of the service request Reason.
It is corresponding that the method for processing business that the embodiment of the present application is provided can apply to client and server In application environment.Wherein, client can be located in wired or wireless network with server, by this Wired or wireless network, client carries out data interaction with server.
Wherein, above-mentioned client can run on intelligent terminal and, can apply to above-mentioned intelligence eventually Web APP (application program, APPlication), Hybrid (mixing) APP, the Native at end In the environment such as (primary) APP.Above-mentioned intelligent terminal is specifically included but not limited:Smart mobile phone, flat board electricity Brain, E-book reader, MP3 (dynamic image expert's compression standard audio aspects 3, Moving Picture Experts Group Audio Layer III) player, MP4 (dynamic image expert's compression standards Audio aspect 4, Moving Picture Experts Group Audio Layer IV) it is player, on knee Pocket computer, vehicle-mounted computer, desktop computer, set top box, intelligent TV set, wearable device Etc..
Specifically, client can receive the service request of user's input, wherein, above-mentioned service request In can carry the information such as business information and user profile.Distinguish for convenience, in the embodiment of the present application First client, the second client and the 3rd client be respectively used to represent the first user, second user and The corresponding client of 3rd user, in fact, the embodiment of the present application is not limited for specific client System.
In a kind of alternative embodiment of the application, client can be by performing above-mentioned steps 101 and step Rapid 102 pairs of above-mentioned service requests are handled.
In another alternative embodiment of the application, client can send above-mentioned business to server Request so that server by perform above-mentioned steps 101 and step 102 to above-mentioned service request at Reason.Operation needed for being asked due to processing business is performed in the server, therefore can reduce client The operand at end, namely the resource consumption of client can be substantially reduced, so as to improve client Run time and operational efficiency, and the practicality of client can be improved;Also, it can also play The abundant advantage of server side computing resource (cloud resource in Cloud Server), please so as to improve business The treatment effeciency asked is high and handles the degree of accuracy.
Show it is appreciated that the corresponding application environment of above-mentioned client and server is intended only as a kind of application Example, a purpose of the method for processing business of the embodiment of the present application is, by second user to business Request is verified, thus plays the work that the second user control effectively to the risk of service request With so as to improve the security of business processing, without being limited specific application environment System.
In the embodiment of the present application, the second user the first user corresponding with the service request can have There is pre-set user relation, the pre-set user relation can specifically include:Friends, Peer Relationships, Monitoring relation, kinship etc., therefore the second user is effectively controlled with the risk to service request The ability of system.Wherein, above-mentioned effective control can specifically include:Prevent the place of above-mentioned service request Reason, or, it is allowed to processing of above-mentioned service request etc..
Business in the embodiment of the present application can include:Payment transaction etc. possesses the business of risk, this Shen Please embodiment specifically illustrated by taking payment transaction as an example, other business are cross-referenced.
In the embodiment of the present application, second user can be pre-set, for the industry to the first user The user that business request is verified.In actual applications, can be by setting request to use above-mentioned second Family is configured.Wherein, above-mentioned setting request can be triggered by the first user, can also be touched by second user Hair.
Reference picture 2, shows a kind of step flow chart of the method for setting second user of the application, tool Body may include steps of:
Step 201, the first user end to server, which are sent, sets request;Wherein, it is described to set in request Carry the first user profile, second user information and corresponding checking information;
In a kind of application example of the application, user D can pass through user account in intelligent terminal 1 D logs in the first client, and opens the second user setting interface of the first client, in second use Family sets the use of the user account of input second user and proof rule information, such as user B in interface Family account B, and trigger confirmation control.
Step 202, server are carried after above-mentioned setting request is received in being asked according to above-mentioned setting Second user information, sends described set to the second client of correspondence second user and asks;
Wherein, server can determine that above-mentioned setting request correspondence second is used according to second user information The user account at family, and send above-mentioned setting request to the user account of second user.
Step 203, the second client pass through second after the request of the above-mentioned setting from server is received User obtains sets the first confirmation message of request for described, and confirms to above-mentioned server return first Message or the first refuse information;
In a kind of application example of the application, user B can pass through user account in intelligent terminal 2 B logs in the second client, and receives the setting request from user account B in the second client, then User B can on the basis of being linked up with user D, it is determined that confirm above-mentioned setting request, or, it is acute Collect above-mentioned setting request, correspondingly, can be true to the return first of above-mentioned server by the second client Recognize message or the first refuse information.
Step 204, server are set up checking information and used with second after first confirmation message is received Mapping between mapping relations or the first user profile and second user information between the information of family is closed System.
In a kind of alternative embodiment of the application, server can also send above-mentioned the to the first client One confirmation message or the first refuse information.For example, being received in user D the first clients logged in After above-mentioned first confirmation message or the first refuse information, the flow of second user is set to terminate.
It should be noted that above-mentioned first client, the second client can with for realizing business work( The APP of energy is corresponding, such as pays APP, the embodiment of the present application is for above-mentioned first client, second The corresponding APP of client is not any limitation as.
It should be noted that the checking information that above-mentioned setting request is carried can be verified with second user Business it is related.
In a kind of alternative embodiment of the application, the checking information carried in above-mentioned setting request is specific It can include:The checking information of all business or the checking information of partial service.
Wherein, in the case of the checking information that all business are included in above-mentioned checking information, server exists Receive after the first confirmation message, reflecting between the first user profile and second user information can be set up Penetrate relation.For example, in the case where user D all business are verified by user B, will can use Family D is as the first user, and the mapping relations set up between user D and user B.Above-mentioned situation can With suitable for situation higher to user B degree of belief user D, for example, user B is user D's Guardian, or, user B is user D relatives etc..
In the case where above-mentioned checking information includes the checking information of partial service, in above-mentioned checking information Proof rule can be included.Above-mentioned situation is not any limitation as to user D to user B degree of belief, its In, user B can be user D guardian, relatives, good friend etc..
In the embodiment of the present application, above-mentioned proof rule can be used for the business that constraint second user is verified. In a kind of alternative embodiment of the application, the proof rule can specifically include:It is one or more The corresponding rule of business information.That is, above-mentioned proof rule can be related to one or more business letters Breath, wherein, when being related to multiple business information, multiple business can be believed according to preset syntax rule Breath is combined to obtain corresponding proof rule, wherein, above-mentioned preset syntax rule can be canonical Rule, or logical operation rule etc., the embodiment of the present application is not added with for specific proof rule To limit.
In a kind of alternative embodiment of the application, the business information can specifically include following information At least one of:Business correspondence parameter, business object, business source, business time of origin, industry Business scene and the business frequency in preset time period;
The proof rule can specifically include at least one of following rule:
Business correspondence parameter is in the range of preset amount;
Business object is in preset object range;
Business is originated in the range of preset source;
Business time of origin is in the range of preset time;
Business scene is in the range of preset location;And
Business frequency in preset time period is in the range of predetermined times.
Wherein, the cycle of above-mentioned preset time period can be one day, one week etc..
