CN107292628B - Service implementation method and device - Google Patents

Service implementation method and device Download PDF

Info

Publication number
CN107292628B
CN107292628B CN201710233414.2A CN201710233414A CN107292628B CN 107292628 B CN107292628 B CN 107292628B CN 201710233414 A CN201710233414 A CN 201710233414A CN 107292628 B CN107292628 B CN 107292628B
Authority
CN
China
Prior art keywords
information
user
service
application
target service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710233414.2A
Other languages
Chinese (zh)
Other versions
CN107292628A (en
Inventor
席炎
赵星
胡滔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201710233414.2A priority Critical patent/CN107292628B/en
Publication of CN107292628A publication Critical patent/CN107292628A/en
Application granted granted Critical
Publication of CN107292628B publication Critical patent/CN107292628B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Abstract

A service implementing method and device are used for preventing the phenomenon of embezzlement of user information in the service application process. The method comprises the following steps: receiving service application information sent by a merchant server, wherein the service application information comprises the content of an applied target service and user information for applying for the target service; determining a user account corresponding to the user information; pushing information to be confirmed to user equipment logging in the user account, wherein the information to be confirmed is used for indicating that the user information is used for applying for the target service; and after receiving an instruction of refusing to apply for the target service sent by the user equipment, sending indication information for indicating that the user information is stolen to the merchant server.

Description

Service implementation method and device
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for implementing a service.
Background
At present, a user can apply for various internet services on line by utilizing personal information, and a service accepting party confirms that the service application is successful after verifying the authenticity of the personal information. It is common that personal information of a user is very easily obtained illegally by others through various channels. After stealing the personal information of the user, other people can utilize the stolen personal information to apply for various internet services on line on the name of the real owner of the personal information. Since the business acceptance party cannot identify the information embezzlement phenomenon at present, the credit of the real owner is influenced or certain property loss is caused.
Disclosure of Invention
In view of this, the present application provides a service implementation method and apparatus.
In order to achieve the above purpose, the present application provides the following technical solutions:
according to a first aspect of the present application, a method for implementing a service is provided, which is applied to an application server, and includes:
receiving service application information sent by a merchant server, wherein the service application information comprises the content of an applied target service and user information for applying for the target service;
determining a user account corresponding to the user information;
pushing information to be confirmed to user equipment logging in the user account, wherein the information to be confirmed is used for indicating that the user information is used for applying for the target service;
and after receiving an instruction of refusing to apply for the target service sent by the user equipment, sending indication information for indicating that the user information is stolen to the merchant server.
According to a second aspect of the present application, a service implementation method is provided, which is applied to a user equipment, and includes:
receiving to-be-confirmed information sent by an application server, wherein the to-be-confirmed information is used for indicating that user information is used for applying for a target service; the information to be confirmed is sent after the application server receives service application information sent by a merchant server, and the service application information comprises the content of a target service to be applied and user information for applying for the target service;
displaying the information to be confirmed;
after the target operation of a user is detected, an instruction for refusing to apply for the target service is sent to the application server; the instruction is used for triggering the application server to send indication information to the merchant server, and the indication information is used for indicating that the user information is stolen.
According to a third aspect of the present application, a service implementation apparatus is provided, which is applied to an application server, and includes:
a first receiving unit, configured to receive service application information sent by a merchant server, where the service application information includes content of a target service to be applied and user information for applying for the target service;
a determining unit, configured to determine a user account corresponding to the user information;
the pushing unit is used for pushing information to be confirmed to user equipment logging in the user account, wherein the information to be confirmed is used for indicating that the user information is used for applying for the target service;
and the first sending unit is used for sending indication information for indicating that the user information is stolen to the merchant server after receiving the instruction of refusing to apply for the target service, which is sent by the user equipment.
According to a fourth aspect of the present application, a service implementation apparatus is provided, which is applied to a user equipment, and includes:
the second receiving unit is used for receiving and displaying to-be-confirmed information sent by the application server, wherein the to-be-confirmed information is used for indicating that the user information is used for applying for the target service; the information to be confirmed is sent after the application server receives service application information sent by a merchant server, and the service application information comprises the content of a target service to be applied and user information for applying for the target service;
a second sending unit, configured to send, to the application server, an instruction for rejecting application of the target service after detecting a target operation of a user; the instruction is used for triggering the application server to send indication information to the merchant server, and the indication information is used for indicating that the user information is stolen.
In the embodiment of the application, when the user information is used for applying for the target service, the merchant server may send service application information to the application server, so that the application server pushes information to be confirmed to user equipment used by a real owner of the user information, the information to be confirmed is used for prompting that the user information is used for applying for the target service, and finally, if the real owner confirms that the user does not apply for the target service by himself, the user equipment may confirm that the application for the target service is refused, so that a process of embezzlement of information of other people for service application is terminated.
Drawings
Fig. 1 is a flowchart of a service implementation method provided in an exemplary embodiment of the present application;
fig. 2 is a scene diagram of a service implementation method provided in an exemplary embodiment of the present application;
fig. 3 is a flowchart of a service implementation method based on an application server according to an exemplary embodiment of the present application;
fig. 4 is a flowchart of a service implementation method mainly based on user equipment according to an exemplary embodiment of the present application;
FIG. 5 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present application;
fig. 6 is a block diagram of a service implementation apparatus applied to an application server according to an exemplary embodiment of the present application;
fig. 7 is a block diagram of a service implementation apparatus applied to a user equipment according to an exemplary embodiment of the present application.
Detailed Description
At present, some people apply for various internet services on line on the name of the real owner of user information by stealing the user information of others and utilizing the stolen user information, which not only causes a stain on the credit of the real owner of the user information, but also causes certain loss to a service accepting party. In the related art, one solution is: and deducing the possibility of the user identity being stolen through the analysis of the user behavior data, and terminating the business application process when the possibility of the theft is high. However, this solution requires support of sufficiently accurate user behavior data, which has a certain uncertainty and is prone to cause misjudgment when the user behavior data is insufficient.
The application provides a service implementation method for preventing the identity of a user from being stolen. The method needs to be implemented through interaction among the merchant server, the application server and the user equipment. The merchant server opens some internet services to the user, and the user can apply for the internet services on the merchant server by using the real user information. The user may apply for the related internet service through application client software or a web page provided by a merchant (e.g., a financial institution). Among other things, internet traffic may include, but is not limited to: financial services such as an online credit card application service and an online loan application service. For example, the merchant server may be: bank servers, servers of third-party financial institutions, servers of internet payment platforms, and the like; user information may include, but is not limited to: the user's identity information (such as name, identification card information, date of birth, home address, etc.), the user's social security information, the user's asset information, the user's income information, etc. The Application server may be any server corresponding to an Application (APP) program, for example, a payment platform server, an e-commerce platform server, an Instant Messaging (IM) server, a network appointment server, and the like. The user equipment may be: smart phones, computers, Personal Digital Assistants (PDAs), etc. The user can register a personal account through the application server, and the identity information is collected in the process of registering the personal account, wherein the process comprises the following steps: providing personal real user information, biological characteristic (such as human face characteristic, fingerprint characteristic and the like) collection and the like. In addition, a merchant may cooperate with one or more application platforms to implement the technical solution of the present application through interaction of a merchant server and an application server.
Fig. 1 is a flowchart of a service implementation method according to an exemplary embodiment of the present application. As shown in FIG. 1, in one embodiment of the present application, the method includes the following steps 101-109, wherein:
in step 101, a merchant server receives user information for applying for a target service, which is requested to be used in applying for the target service.
The target business can be various internet financial businesses. The request can come from any user equipment which can interact with the merchant server in the network, and the user equipment can be equipment used by a real owner (or called a real user) of the user information or equipment used by an information embezzler.
In step 102, after receiving a request for applying for a target service, a merchant server sends service application information to an application server; the service application information may include content of a target service to be applied and user information for applying for the target service.
The content of the target service may include one or more of service ID, acceptance organization ID, service type, repayment time limit, interest rate, and other information, such as: apply for 2 ten thousand yuan loan on the A platform. The service application information may also include other information, such as: time of application, device information (e.g., MAC address) used by the applicant, etc., without limitation.
In step 103, the application server determines a user account corresponding to the user information according to the service application information.
In this embodiment of the application, the real owner of the user information may register a user account on the application server in advance, and the user information (such as an ID) of the real owner also needs to be provided in the process of registering the user account. Therefore, on the premise of knowing the user information, the user account uniquely corresponding to the user information can be determined, such as: luo 123.
In step 104, the application server pushes information to be confirmed to the user equipment logging in the user account, where the information to be confirmed is used to indicate that the user information is used to apply for the target service. The information to be confirmed can be pushed through an APP Instant Messaging (IM), an email, and the like.
In step 105, the user device displays the received information to be confirmed for the real user to see the information to be confirmed.
In step 106, after detecting the target operation of the user, the user equipment sends an instruction for rejecting the application for the target service to the application server.
After the information to be confirmed is checked, the real user can confirm whether the internet service being applied is handled by the user. In an embodiment of the present application, on the page displaying the information to be confirmed, a yes key and a no key may be included, and a user may trigger an instruction for agreeing to apply for the target service by clicking the yes key; the user may trigger an instruction for rejecting the application for the target service by clicking on the no operation. Of course, the type of target operation is not limited herein.
In step 107, the application server triggers a biometric identification process upon receiving the above-mentioned instruction for refusing to apply for the target service.
To ensure that the instruction is triggered by the true owner of the user information, embodiments of the present application may be verified by biometric identification. Among them, the Biometric Identification (Biometric Identification) technique is to identify the identity of a person by using physiological characteristics, behavioral characteristics, and the like of the person. Biometric identification systems extract their unique features by sampling them and converting them into digital codes, and further assembling these codes into a feature template. When identity authentication is carried out, the biological characteristic identification system collects the characteristics of the user and compares the characteristics with the characteristic template in the database to determine whether the characteristics are matched, so that whether biological characteristic identification passes or not is determined. Of course, in other embodiments, this step 107 may be omitted.
In an alternative embodiment, the biometric identification process may be a face feature identification process. In the process, the face characteristics of the user do not need to be collected in advance through a camera of the mobile terminal used by the user and are input into the database. During face recognition, the face image of a user is collected, the collected face image is compared with the face image applied to the resident identification card in the public security department system, if the collected face image is matched with the resident identification card, face recognition is determined to be passed, and otherwise, face recognition is determined not to be passed. Because the face recognition can be carried out by means of the face image applied to the resident identification card in the public security department system, the process of collecting a large number of face features in advance and inputting the face features into the database can be avoided, and the implementation cost is effectively reduced. Of course, the biometric identification process described above may also be a fingerprint identification process.
In step 108, if the biometric identification is passed, the application server sends indication information for indicating that the user information is stolen to the merchant server. And if the biological characteristic identification is not passed, not sending the indication information for indicating the user information is stolen. For example: "1" represents that the user information is stolen, and "0" represents that the user information is not stolen.
In step 109, after receiving the indication information indicating that the user information is stolen, the merchant server confirms that the service is applied by the information embezzler, and can terminate the service application process in time. Otherwise, the service application process is determined to be normally carried out (such as a normal service auditing process is continued).
Fig. 2 is a diagram of a scenario of a service implementation method according to an exemplary embodiment of the present application, and as shown in fig. 2, assuming that a service applicant is not an actual user, the scenario includes an application server 10, a merchant server 20, an electronic device 30 used by the service applicant, and an electronic device 40 used by the actual user. Although the service applicant acts as a party for stealing the user information of others, by submitting the correct user information (with a high probability, the user information will pass the audit) to the merchant server 20 and applying for the target service by using the user information, since the merchant server 20 will send the service application information to the application server 10 and send the information to be confirmed, such as: "you are applying for the XX service and please confirm whether the XX service is applied by the user", so that the service application event can be known by the real user and the real user is required to personally confirm whether the XX service is operated by the user, thereby accurately identifying the phenomenon that the information is stolen and avoiding the property loss of the user. In addition, the process does not need to acquire enough user behavior data, so that the uncertainty is eliminated, and the implementation cost is lower.
Fig. 3 is a flowchart of a service implementation method based on an application server according to an exemplary embodiment of the present application, and corresponding to the embodiment shown in fig. 1, from the perspective of the application server, the method may be implemented by the following processes:
step 201: receiving service application information sent by a merchant server, wherein the service application information comprises the content of a target service to be applied and user information for applying for the target service.
Step 202: and determining a user account corresponding to the user information.
Step 203: and pushing information to be confirmed to user equipment logging in the user account, wherein the information to be confirmed is used for indicating that the user information is used for applying for the target service.
Step 204: and after receiving an instruction of refusing to apply for the target service sent by the user equipment, sending indication information for indicating that the user information is stolen to the merchant server.
In an embodiment, after receiving an instruction of agreeing to apply for the target service sent by the user equipment, indication information indicating that the user information is not stolen may be sent to the merchant server. In another embodiment, after receiving the instruction of agreeing to apply for the target service sent by the user equipment, the user equipment may not send any information to the merchant server.
Fig. 4 is a flowchart of a service implementation method mainly based on a user equipment according to an exemplary embodiment of the present application, and corresponding to the embodiment shown in fig. 1, from the perspective of the user equipment, the method may be implemented through the following processes:
step 301: receiving to-be-confirmed information sent by an application server, wherein the to-be-confirmed information is used for prompting that user information is used for applying for a target service; the information to be confirmed is sent after the application server receives service application information sent by a merchant server, and the service application information contains the content of the target service to be applied and user information for applying for the target service.
Step 302: and displaying the information to be confirmed.
Step 303: after the target operation of a user is detected, an instruction for refusing to apply for the target service is sent to the application server; the instruction is used for triggering the application server to send indication information to the merchant server, and the indication information is used for indicating that the user information is stolen.
In an embodiment, the step 303 may specifically include:
after the target operation of the user is detected, collecting biological characteristics and identifying the collected biological characteristics; wherein the biological characteristics include, but are not limited to: face features and/or fingerprint features.
And if the biological characteristic identification passes, sending an instruction for refusing to apply for the target service to the application server. And if the biological characteristic identification is not passed, refusing to send an instruction of refusing to apply for the target service to the application server. Through biological characteristic recognition, the true owner of the user information can be ensured to confirm the information to be confirmed, the accuracy of the information theft event is improved, and the difficulty of information theft is further improved.
Based on the technical solutions of the above embodiments, when user information is used to apply for a target service, a merchant server may send service application information to an application server, so that the application server pushes information to be confirmed to user equipment used by a real owner of the user information, where the information to be confirmed is used to indicate that the user information is used to apply for the target service, and finally, if the real owner confirms that the user does not apply for the target service, the user equipment may confirm that the target service is denied, thereby terminating a process of stealing information of other people to apply for the service.
Fig. 5 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present application. As shown in fig. 5, the electronic device may be a user device (client device or terminal device) or an application server, and the electronic device may include a processor, an internal bus, a network interface, a memory, a non-volatile memory, and possibly hardware required by other services. The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the service implementation device on the logic level. Of course, besides the software implementation, the present application does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
As shown in fig. 6, in an embodiment of the present application, a service implementation apparatus applied to an application server includes:
a first receiving unit 401, configured to receive service application information sent by a merchant server, where the service application information includes content of a target service to be applied and user information for applying for the target service;
a determining unit 402, configured to determine a user account corresponding to the user information;
a pushing unit 403, configured to push information to be confirmed to the user equipment logging in the user account, where the information to be confirmed is used to prompt that the user information is used to apply for the target service;
a first sending unit 404, configured to send, after receiving the instruction for rejecting the application for the target service sent by the user equipment, indication information for indicating that the user information is stolen to the merchant server.
In an embodiment, the first sending unit 404 may further be configured to: and after receiving an instruction of agreeing to apply for the target service sent by the user equipment, sending indication information for indicating that the user information is not stolen to the merchant server.
In an embodiment of the present application, the apparatus may further include:
a biometric identification unit for triggering a biometric identification process; wherein the biological characteristics include, but are not limited to: face features and/or fingerprint features.
Correspondingly, the first sending unit 404 may specifically be configured to:
and after receiving an instruction of refusing to apply for the target service sent by the user equipment and passing the biological characteristic identification, sending indication information for indicating that the user information is stolen to the merchant server.
In an embodiment of the present application, the target service includes a service of applying for credit card online and/or a service of applying for loan online.
As shown in fig. 7, in an embodiment of the present application, a service implementation apparatus applied to a user equipment includes:
a second receiving unit 501, configured to receive and display information to be confirmed sent by an application server, where the information to be confirmed is used to prompt a user that information is used to apply for a target service; the information to be confirmed is sent after the application server receives service application information sent by a merchant server, wherein the service application information comprises the content of a target service to be applied and user information for applying for the target service;
a second sending unit 502, configured to send, after detecting a target operation of a user, an instruction for rejecting application of the target service to the application server; the instruction is used for triggering the application server to send indication information to the merchant server, and the indication information is used for indicating that the user information is stolen.
In an embodiment, the apparatus may further comprise a biometric identification unit for:
collecting biological characteristics and identifying the collected biological characteristics; wherein the biological characteristics include, but are not limited to: face features and/or fingerprint features.
Then, the second sending unit 502 may specifically be configured to:
and after the target operation of the user is detected, if the biological characteristic identification is passed, sending an instruction for refusing to apply for the target service to the application server.
It should be noted that the above-mentioned apparatus embodiments and the above-mentioned method embodiments can be mutually complementary without violating the present invention.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A service implementation method is applied to an application server, and is characterized in that the method comprises the following steps:
receiving service application information sent by a merchant server, wherein the service application information comprises the content of an applied target service and user information for applying for the target service; the business application information is sent by the merchant server when receiving a request for applying for a target business from user equipment used by a business applicant; the application platform corresponding to the application server and the merchant corresponding to the merchant server are in a cooperative relationship;
determining a user account corresponding to the user information;
pushing information to be confirmed to user equipment used by a real user logging in the user account, wherein the information to be confirmed is used for indicating that the user information is used for applying for the target service;
after receiving an instruction of refusing to apply for the target service, which is sent by user equipment used by the real user, sending indication information for indicating that the user information is stolen to the merchant server;
the target service comprises a service of applying for credit card on line and/or a service of applying for loan on line;
wherein before sending, to the merchant server, indication information for indicating that the user information is stolen, the method further comprises:
triggering a biometric identification process;
the sending, to the merchant server, indication information for indicating that the user information is stolen includes:
and if the biological characteristic identification passes, sending indication information for indicating that the user information is stolen to the merchant server.
2. The method of claim 1, further comprising:
and after receiving an instruction of agreeing to apply for the target service, which is sent by user equipment used by the real user, sending indication information for indicating that the user information is not stolen to the merchant server.
3. The method of claim 1, wherein the biometric feature is a human face feature.
4. A service implementation method is applied to user equipment, and is characterized in that the method comprises the following steps:
receiving to-be-confirmed information sent by an application server, wherein the to-be-confirmed information is used for indicating that user information is used for applying for a target service; the information to be confirmed is sent after the application server receives service application information sent by a merchant server, and the service application information comprises the content of a target service to be applied and user information for applying for the target service; the business application information is sent by the merchant server when receiving a request for applying for a target business from user equipment used by a business applicant; the application platform corresponding to the application server and the merchant corresponding to the merchant server are in a cooperative relationship;
displaying the information to be confirmed;
after the target operation of a user is detected, an instruction for refusing to apply for the target service is sent to the application server; the instruction is used for triggering the application server to send indication information to the merchant server, and the indication information is used for indicating that the user information is stolen;
the target service comprises a service of applying for credit card on line and/or a service of applying for loan on line;
after the target operation of the user is detected, the sending of the instruction for refusing to apply for the target service to the application server includes:
after the target operation of the user is detected, collecting biological characteristics and identifying the collected biological characteristics;
and if the biological characteristic identification passes, sending an instruction for refusing to apply for the target service to the application server.
5. The method of claim 4, wherein the biometric feature is a human face feature.
6. A service implementation device applied to an application server is characterized in that the device comprises:
a first receiving unit, configured to receive service application information sent by a merchant server, where the service application information includes content of a target service to be applied and user information for applying for the target service; the business application information is sent by the merchant server when receiving a request for applying for a target business from user equipment used by a business applicant; the application platform corresponding to the application server and the merchant corresponding to the merchant server are in a cooperative relationship;
a determining unit, configured to determine a user account corresponding to the user information;
the pushing unit is used for pushing information to be confirmed to user equipment used by a real user logging in the user account, wherein the information to be confirmed is used for indicating that the user information is used for applying for the target service;
a first sending unit, configured to send, to the merchant server, indication information for indicating that the user information is stolen after receiving an instruction for rejecting application of the target service, where the instruction is sent by user equipment used by the real user;
the target service comprises a service of applying for credit card on line and/or a service of applying for loan on line;
wherein the apparatus further comprises:
a biometric identification unit for triggering a biometric identification process;
the first sending unit is specifically configured to:
and after receiving an instruction of refusing to apply for the target service sent by the user equipment and passing the biological characteristic identification, sending indication information for indicating that the user information is stolen to the merchant server.
7. The apparatus of claim 6, wherein the first sending unit is further configured to:
and after receiving an instruction of agreeing to apply for the target service, which is sent by user equipment used by the real user, sending indication information for indicating that the user information is not stolen to the merchant server.
8. The apparatus of claim 6, wherein the biometric feature is a human face feature.
9. A service implementation apparatus applied to a User Equipment (UE), the apparatus comprising:
the second receiving unit is used for receiving and displaying to-be-confirmed information sent by the application server, wherein the to-be-confirmed information is used for indicating that the user information is used for applying for the target service; the information to be confirmed is sent after the application server receives service application information sent by a merchant server, and the service application information comprises the content of a target service to be applied and user information for applying for the target service; the business application information is sent by the merchant server when receiving a request for applying for a target business from user equipment used by a business applicant; the application platform corresponding to the application server and the merchant corresponding to the merchant server are in a cooperative relationship;
a second sending unit, configured to send, to the application server, an instruction for rejecting application of the target service after detecting a target operation of a user; the instruction is used for triggering the application server to send indication information to the merchant server, and the indication information is used for indicating that the user information is stolen;
the target service comprises a service of applying for credit card on line and/or a service of applying for loan on line;
wherein the apparatus further comprises a biometric identification unit for:
collecting biological characteristics and identifying the collected biological characteristics;
the second sending unit is specifically configured to:
and after the target operation of the user is detected, if the biological characteristic identification is passed, sending an instruction for refusing to apply for the target service to the application server.
10. The apparatus of claim 9, wherein the biometric feature is a human face feature.
CN201710233414.2A 2017-04-11 2017-04-11 Service implementation method and device Active CN107292628B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710233414.2A CN107292628B (en) 2017-04-11 2017-04-11 Service implementation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710233414.2A CN107292628B (en) 2017-04-11 2017-04-11 Service implementation method and device

Publications (2)

Publication Number Publication Date
CN107292628A CN107292628A (en) 2017-10-24
CN107292628B true CN107292628B (en) 2021-06-29

Family

ID=60094311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710233414.2A Active CN107292628B (en) 2017-04-11 2017-04-11 Service implementation method and device

Country Status (1)

Country Link
CN (1) CN107292628B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101814169A (en) * 2010-03-05 2010-08-25 刘辛越 Method and device for realizing secure payment based on payment confirmation terminal and digital certification

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070081540A1 (en) * 2005-10-11 2007-04-12 First Data Corporation Emergency services notification from an ATM system and methods
CN1852094B (en) * 2005-12-13 2010-09-29 华为技术有限公司 Method and system for protecting account of network business user
CN103841527B (en) * 2012-11-20 2018-05-08 中国移动通信集团公司 User terminal, SMS server, secondary-confirmation short message certification system and method
CN104836780B (en) * 2014-02-12 2017-03-15 腾讯科技(深圳)有限公司 Data interactive method, checking terminal, server and system
CN105897663A (en) * 2015-01-26 2016-08-24 阿里巴巴集团控股有限公司 Method for determining access authority, device and equipment
CN105184881A (en) * 2015-08-28 2015-12-23 宇龙计算机通信科技(深圳)有限公司 Method, apparatus, server and system for identifying user identity
CN105516133B (en) * 2015-12-08 2019-12-13 腾讯科技(深圳)有限公司 User identity verification method, server and client
CN105791309B (en) * 2016-04-14 2019-09-17 北京小米移动软件有限公司 A kind of method, apparatus and system executing business processing

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101814169A (en) * 2010-03-05 2010-08-25 刘辛越 Method and device for realizing secure payment based on payment confirmation terminal and digital certification

Also Published As

Publication number Publication date
CN107292628A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
US11301855B2 (en) Data verification in transactions in distributed network
US11822694B2 (en) Identity breach notification and remediation
US8116731B2 (en) System and method for mobile identity protection of a user of multiple computer applications, networks or devices
CN105262779B (en) Identity authentication method, device and system
CN109257366B (en) Method and device for authenticating user
US20130054433A1 (en) Multi-Factor Identity Fingerprinting with User Behavior
US20150227934A1 (en) Method and system for determining and assessing geolocation proximity
CN107451819B (en) Identity verification method and device based on user operation behavior characteristics
CN112651841B (en) Online business handling method, online business handling device, server and computer readable storage medium
CN107729727B (en) Real-name authentication method and device for account
CN109544335B (en) Transaction data processing method, device, equipment and storage medium based on blockchain
WO2015062290A1 (en) Methods and systems for authentications and online transactions
WO2018174824A1 (en) Systems and methods for user identity authentication
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN111600716A (en) Authentication method and device and electronic equipment
CN111784347B (en) Resource transfer method and device
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN107679865B (en) Identity verification method and device based on touch area
CN107292628B (en) Service implementation method and device
CN111882425B (en) Service data processing method, device and server
CN111539742B (en) Information processing method, information processing device, electronic equipment and storage medium
US11562365B2 (en) User authentication based on a user interaction associated with a transaction
CN111815327A (en) Data true checking method and device and electronic equipment
US9875474B2 (en) Method for securing a transaction performed by bank card
US11797997B2 (en) Data verification in transactions in distributed network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant