CN108269187A - Verification method, device, equipment and the computer storage media of financial business - Google Patents

Verification method, device, equipment and the computer storage media of financial business Download PDF

Info

Publication number
CN108269187A
CN108269187A CN201810081998.0A CN201810081998A CN108269187A CN 108269187 A CN108269187 A CN 108269187A CN 201810081998 A CN201810081998 A CN 201810081998A CN 108269187 A CN108269187 A CN 108269187A
Authority
CN
China
Prior art keywords
verification
verified
information
operational order
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810081998.0A
Other languages
Chinese (zh)
Inventor
罗潜锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201810081998.0A priority Critical patent/CN108269187A/en
Publication of CN108269187A publication Critical patent/CN108269187A/en
Priority to PCT/CN2018/122609 priority patent/WO2019144738A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3672Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of verification methods of financial business, include the following steps:The operational order of financial business is received, obtains the business information included in the operational order;The safe class of the operational order is determined according to the business information, to obtain the corresponding proof rule of the safe class;The unit to be verified included in the proof rule is obtained, and the element to be verified in the unit to be verified is shown, so that user inputs the corresponding verification information of element to be verified;The verification information and default verification library are compared, to carry out the verification of the operating right of the operational order;When detecting that operating right is verified, the operational order is performed.The invention also discloses verification device, equipment and the computer storage medias of a kind of financial business.The present invention sets the scheme of corresponding operating right verification by using the operational order of financial business so that the safety of financial operation verification efficiency and business operation is laid equal stress on.

Description

Verification method, device, equipment and the computer storage media of financial business
Technical field
The present invention relates to the verification method of authentication field more particularly to financial business, device, equipment and computers to deposit Storage media.
Background technology
With the development of information technology, the business performed by network is more and more, and in order to when improving execution business Safety usually can carry out authentication to user.
Especially when being related to internet financial business, in order to allow user is self-service under computer assisted to complete various behaviour Make, such as remotely handle various businesses, such as remote control, Telnet etc. by network technology.Operation for user needs Authentication is carried out to user, with the user internet financial business of guarantee by safety, for example, handling internet gold in user It, can be with remote validation (can carry out authentication by two-way video with remote validation, such as user), Huo Zheyong when melting business Family by mobile phone (such as passing through mobile phone identifying code, method of password authentication) these verification methods, as long as other people possess the account and Password can be by verification, and safety is relatively low, can not ensure to verify the object authenticity of identity.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill Art.
Invention content
It is a primary object of the present invention to provide a kind of verification method of financial business, device, equipment and computer storage Medium, it is intended to efficiently to subscriber authentication, to determine whether user has financial business operating right, ensure user's operation Safety.
To achieve the above object, the present invention provides a kind of verification method of financial business, the authentication of the financial business Method includes the following steps:
The operational order of financial business is received, obtains the business information included in the operational order;
The safe class of the operational order is determined according to the business information, the safe class is corresponding to be tested to obtain Card rule;
Obtain the unit to be verified included in the proof rule, and by the element to be verified in the unit to be verified into Row display, so that user inputs the corresponding verification information of element to be verified;
The verification information and default verification library are compared, to carry out the verification of the operating right of the operational order;
When detecting that operating right is verified, the operational order is performed.
Optionally, the operational order for receiving financial business, obtains the business information that is included in the operational order Before step, including:
The application request of finance account input by user is received, obtains the identity information included in the application request;
Finance account is established, and set verification library on the finance account based on the identity information, by operating rights The standard information of limit verification is preserved into the verification library.
Optionally, the safe class that the operational order is determined according to the business information, to obtain the safety The step of grade corresponding proof rule, includes:
The business information with predetermined level table is compared, is believed with judging to whether there is in predetermined level table with business Cease matched safe class;
If exist in predetermined level table with the matched safe class of business information, and using the safe class as the behaviour Make the safe class instructed;
If in predetermined level table be not present with the matched safe class of business information, using the operational order as be exempt from customs examination Card instruction.
Optionally, the safe class that the operational order is determined according to the business information, to obtain the safety The step of grade corresponding proof rule, includes:
The relevant historical operation record of business information is obtained, obtains the operation information in the historical operation record;
The operation information with preset instructions safe class is compared, determines the safe class of the operational order, To obtain the corresponding proof rule of the safe class.
Optionally, it is described to obtain the unit to be verified included in the proof rule, and be in the unit to be verified Element to be verified shown, the step of inputting element to be verified corresponding verification information for user includes:
Default validation database is inquired according to the safe class of operational order, is obtained in default validation database with safety etc. The matched proof rule of grade;
Obtain the unit to be verified included in the proof rule, and obtain in the unit to be verified it is each it is to be verified will The history verification record of element;
It is verified and recorded according to the history of element to be verified each in unit to be verified, determined to be verified in unit to be verified Element;
The element to be verified is shown, so that user inputs the corresponding verification information of element to be verified.
Optionally, it is described to be compared the verification information and default verification library, to carry out the behaviour of the operational order The step of making Authority Verification includes:
Verification information input by user is obtained, the verification information and the standard information in default verification library are compared It is right;
If verification information is matched with the standard information in preset verification library, the corresponding operating right verification of operational order is logical It crosses;
If verification information is mismatched with the standard information in preset verification library, the corresponding operating right verification of operational order Do not pass through, and adjust the element to be verified in the unit to be verified, to carry out secondary verification.
Optionally, if the verification information is mismatched with the standard information in preset verification library, operational order is corresponding Operating right verification does not pass through, and adjust the element to be verified in the unit to be verified, the step of to carry out secondary verification it Afterwards, including:
Statistical operation Authority Verification not by verification frequency, by it is described verification frequency be compared with predetermined threshold value;
If the verification frequency is more than predetermined threshold value, the corresponding operation service of operational order is carried out part freezes.
In addition, to achieve the above object, the present invention also provides a kind of verification devices of financial business;
The verification device of the financial business includes:
Acquisition module is received, for receiving the operational order of financial business, obtains the business included in the operational order Information;
Level determination module, for determining the safe class of the operational order according to the business information, to obtain State the corresponding proof rule of safe class;
Display module is obtained, for obtaining the unit to be verified included in the proof rule, and by the list to be verified Element to be verified in member is shown, so that user inputs the corresponding verification information of element to be verified;
Authority Verification module for the verification information and default verification library to be compared, is referred to carrying out the operation The operating right verification of order;
Execution module is instructed, for when detecting that operating right is verified, performing the operational order.
In addition, to achieve the above object, the present invention also provides a kind of verification equipment of financial business;
The verification equipment of the financial business includes:It memory, processor and is stored on the memory and can be in institute The proving program of the financial business run on processor is stated, wherein:
The proving program of the financial business realizes the authentication of financial business as described above when being performed by the processor The step of method.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
The proving program of financial business, the proving program quilt of the financial business are stored on the computer storage media The step of processor realizes the verification method of financial business as described above when performing.
Verification method, device, equipment and the computer storage media for a kind of financial business that the embodiment of the present invention proposes.With Family trigger action in terminal instructs, and terminal receives the operational order of financial business, obtains the business letter included in operational order Breath;The safe class of the operational order is determined according to business information, to obtain the corresponding proof rule of safe class;It determines to test The unit to be verified included in card rule, and the element to be verified in unit to be verified is shown, so that user's input is treated Verify the corresponding verification information of element;Verification information input by user and default verification library are compared, if input by user Verification information passes through with default verification storehouse matching, the then corresponding operating right authentication of operational order;When detecting operating rights When limit is verified, the operational order is performed.The present invention is passing through the behaviour to financial business based on terminal progress financial operation Make the operating right verification mode set, improve the safety of financial business operation, the input of multi information was carried out without user Can the identity information of user accurately verified so that the safety of financial operation verification efficiency and business operation is simultaneously Weight.
Description of the drawings
Fig. 1 is the apparatus structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the verification method first embodiment of financial business of the present invention;
The refinement flow diagram that Fig. 3 is the step S20 of the verification method of financial business in Fig. 2;
Fig. 4 is another refinement flow diagram of the step S20 of the verification method of financial business in Fig. 2;
Fig. 5 is the refinement flow diagram of the step S30 of the verification method of financial business in Fig. 2;
Fig. 6 is the flow diagram of the verification method second embodiment of financial business of the present invention;
Fig. 7 is the high-level schematic functional block diagram of verification one embodiment of device of financial business of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, the terminal structure schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
Terminal of the embodiment of the present invention can with fixed terminal or mobile terminal, wherein, fixed terminal such as " Internet of Things Equipment ", the intelligent air condition with network savvy, intelligent electric lamp, intelligent power etc.;Mobile terminal, such as AR/VR with network savvy Equipment, intelligent sound box, autonomous driving vehicle, PC, smart mobile phone, tablet computer, E-book reader, pocket computer etc. have The terminal device of display function, it should be added that, the terminal in the present embodiment can also be called the verification of financial business Equipment.
As shown in Figure 1, the terminal can include:Processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is used to implement the connection communication between these components. User interface 1003 can include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 can optionally connect including the wired of standard Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory or the memory of stabilization (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
Optionally, terminal can also include camera, RF (Radio Frequency, radio frequency) circuit, sensor, audio Circuit, WiFi module;Input unit, than display screen, touch screen;Network interface can in blanking wireless interface in addition to WiFi, bluetooth, Probe, 3G/4G/5G internet base station equipment etc..Wherein, sensor such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display screen, proximity sensor can when mobile terminal is moved in one's ear, close display screen and/ Or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally three axis) and accelerate The size of degree can detect that size and the direction of gravity when static, the application that can be used to identify mobile terminal posture is (such as vertical and horizontal Shield switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;Certainly, it is mobile Terminal can also configure the other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, no longer superfluous herein It states.
It will be understood by those skilled in the art that the restriction of the terminal structure shown in Fig. 1 not structure paired terminal, can wrap It includes and either combines certain components or different components arrangement than illustrating more or fewer components.
As shown in Figure 1, the computer software product is stored in a storage medium (storage medium:It is called computer storage Medium, computer media, readable medium, readable storage medium storing program for executing, computer readable storage medium are directly medium etc., such as ROM/RAM, magnetic disc, CD) in, it is used including some instructions so that a station terminal equipment (can be mobile phone, computer services Device, air conditioner or network equipment etc.