Exemplified by paying scene, above-mentioned business correspondence parameter can specifically include paying amount, for example:It is single Secondary payment amount, or, payment amount in preset time period etc.;Business object can specifically include branch Object is paid, business source can specifically include paying source, for example:Bank card, remaining sum, remaining sum increment Service etc.;Business time of origin can specifically include the time of payment, and business scene can specifically include The place of payment.The proof rule can specifically include at least one of following rule:
Amount is paid in the range of preset amount;
Object is paid in preset object range;
Source is paid in the range of preset source;
Time of payment is in the range of the preset time of payment;
The place of payment is in the range of the preset place of payment;And
Payment times in preset time period are in the range of predetermined times.
In a kind of alternative embodiment of the application, include the situation of proof rule in above-mentioned checking information Under, server after the first confirmation message is received, can be set up for the first user proof rule with Mapping relations between second user information.In another alternative embodiment of the application, above-mentioned In the case that checking information includes proof rule, server may be used also after the first confirmation message is received To set up the mapping relations between the first user profile, proof rule and second user information.
Reference picture 3, show the application it is a kind of set up between proof rule and second user information reflect The step flow chart of the method for relation is penetrated, can specifically be included:
Step 301, reception set request;Wherein, it is described set request in carry the first user profile, Second user information and corresponding proof rule;
Step 302, according to the second user information, sent to the second client of correspondence second user It is described that request is set;
First confirmation that step 303, reception second client are returned, for the setting request Message;
Step 304, after first confirmation message is received, set up proof rule and second user information Between mapping relations or the first user profile and second user information between mapping relations.
Wherein, flow shown in Fig. 3 can be performed by the first client or server, and second user can be used for Represent the second user that the first user is set, such as foregoing user B.
With reference to table 1, a kind of proof rule of the application and the mapping relations example of second user are shown. Wherein, a second user can correspond to one or more proof rules, and such as second user C can be right A kind of proof rule is answered, and second user A and second user B can correspond to a variety of proof rules.And And, proof rule can be related to current service request, can also be with a preset time period (such as one My god) in service request it is related.
Table 1
It should be noted that the above-mentioned mapping set up by server between the first user and second user is closed System, the mapping relations set up by server between proof rule and second user or built by server Vertical mapping relations between first user, proof rule and second user are intended only as the optional of the application Embodiment, it has the advantages that to prevent above-mentioned mapping relations from being distorted by user, therefore, it is possible to improve business The security of processing., also can be by the first client and/or the second visitor in the other embodiment of the application Mapping relations that family end is set up between the first user and second user, set up proof rule and second user Between mapping relations or set up mapping between the first user, proof rule and second user and close System, also, in order to improve security, can also be in the first client and/or the second client to above-mentioned Mapping relations data are encrypted, and the embodiment of the present application is held for setting up the specific of above-mentioned mapping relations Row main body is not any limitation as.
In addition, it is necessary to set request and first to confirm by transit server in explanation, above-mentioned Fig. 2 The process of message is intended only as alternative embodiment, in fact, between the first client and the second client It can be carried with direct communication, the communications platform that can be provided by business APP therebetween, other APP The platforms such as the immediate communication platform or short message platform of confession are communicated, and the embodiment of the present application is to two Communication mode between person is not any limitation as.
In addition, it is necessary to which the first user please by the triggering setting of the first client in explanation, above-mentioned Fig. 2 The process asked is intended only as example, in fact, second user can also be set by the triggering of the second client Request is put, the embodiment of the present application is for setting the corresponding triggering side of request not to be any limitation as.
The embodiment of the present application can provide the following technical scheme for determining second user:
Technical scheme 1
In technical scheme 1, the second user can be determined as follows:
Step A1, according to the corresponding proof rule of first user, determine the second user.
In actual applications, service request can carry the first user profile (such as user of the first user Accounts information), therefore above-mentioned first user profile can be first depending on and determine the corresponding checking rule of the first user Then, then second user is determined according to proof rule.Wherein it is possible to be advised according to the first user with checking Mapping relations between then determine the corresponding proof rule of the first user, can also be from the first user correspondence Prestore corresponding proof rule directly read in content, the embodiment of the present application is for the first user The determination mode of corresponding proof rule is not any limitation as.
In a kind of alternative embodiment of the application, above-mentioned steps A1 can specifically include:In the industry The business information carried in business request and/or the business information carried in the service request in preset time period When meeting the corresponding proof rule of first user, according to the proof rule pre-established and the second use Mapping relations between the information of family, obtain the corresponding second user information of the proof rule, are used as institute State the information of second user.
In actual applications, can by the business information carried in above-mentioned service request with shown in similar table 1 Proof rule in mapping relations is matched, if the match is successful, it is believed that above-mentioned service request pair The business information answered meets above-mentioned proof rule.For example, it is assumed that the corresponding amount paid of above-mentioned service request Spend for 20000, then it is considered that above-mentioned service request meets " once pays amount and be more than 10000 " Proof rule, so as to obtain above-mentioned second user A information.And for example, it is assumed that above-mentioned business please It is remaining sum to ask the corresponding source that pays, then it is considered that above-mentioned service request meets " by remaining sum branch Pay " proof rule, so as to obtain above-mentioned second user C information.As can be seen that above-mentioned Second user can be one or more.
Similarly, can be by the business information carried in the service request in preset time period and the similar institute of table 1 Show that the proof rule in mapping relations is matched, if the match is successful, it is believed that in preset time period Service request in the business information that carries meet above-mentioned proof rule.For example, it is assumed that intraday industry The number of times of business request is 5, payment amount involved by each service request not 20000, then can recognize Meet for intraday service request and " the checking rule that amount is more than or equal to 100000 " are paid in one day Then, so as to obtaining above-mentioned second user B information.And for example, it is assumed that intraday service request Number of times be 10, then it is considered that intraday service request meet " in one day transaction count be more than etc. In 10 " proof rule, so as to obtain above-mentioned second user A information.
Technical scheme 2
In technical scheme 2, the second user can be determined as follows:
Step B1, the first user profile and business information carried according to the service request, first Searched in mapping relations between user profile, proof rule and second user information, to obtain The information of the second user.
In actual applications, the first user profile and business information that respectively can be carried service request Used with first in the mapping relations between the first user profile, proof rule and second user information Family information and proof rule are matched, and when the matching of the two succeeds, obtain corresponding second User profile.
Technical scheme 3
In technical scheme 3, the second user can be determined as follows:
Step C1, according to the service request carry the first user profile, the first user profile with Mapping relations between second user information are searched, to obtain the information of the second user.
Technical scheme 3, which goes for second user, to be used to verify the situations of all business, for example, with In the case that family D all business are verified by user B, user D and user B can be pre-established Between mapping relations, and when the first user profile is user D information, the is obtained by searching Two users are user B.
Carried out in detail above by the technical scheme of 3 pairs of determination second users of technical scheme 1- technical schemes Introduce, it will be understood that those skilled in the art can be according to practical application request, using above-mentioned technology Any in scheme 1- technical schemes 3 either combine or, can also using determine second user its His technical scheme, the embodiment of the present application is for determining that the concrete technical scheme of second user is not limited System.
In a kind of alternative embodiment of the application, the result that above-mentioned steps 103 are obtained specifically can be with Including:Prevent or allow., can be whole and step 104 is when the result meets presetting rule Only to the processing of the service request, therefore the user account of the first user can be prevented corresponding illegal Business or bad payment.
It should be noted that second user can be one or more, it is multiple in second user When, the corresponding the result of multiple second users be probably it is different, in such cases can be according to reality Border application demand, determines to prevent or clearance service request using corresponding presetting rule.For example, one Planting presetting rule can be, at least one the result includes preventing, namely once occurs what is prevented The result, you can to prevent the processing of the service request.And for example, a kind of presetting rule can be with For the number of times of prevention is more than first threshold.For another example, a kind of presetting rule can be the number of times phase prevented Ratio for the number of times of refusal is more than Second Threshold.Wherein, Second Threshold can be the numerical value more than 1 Deng.
It is appreciated that in a kind of alternative embodiment of the application, not met in the result pre- When putting rule, the processing of the service request can be continued.For example, second user be one and When the corresponding the result of the second user is allows, the processing of the service request can be continued.
To sum up, the embodiment of the present application is in the handling process of service request, outside the first user Second user performs verification operation;Because the second user is usually to have default use with the first user The user of family relation, therefore it possesses the ability being control effectively to the risk of service request, therefore this Application embodiment can effectively prevent the execution of unusual traffic, so as to improve the peace of business processing Quan Xing.
Embodiment of the method two
Reference picture 4, shows a kind of step flow chart of method for processing business embodiment two of the application, Specifically it may include steps of:
Step 401, server receive the service request of the first user;
Step 402, server send that the service request is corresponding to be tested to the second client of second user Card request;Wherein, the second user can have pre-set user relation with first user;
Step 403, server receive the result of second client to the checking request;
Step 404, server are when the result meets presetting rule, and terminating please to the business The processing asked;
Step 405, server send termination messages to the first client of first user;The end Only message is used for the termination for indicating the service request.
Relative to embodiment of the method one shown in Fig. 1, Fig. 4 flow can apply to server, server The termination messages sent to the first client may be used to indicate the termination of the service request, so that first uses Know the state of above-mentioned service request in family.
In a kind of alternative embodiment of the application, server does not meet presetting rule in the result When, the processing of the service request can be continued, and send pair to the first client of first user The result answered.
Embodiment of the method three
Reference picture 5, shows a kind of step flow chart of method for processing business embodiment three of the application, Specifically it may include steps of:
Step 501, the first user end to server send the service request of the first user;
Step 502, server send that the service request is corresponding to be tested to the second client of second user Card request;Wherein, the second user can have pre-set user relation with first user;
Corresponding to service request that step 503, the second client the reception server are sent, the first user Checking request;
Step 504, the second client are verified by second user to the checking request, to obtain Corresponding the result;
Step 505, the second client send the result to the server;
Step 506, server receive the result of second client to the checking request, and When the result meets presetting rule, the processing to the service request is terminated.
It should be noted that can carry the information such as business information in above-mentioned service request, above-mentioned checking please Above-mentioned business information and the first user profile etc. can be carried in asking, in such cases, above-mentioned checking request Different information can be carried with above-mentioned service request.Or, business can be carried in above-mentioned service request The information such as information and the first user profile, in such cases, above-mentioned checking request can carry identical letter Breath.It is appreciated that the embodiment of the present application is for the tool entrained by above-mentioned service request and above-mentioned checking request Body information is not any limitation as.
To make those skilled in the art more fully understand the embodiment of the present application, reference picture 6 shows this Shen A kind of structural representation of payment transaction processing system please, it can specifically include:Server 601, First client 602 and the second client 603, correspondingly, provide a kind of of the application and pay industry herein The step flow chart for processing method example of being engaged in, specifically may include steps of:
The payment transaction that step S1, the first client 602 receive user account D initiations is asked, and to Server 601 sends payment transaction request;
Step S2, server 601 judge whether payment transaction request needs checking, if so, then holding Row step S3, is otherwise handled according to traditional process;
In a kind of alternative embodiment of the application, server judges whether payment transaction request needs The process of checking can specifically include:The business information that carries and/or preset during the payment transaction is asked The business information and user account D proof rule carried in payment transaction request in period is carried out Matching, if the match is successful, it is determined that payment transaction request needs checking.Or, server judges Whether payment transaction request needs the process of checking specifically to include:During the payment transaction is asked In mapping relations between the first user profile and the first user profile and second user information that carry First user profile is matched, if the match is successful, it is determined that payment transaction request needs checking. It is appreciated that whether the embodiment of the present application asks to need the specific of checking to judge for the payment transaction Journey is not any limitation as.
Step S3, server 601 determine payment second user B;
Step S4, server 601 correspond to user account B the second client 603 to second user B Send checking request;
Step S5, the second client 603 receive above-mentioned checking request, and receive user account B inputs The result;
In actual applications, user B pay application in receive checking request after, can by with Family D links up modes such as (link up face to face, communication based on instant messaging etc.), determines the checking request pair The result answered, and input the result in application is paid.
Step S6, the second client 603 send above-mentioned the result to server 601;
Step S7, when the result meets presetting rule, server 601 terminate the payment industry The processing of business request.
If for example, user B the result is allows, handling user D's according to traditional process Payment transaction request is until terminating.If user B the result is prevents, user D payment Service request is terminated.
Step S8, server 601 send termination message to user account D the first clients 602 of correspondence, So that user D receives operation result information in application is paid.
Embodiment of the method three
The present embodiment is the alternative embodiment of embodiment of the method one or embodiment of the method two, and it is real in method Apply on the basis of example one or embodiment of the method two, following optional technical scheme can also be included.
In the present embodiment, in order to prevent disabled user from voluntarily setting the second use after user account is usurped Family or prevent that minor from voluntarily setting second user in the case where being deceived, the application is implemented Example can also refuse the setting request from the first user in the following way, and correspondingly, the application is real The following manner that refusal sets request can be provided by applying example:
Mode 1
Mode 1 can be after setting request be received, it may be determined that user corresponding to first user profile The current state of account, when the current state is preset condition, refuses described set and asks.
Whether mode 1 can be preset condition according to the current state of user account, it is determined whether refusal is set Put request.Because above-mentioned preset condition can be used for the shape for representing that user account is not controlled by validated user State, therefore the embodiment of the present application refuses the setting request under such a situation, can improve the peace of business checking Quan Xing.
For example, user account D original state can be normal condition, and in user account D intelligence After energy lost terminal or login password, payment cipher are stolen, it can send report the loss to server and ask Ask, and user account D current state can be set to the state of reporting the loss by server, then this reports the loss state It can be preset condition.And for example, user account C is minor, and its state can specifically include: State of a control and non-control state;Wherein it is possible to according to the period to state of a control and non-control state Make a distinction, for example, section between during the day, because father and mother are not by the side of, therefore user account C shape State can be non-control state, and in hours of darkness section, because father and mother are by the side of, therefore user account C State can be state of a control.Furthermore it is possible to the triggering according to father and mother's correspondence user account, it is determined that User account C current state, the embodiment of the present application is for the specific true of the current state of user account Determine mode not to be any limitation as.
Mode 2,
In mode 2, the embodiment of the present application can also comprise the following steps:
Step D1, reception set request;Wherein, it is described set request in carry the first user profile, Second user information and corresponding proof rule;
Step D2, according to the second user information, sent to the second client of correspondence second user It is described that request is set;
Step D3, according to second client return, for it is described set request first refusal Message, refuses described set and asks.
Because second user can learn the stolen situation of the user account of the first user in time, thus its After determining that the user account of the first user is stolen, it can refuse the setting request of the first user, to prevent Only the first user malice is by setting request to carry out the setting of second user.
Mode 3,
In mode 3, the embodiment of the present application can also comprise the following steps:
Step E1, reception set request;Wherein, it is described set request in carry the first user profile, Second user information and corresponding proof rule;
The proof rule institute of step E2, determination checking scope beyond proof rule correspondence checking scope Corresponding 3rd user;
Step E3, the 3rd client transmission setting request to the 3rd user;
3rd refusal that step E4, reception the 3rd client are returned, for the setting request Message;
Step E5, according to the 3rd refuse information, refuse described to set request.
In the embodiment of the present application, proof rule generally has corresponding checking scope, and the checking scope can be with Including above-mentioned preset amount scope, above-mentioned preset object range etc., in mode 3, the 3rd user is The user for being successfully used in checking is set, is less than or equal to the 3rd user's setting request correspondence checking scope , it is necessary to pass through the checking of the 3rd user during checking scope.
By taking table 1 as an example, original proof rule " once pays amount and is more than 10000 " corresponding second use Family is user A, then the embodiment of the present application does not allow the first user unilaterally to reduce checking scope, example Such as, if the first user proof rule to be increased newly " once pays amount and is more than 20000 ", because this is new The proof rule of increasing in the range of the corresponding checking of original proof rule, therefore its it is newly-increased be also required to by with Family A confirmation can come into force.
It should be noted that for mode 1, when the current state is not preset condition, Ke Yiyun Perhaps it is described that request is set.For mode 3, receive it is that the 3rd client is returned, set for described Put after the 3rd confirmation message of request, described set can be allowed to ask.The embodiment of the present application is for setting Put and ask corresponding permission opportunity not to be any limitation as.
Embodiment of the method four
The present embodiment is the optional implementation of embodiment of the method one or embodiment of the method two or embodiment of the method three Example, it, can be with the basis of embodiment of the method one or embodiment of the method two or embodiment of the method three Including following optional technical scheme.
In the present embodiment, do not allow the first user unilaterally to cancel checking or reduce checking scope, this Sample, even if the first user is stolen, original second user remains able to effectively carry out service request Checking, therefore, it is possible to improve the normalization of business checking.
By taking table 1 as an example, " once pay amount is proof rule more than 10000 " corresponding second users User A, then the embodiment of the present application do not allow the first user unilaterally to cancel the proof rule, the checking The cancellation of rule needs to come into force by user A confirmation.In addition, the embodiment of the present application does not allow First user unilaterally reduces checking scope, if for example, the first user " once pays proof rule Amount is revised as " once paying amount and being more than 20000 ", due to the checking after change more than 10000 " Rule is in the range of the corresponding checking of original proof rule, therefore the change of proof rule is with greater need for passing through user A confirmation can come into force.
In the embodiment of the present application, the control process of cancellation request or change request can specifically include:
Step F1, reception cancellation request or change request;Wherein, during the cancellation request or change are asked Carry the first user profile, second user information and its corresponding proof rule;
In actual applications, the first client can send cancellation request to server or change is asked.
Step F2, according to the second user information, sent to the second client of correspondence second user The cancellation request or change request;
Step F3, receive it is that second client is returned, asked for the cancellation request or change The second confirmation message;
In actual applications, the second client can be obtained by second user for the cancellation request or The second of change request cancels message;Described second, which is sent, to the server cancels message.Wherein, may be used Asked with gathering second user by forms such as keyboard, voice, mouses for the cancellation request or change Second cancel message, the embodiment of the present application for second cancellation message specific acquisition modes do not limited System.
Step F4, after second confirmation message is received, delete correspondence proof rule and second user Mapping relations between mapping relations or the first user profile and second user information between information, Or the mapping relations between first user, proof rule and second user.
In a kind of alternative embodiment of the application, the control process of cancellation request or change request is also It can include:
Step F5, receive it is that second client is returned, asked for the cancellation request or change The second refuse information;
Step F6, after second refuse information is received, maintain correspondence proof rule to believe with second user Mapping relations between mapping relations or the first user profile and second user information between breath or Mapping relations between the user of person first, proof rule and second user.
Application example in the control process of cancellation request is provided at this.This is applied in example, user's account Family D initiates the cancellation request for proof rule 1 in application is paid, it is assumed that the correspondence of proof rule 1 Second user be user account B, then corresponding first clients of user account D can be sent out to server Send cancellation request and corresponding user account B information;And server can be sent to user account B Above-mentioned cancellation request;After user B receives the cancellation request from user account A in payment application, It can agree to cancel or refusal cancelled on the basis of being linked up with user A, and user account B can To send corresponding second confirmation message or the second refuse information to server.It is true receiving second Recognize after message, server can delete the mapping between correspondence proof rule and the second second user information Relation, and, after the second refuse information is received, server can maintain correspondence proof rule with Mapping relations between second second user information.Also, server can also be D pairs to user account The first client answered sends corresponding operating result message.
Application example in the control process of change request is provided at this.This is applied in example, user's account Family D initiates to ask for the change of proof rule 1 in application is paid, and proof rule 2 after change Checking scope be less than proof rule 1 checking scope (such as on the basis of proof rule 1 increase payment Amount), it is assumed that the corresponding second user of proof rule 1 is user account B, then D pairs of user account The first client answered can send change request and corresponding user account B information to server; And server can send above-mentioned change to user account B and ask;User B is received in application is paid After change request from user account A, change can be agreed on the basis of being linked up with user A Or refusal change, and user account B can be sent to server corresponding second confirmation message or Second refuse information.After the second confirmation message is received, server can delete correspondence proof rule With the mapping relations between the second second user information, and, after the second refuse information is received, Server can maintain the mapping relations between correspondence proof rule and the second second user information.And And, server can also send corresponding operating result to corresponding first clients of user account D and disappear Breath.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as into one The combination of actions of series, but those skilled in the art should know, the embodiment of the present application is not by institute The limitation of the sequence of movement of description, because according to the embodiment of the present application, some steps can use other Order is carried out simultaneously.Secondly, those skilled in the art should also know, described in the specification Embodiment belong to preferred embodiment, involved action not necessarily the embodiment of the present application must Must.
Device embodiment one
Reference picture 7, shows a kind of structured flowchart of business processing device embodiment one of the application, should Device can apply to server side, can specifically include following module:
First receiving module 701, the service request for receiving the first user;
First sending module 702, for sending the service request pair to the second client of second user The checking request answered;Wherein, the second user has pre-set user relation with first user;
Second receiving module 703, for receiving checking knot of second client to the checking request Really;And
Module 704 is terminated, for when the result meets presetting rule, terminating to the business The processing of request.
In a kind of alternative embodiment of the application, described device can also include:Determining module, is used In it is determined that the second user;
The determining module, can specifically include:
First determination sub-module, according to the corresponding proof rule of first user, determines described second User;Or
Second determination sub-module, the first user profile carried according to the service request and business letter Looked into breath, the mapping relations between the first user profile, proof rule and second user information Look for, to obtain the information of the second user;Or
3rd determination sub-module, the first user profile carried according to the service request is used first Mapping relations between family information and second user information are searched, to obtain the second user Information.
In another alternative embodiment of the application, first determination sub-module can specifically be wrapped Include:
Searching unit, for the business information carried in the service request and/or in preset time period Service request in the business information that carries when meeting the proof rule, according to the checking pre-established Mapping relations between rule and second user information, obtain the corresponding second user of the proof rule Information, is used as the information of the second user.
In another alternative embodiment of the application, described device can also include:
Second sending module, for sending termination messages to the first client of first user;It is described Termination messages are used for the termination for indicating the service request.
In another alternative embodiment of the application, described device can also include:
3rd receiving module, request is set for receiving;Wherein, described set in request carries first User profile, second user information and corresponding proof rule;
3rd sending module, for according to the second user information, to the second visitor of correspondence second user Family end sends described set and asked;
4th receiving module, it is that second client is returned, for the setting request for receiving First confirmation message;
Module is set up, for after first confirmation message is received, setting up proof rule and second user Mapping relations between mapping relations or the first user profile and second user information between information, Or the mapping relations between first user, proof rule and second user.
In a kind of alternative embodiment of the application, described device can also include:
First refusal module, the current shape for determining user account corresponding to first user profile State, when the current state is preset condition, refuses described set and asks;Or
Second refusal module, for it is being returned according to second client, for it is described set request The first refuse information, refuse it is described set request;Or
Second refusal module, for determining checking scope beyond proof rule correspondence checking scope The 3rd user corresponding to proof rule, described set is sent to the 3rd client of the 3rd user Request, receives the 3rd refuse information that the 3rd client is returned, for the setting request, and According to the 3rd refuse information, refuse described set and ask.
In another alternative embodiment of the application, described device can also include:
5th receiving module, for receiving cancellation request or change request;Wherein, the cancellation request or The first user profile, second user information and its corresponding proof rule are carried in change request;
4th sending module, for according to the second user information, to the second visitor of correspondence second user Family end sends the cancellation request or change request;
6th receiving module, for receive it is that second client is returned, for the cancellation request or Change the second confirmation message of request;
Removing module, for after second confirmation message is received, deleting correspondence proof rule and second Mapping between mapping relations or the first user profile and second user information between user profile is closed System or the mapping relations between the first user, proof rule and second user.
In another alternative embodiment of the application, described device can also include:
7th receiving module, for receive it is that second client is returned, for the cancellation request or Change the second refuse information of request;
Maintenance module, for after second refuse information is received, maintaining correspondence proof rule and second Mapping between mapping relations or the first user profile and second user information between user profile is closed System or the mapping relations between the first user, proof rule and second user.
Device embodiment two
Reference picture 8, shows a kind of structured flowchart of business processing device embodiment two of the application, should Device can apply to second user correspondence second user side, can specifically include following module:
First receiving module 801, service request institute sent for the reception server, the first user is right The checking request answered;
Authentication module 802, for being verified by second user to the checking request, to obtain pair The result answered;Wherein, the second user has pre-set user relation with first user; And
First sending module 803, for sending the result to the server.
In a kind of alternative embodiment of the application, described device can also include:
Second receiving module, the setting request sent for the reception server;Wherein, it is described that request is set In carry the first user profile, second user information and corresponding proof rule;
First acquisition module, sets the first of request to confirm to disappear for being obtained by second user for described Breath;
Second sending module, for sending first confirmation message to the server.
In another alternative embodiment of the application, described device can also include:
Second acquisition module, sets the first of request to refuse for being acquired by second user for described Exhausted message;
3rd sending module, for sending first refuse information to the server.
In another alternative embodiment of the application, described device can also include:
3rd receiving module, the cancellation request sent for the reception server or change request;Wherein, institute State and carry the first user profile, second user information in cancellation request or change request and its corresponding test Card rule;
3rd acquisition module, for obtaining what is asked for the cancellation request or change by second user Second confirmation message;
4th sending module, for sending second confirmation message to the server.
In another alternative embodiment of the application, described device can also include:
4th acquisition module, for obtaining what is asked for the cancellation request or change by second user Second cancels message;
5th sending module, message is cancelled for sending described second to the server.
Device embodiment three
Present invention also provides a kind of business processing device embodiment three, the device can apply to first User's the first client-side of correspondence, can specifically include following module:
First sending module, the service request for sending the first user to server, so that the service Device sends the corresponding checking request of the service request to the second client of second user, and makes the second use Family is verified to the checking request, to obtain corresponding the result;Wherein, described second use Family has pre-set user relation with first user.
In another alternative embodiment of the application, described device can also include:
Receiving module, the termination messages that the service request is returned are directed to for receiving the server;Institute State the termination that termination messages are used to indicate the service request.
In another alternative embodiment of the application, described device can also include:
Second sending module, request is set for being sent to server;Wherein, described set in request is taken With the first user profile, second user information and corresponding proof rule.
In another alternative embodiment of the application, described device can also include:
3rd sending module, for sending cancellation request or change request to server;Wherein, it is described to take Disappear to ask or change and the first user profile, second user information and its corresponding checking rule are carried in request Then.
For device embodiment, because it is substantially similar to embodiment of the method, so the ratio of description Relatively simple, the relevent part can refer to the partial explaination of embodiments of method.
Present invention also provides a kind of transaction processing system embodiment, the system can specifically include:Service Device, the first client and the second client;
Wherein, above-mentioned service implement body can include:
First receiving module, the service request for receiving the first user;
First sending module, it is corresponding for sending the service request to the second client of second user Checking request;Wherein, the second user has pre-set user relation with first user;
Second receiving module, for receiving the result of second client to the checking request; And
Module is terminated, for when the result meets presetting rule, terminating to the service request Processing;
Above-mentioned second client can specifically include:
3rd receiving module, for corresponding to the reception server transmission, the first user service request Checking request;
Authentication module, it is corresponding to obtain for being verified by second user to the checking request The result;Wherein, the second user has pre-set user relation with first user;And
Second sending module, for sending the result to the server;
Above-mentioned first client can specifically include:
3rd sending module, the service request for sending the first user to server, so that the service Device sends the corresponding checking request of the service request to the second client of second user, and makes the second use Family is verified to the checking request, to obtain corresponding the result;Wherein, described second use Family has pre-set user relation with first user.
Intelligent terminal embodiment
Reference picture 9, shows a kind of structured flowchart of intelligent terminal embodiment of the application, can specifically wrap Include:At least one memory 901, display 902, at least one processor 903 and at least one is defeated Enter unit 904.
Wherein, the input block 904 can be used for the numeral or character information for receiving user's input, and control Signal processed.Specifically, in the embodiment of the present application, the input block 904 can include touch-screen 941, Collecting touch operation of the user on or near it, (such as user is adapted to using finger, stylus etc. are any The operation on touch-screen 941 of object or annex), and driven according to formula set in advance corresponding Attachment means.Certainly, except touch-screen 941, input block 904 can also be set including other inputs It is standby, such as physical keyboard, function key (such as volume control button, switch key), mouse etc..
Display 902 can specifically include display panel, optionally, can use liquid crystal display (Liquid Crystal Display, LCD) or Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) etc. form configure display panel.Wherein, touch-screen 941 can cover display surface Plate, forms touch display screen, when the touch display screen detects the touch operation on or near it Afterwards, processor 903 is sent to perform corresponding processing.
In the embodiment of the present application, by call store the memory 901 in program, and/or, mould Block, and/or, data, processor 903 receives the service request of the first user;To the of second user Two clients send the corresponding checking request of the service request;Wherein, the second user with it is described First user has pre-set user relation;Receive checking of second client to the checking request As a result;When the result meets presetting rule, the processing to the service request is terminated.
Each embodiment in this specification is described by the way of progressive, and each embodiment is stressed Be all between difference with other embodiment, each embodiment identical similar part mutually referring to .
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present application can be provided as method, dress Put or computer program product.Therefore, the embodiment of the present application can using complete hardware embodiment, completely The form of embodiment in terms of software implementation or combination software and hardware.Moreover, the embodiment of the present application Can use can be situated between in one or more computers for wherein including computer usable program code with storage The computer journey that matter is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of sequence product.
In a typical configuration, the computer equipment includes one or more processors (CPU), input/output interface, network interface and internal memory.Internal memory potentially includes computer-readable medium In volatile memory, the shape such as random access memory (RAM) and/or Nonvolatile memory Formula, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.Computer-readable medium includes permanent and non-permanent, removable and non-removable media It can realize that information is stored by any method or technique.Information can be computer-readable instruction, Data structure, the module of program or other data.The example of the storage medium of computer includes, but Phase transition internal memory (PRAM), static RAM (SRAM), dynamic random is not limited to deposit Access to memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other in Deposit technology, read-only optical disc read-only storage (CD-ROM), digital versatile disc (DVD) or other Optical storage, magnetic cassette tape, tape magnetic rigid disk storage other magnetic storage apparatus or it is any its His non-transmission medium, the information that can be accessed by a computing device available for storage.According to herein Define, computer-readable medium does not include the computer readable media (transitory media) of non-standing, Such as the data-signal and carrier wave of modulation.
The embodiment of the present application is with reference to according to the method for the embodiment of the present application, terminal device (system) and meter The flow chart and/or block diagram of calculation machine program product is described.It should be understood that can be by computer program instructions Each flow and/or square frame and flow chart and/or square frame in implementation process figure and/or block diagram The combination of flow and/or square frame in figure.Can provide these computer program instructions to all-purpose computer, The processor of special-purpose computer, Embedded Processor or other programmable data processing terminal equipments is to produce One machine so that pass through the computing devices of computer or other programmable data processing terminal equipments Instruction produce be used to realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The device for the function of being specified in multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable datas to handle In the computer-readable memory that terminal device works in a specific way so that be stored in this computer-readable Instruction in memory, which is produced, includes the manufacture of command device, and command device realization is in flow chart one The function of being specified in flow or multiple flows and/or one square frame of block diagram or multiple square frames.
These computer program instructions can also be loaded into computer or other programmable data processing terminals are set It is standby upper so that series of operation steps is performed on computer or other programmable terminal equipments in terms of producing The processing that calculation machine is realized, so that the instruction performed on computer or other programmable terminal equipments provides use In realization in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames The step of function of specifying.
Although having been described for the preferred embodiment of the embodiment of the present application, those skilled in the art are once Basic creative concept is known, then other change and modification can be made to these embodiments.So, Appended claims are intended to be construed to include preferred embodiment and fall into the institute of the embodiment of the present application scope Have altered and change.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relation art Language is used merely to make a distinction an entity or operation with another entity or operation, and not necessarily It is required that or implying between these entities or operation there is any this actual relation or order.And And, term " comprising ", "comprising" or any other variant thereof is intended to cover non-exclusive inclusion, from And make it that the process, method, article or the terminal device that include a series of key elements not only will including those Element, but also other key elements including being not expressly set out, or also include being this process, side Method, article or the intrinsic key element of terminal device.In the absence of more restrictions, by sentence The key element that "including a ..." is limited, it is not excluded that in the process including the key element, method, thing Also there is other identical element in product or terminal device.
Above to a kind of method for processing business provided herein, a kind of business processing device and one kind Intelligent terminal, is described in detail, used herein principle and reality of the specific case to the application The mode of applying is set forth, the explanation of above example be only intended to help understand the present processes and Its core concept;Simultaneously for those of ordinary skill in the art, according to the thought of the application, It will change in embodiment and application, in summary, this specification content is not It is interpreted as the limitation to the application.

Claims (37)

1. a kind of method for processing business, it is characterised in that including:
Receive the service request of the first user;
The corresponding checking request of the service request is sent to the second client of second user;Wherein, The second user has pre-set user relation with first user;
Receive the result of second client to the checking request;
When the result meets presetting rule, the processing to the service request is terminated.
2. according to the method described in claim 1, it is characterised in that determine as follows described Second user:
According to the corresponding proof rule of first user, the second user is determined;Or
The first user profile and business information carried according to the service request, in the first user letter Searched in mapping relations between breath, proof rule and second user information, to obtain described the The information of two users;Or
The first user profile carried according to the service request, in the first user profile and second user Mapping relations between information are searched, to obtain the information of the second user.
3. method according to claim 2, it is characterised in that described according to first user Corresponding proof rule, the step of determining the second user, including:
The business information carried in the service request and/or taken in the service request in preset time period When the business information of band meets the proof rule, according to the proof rule and second user pre-established Mapping relations between information, obtain the corresponding second user information of the proof rule, as described The information of second user.
4. according to any described method in claims 1 to 3, it is characterised in that methods described is also Including:
Termination messages are sent to the first client of first user;The termination messages are used to indicate institute State the termination of service request.
5. method according to claim 3, it is characterised in that methods described also includes:
Receive and request is set;Wherein, described set in request carries the first user profile, second user Information and corresponding proof rule;
According to the second user information, described set is sent to the second client of correspondence second user Request;
Receive the first confirmation message that second client is returned, for the setting request;
After first confirmation message is received, reflecting between proof rule and second user information is set up The mapping relations penetrated between relation or the first user profile and second user information or the first use Mapping relations between family, proof rule and second user.
6. method according to claim 5, it is characterised in that methods described also includes:
The current state of user account corresponding to first user profile is determined, in the current state During for preset condition, refuse described set and ask;Or
First refuse information being returned according to second client, for the setting request, is refused It is described absolutely that request is set;Or
It is determined that the corresponding to proof rule of the checking scope beyond proof rule correspondence checking scope Three users, send described set to the 3rd client of the 3rd user and ask, receive the described 3rd 3rd refuse information that client is returned, for the setting request, and disappear according to the described 3rd refusal Breath, refuses described set and asks.
7. method according to claim 3, it is characterised in that methods described also includes:
Receive cancellation request or change request;Wherein, the is carried in the cancellation request or change request One user profile, second user information and its corresponding proof rule;
According to the second user information, described cancel is sent to the second client of correspondence second user Request or change request;
Receive it is that second client is returned, for the second true of the cancellation request or change request Recognize message;
After second confirmation message is received, delete between correspondence proof rule and second user information Mapping relations or the first user profile and second user information between mapping relations or first Mapping relations between user, proof rule and second user.
8. method according to claim 7, it is characterised in that methods described also includes:
Receive it is that second client is returned, refused for the second of the cancellation request or change request Exhausted message;
After second refuse information is received, maintain between correspondence proof rule and second user information Mapping relations or the first user profile and second user information between mapping relations or first Mapping relations between user, proof rule and second user.
9. according to the method in claim 2 or 3, it is characterised in that the result bag Include:Prevent or allow, then the presetting rule, including:
At least one the result includes preventing;Or
The number of times of prevention is more than first threshold;Or
The number of times of prevention is more than Second Threshold relative to the ratio of the number of times of refusal.
10. method according to claim 9, it is characterised in that the proof rule includes:One Plant or the corresponding rule of multiple business information;
The business information includes at least one of following information:Business correspondence parameter, business pair Business as, business source, business time of origin, business scene and in preset time period occurs Number of times;
The proof rule includes at least one of following rule:
Business correspondence parameter is in the range of preset amount;
Business object is in preset object range;
Business is originated in the range of preset source;
Business time of origin is in the range of preset time;
Business scene is in the range of preset location;And
Business frequency in preset time period is in the range of predetermined times.
11. a kind of method for processing business, it is characterised in that including:
Checking request corresponding to service request that the reception server is sent, the first user;
The checking request is verified by second user, to obtain corresponding the result;Its In, the second user has pre-set user relation with first user;
The result is sent to the server.
12. method according to claim 11, it is characterised in that methods described also includes:
The setting request that the reception server is sent;Wherein, described set carries the first user letter in request Breath, second user information and corresponding proof rule;
Obtained by second user and the first confirmation message asked is set for described;
First confirmation message is sent to the server.
13. method according to claim 12, it is characterised in that methods described also includes:
Acquired by second user and the first refuse information asked is set for described;
First refuse information is sent to the server.
14. according to any described method in claim 11 to 13, it is characterised in that methods described Also include:
Cancellation request or change request that the reception server is sent;Wherein, the cancellation request or change please The first user profile, second user information and its corresponding proof rule are carried in asking;
The second confirmation message for the cancellation request or change request is obtained by second user;
Second confirmation message is sent to the server.
15. method according to claim 14, it is characterised in that methods described also includes:
Obtained by second user and cancel message for the second of the cancellation request or change request;
Described second, which is sent, to the server cancels message.
16. a kind of method for processing business, it is characterised in that including:
The service request of the first user is sent to server, so that the server is to the second of second user Client sends the corresponding checking request of the service request, and second user is entered the checking request Row checking, to obtain corresponding the result;Wherein, the second user has with first user There is pre-set user relation.
17. method according to claim 16, it is characterised in that methods described also includes:
Receive the server and be directed to the termination messages that the service request is returned;The termination messages are used for Indicate the termination of the service request.
18. the method according to claim 16 or 17, it is characterised in that methods described is also wrapped Include:
Sent to server and request is set;Wherein, it is described set request in carry the first user profile, Second user information and corresponding proof rule.
19. method according to claim 18, it is characterised in that methods described also includes:
Cancellation request or change request are sent to server;Wherein, during the cancellation request or change are asked Carry the first user profile, second user information and its corresponding proof rule.
20. a kind of business processing device, it is characterised in that including:
First receiving module, the service request for receiving the first user;
First sending module, it is corresponding for sending the service request to the second client of second user Checking request;Wherein, the second user has pre-set user relation with first user;
Second receiving module, for receiving the result of second client to the checking request; And
Module is terminated, for when the result meets presetting rule, terminating to the service request Processing.
21. device according to claim 20, it is characterised in that described device also includes:Really Cover half block, for determining the second user;
The determining module, including:
First determination sub-module, according to the corresponding proof rule of first user, determines described second User;Or
Second determination sub-module, the first user profile carried according to the service request and business letter Looked into breath, the mapping relations between the first user profile, proof rule and second user information Look for, to obtain the information of the second user;Or
3rd determination sub-module, the first user profile carried according to the service request is used first Mapping relations between family information and second user information are searched, to obtain the second user Information.
22. device according to claim 21, it is characterised in that described first determines submodule Block, including:
Searching unit, for the business information carried in the service request and/or in preset time period Service request in the business information that carries when meeting the proof rule, according to the checking pre-established Mapping relations between rule and second user information, obtain the corresponding second user of the proof rule Information, is used as the information of the second user.
23. according to any described device in claim 20 to 22, it is characterised in that described device Also include:
Second sending module, for sending termination messages to the first client of first user;It is described Termination messages are used for the termination for indicating the service request.
24. device according to claim 22, it is characterised in that described device also includes:
3rd receiving module, request is set for receiving;Wherein, described set in request carries first User profile, second user information and corresponding proof rule;
3rd sending module, for according to the second user information, to the second visitor of correspondence second user Family end sends described set and asked;
4th receiving module, it is that second client is returned, for the setting request for receiving First confirmation message;
Module is set up, for after first confirmation message is received, setting up proof rule and second user Mapping relations between mapping relations or the first user profile and second user information between information, Or the mapping relations between first user, proof rule and second user.
25. device according to claim 24, it is characterised in that described device also includes:
First refusal module, the current shape for determining user account corresponding to first user profile State, when the current state is preset condition, refuses described set and asks;Or
Second refusal module, for it is being returned according to second client, for it is described set request The first refuse information, refuse it is described set request;Or
Second refusal module, for determining checking scope beyond proof rule correspondence checking scope The 3rd user corresponding to proof rule, described set is sent to the 3rd client of the 3rd user Request, receives the 3rd refuse information that the 3rd client is returned, for the setting request, and According to the 3rd refuse information, refuse described set and ask.
26. device according to claim 22, it is characterised in that described device also includes:
5th receiving module, for receiving cancellation request or change request;Wherein, the cancellation request or The first user profile, second user information and its corresponding proof rule are carried in change request;
4th sending module, for according to the second user information, to the second visitor of correspondence second user Family end sends the cancellation request or change request;
6th receiving module, for receive it is that second client is returned, for the cancellation request or Change the second confirmation message of request;
Removing module, for after second confirmation message is received, deleting correspondence proof rule and second Mapping between mapping relations or the first user profile and second user information between user profile is closed System or the mapping relations between the first user, proof rule and second user.
27. device according to claim 26, it is characterised in that described device also includes:
7th receiving module, for receive it is that second client is returned, for the cancellation request or Change the second refuse information of request;
Maintenance module, for after second refuse information is received, maintaining correspondence proof rule and second Mapping between mapping relations or the first user profile and second user information between user profile is closed System or the mapping relations between the first user, proof rule and second user.
28. a kind of business processing device, it is characterised in that including:
First receiving module, for corresponding to the reception server transmission, the first user service request Checking request;
Authentication module, it is corresponding to obtain for being verified by second user to the checking request The result;Wherein, the second user has pre-set user relation with first user;And
First sending module, for sending the result to the server.
29. device according to claim 28, it is characterised in that described device also includes:
Second receiving module, the setting request sent for the reception server;Wherein, it is described that request is set In carry the first user profile, second user information and corresponding proof rule;
First acquisition module, sets the first of request to confirm to disappear for being obtained by second user for described Breath;
Second sending module, for sending first confirmation message to the server.
30. device according to claim 29, it is characterised in that described device also includes:
Second acquisition module, sets the first of request to refuse for being acquired by second user for described Exhausted message;
3rd sending module, for sending first refuse information to the server.
31. according to any described device in claim 28 to 30, it is characterised in that described device Also include:
3rd receiving module, the cancellation request sent for the reception server or change request;Wherein, institute State and carry the first user profile, second user information in cancellation request or change request and its corresponding test Card rule;
3rd acquisition module, for obtaining what is asked for the cancellation request or change by second user Second confirmation message;
4th sending module, for sending second confirmation message to the server.
32. device according to claim 31, it is characterised in that described device also includes:
4th acquisition module, for obtaining what is asked for the cancellation request or change by second user Second cancels message;
5th sending module, message is cancelled for sending described second to the server.
33. a kind of business processing device, it is characterised in that including:
First sending module, the service request for sending the first user to server, so that the service Device sends the corresponding checking request of the service request to the second client of second user, and makes the second use Family is verified to the checking request, to obtain corresponding the result;Wherein, described second use Family has pre-set user relation with first user.
34. device according to claim 33, it is characterised in that described device also includes:
Receiving module, the termination messages that the service request is returned are directed to for receiving the server;Institute State the termination that termination messages are used to indicate the service request.
35. the device according to claim 33 or 34, it is characterised in that described device is also wrapped Include:
Second sending module, request is set for being sent to server;Wherein, described set in request is taken With the first user profile, second user information and corresponding proof rule.
36. device according to claim 35, it is characterised in that described device also includes:
3rd sending module, for sending cancellation request or change request to server;Wherein, it is described to take Disappear to ask or change and the first user profile, second user information and its corresponding checking rule are carried in request Then.
37. a kind of intelligent terminal, it is characterised in that include memory, and one or one with On program, one of them or more than one program storage is configured to by one in memory Or more than one computing device is one or more than one program bag contains for carrying out following behaviour The instruction of work:
Receive the service request of the first user;
The corresponding checking request of the service request is sent to the second client of second user;Wherein, The second user has pre-set user relation with first user;
Receive the result of second client to the checking request;
When the result meets presetting rule, the processing to the service request is terminated.
CN201610174148.6A 2016-03-24 2016-03-24 Service processing method and device and intelligent terminal Active CN107230080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610174148.6A CN107230080B (en) 2016-03-24 2016-03-24 Service processing method and device and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610174148.6A CN107230080B (en) 2016-03-24 2016-03-24 Service processing method and device and intelligent terminal

Publications (2)

Publication Number Publication Date
CN107230080A true CN107230080A (en) 2017-10-03
CN107230080B CN107230080B (en) 2021-04-30

Family

ID=59932230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610174148.6A Active CN107230080B (en) 2016-03-24 2016-03-24 Service processing method and device and intelligent terminal

Country Status (1)

Country Link
CN (1) CN107230080B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI688911B (en) * 2018-12-12 2020-03-21 臺灣銀行股份有限公司 Mobile payment sub-account system
CN111915317A (en) * 2020-08-31 2020-11-10 支付宝(杭州)信息技术有限公司 Payment processing method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013049359A1 (en) * 2011-09-27 2013-04-04 Visa International Service Association Social network payment authentication apparatuses, methods and systems
CN104811428A (en) * 2014-01-28 2015-07-29 阿里巴巴集团控股有限公司 Method, device and system for verifying client identity by social relation data
CN105225111A (en) * 2014-06-17 2016-01-06 阿里巴巴集团控股有限公司 A kind of method and apparatus of online payment checking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013049359A1 (en) * 2011-09-27 2013-04-04 Visa International Service Association Social network payment authentication apparatuses, methods and systems
CN104811428A (en) * 2014-01-28 2015-07-29 阿里巴巴集团控股有限公司 Method, device and system for verifying client identity by social relation data
CN105225111A (en) * 2014-06-17 2016-01-06 阿里巴巴集团控股有限公司 A kind of method and apparatus of online payment checking

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI688911B (en) * 2018-12-12 2020-03-21 臺灣銀行股份有限公司 Mobile payment sub-account system
CN111915317A (en) * 2020-08-31 2020-11-10 支付宝(杭州)信息技术有限公司 Payment processing method, device and system

Also Published As

Publication number Publication date
CN107230080B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
Bhutta et al. A survey on blockchain technology: Evolution, architecture and security
US10749676B2 (en) Distributed consent protecting data across systems and services
EP3791551B1 (en) User id codes for online verification
Truong et al. Blockchain meets metaverse and digital asset management: A comprehensive survey
Anakath et al. Privacy preserving multi factor authentication using trust management
CN104915832B (en) Mobile payment, verification method and its device and system
US11876801B2 (en) User ID codes for online verification
CN109274652A (en) Identity information verifies system, method and device and computer storage medium
CN109493047A (en) A kind of commission settlement method, device and terminal device based on block chain
Bergquist Blockchain technology and smart contracts: privacy-preserving tools
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN108171029A (en) Intelligent and safe chip
CA3049685A1 (en) Managing distributed content using layered permissions
CN106911722A (en) A kind of intelligent cipher signature identity differentiates mutual authentication method and system
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
Barati et al. Privacy‐aware cloud ecosystems: Architecture and performance
Chaudhry et al. Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
Ajao et al. Application of crypto-blockchain technology for securing electronic voting systems
CA3050487A1 (en) System and method for storing and distributing consumer information
CN107230080A (en) A kind of method for processing business, device and intelligent terminal
Ahmed et al. A self-sovereign identity architecture based on blockchain and the utilization of customer’s banking cards: The case of bank scam calls prevention
CN109697368A (en) Method, equipment and system that user information data safety uses, storage medium
CN113935070B (en) Data processing method, device and equipment based on block chain and storage medium
CN115801317A (en) Service providing method, system, device, storage medium and electronic equipment
Arfaoui et al. A privacy-preserving NFC mobile pass for transport systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201228

Address after: Room 603, 6 / F, Roche Plaza, 788 Cheung Sha Wan Road, Kowloon, China

Applicant after: Zebra smart travel network (Hong Kong) Limited

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant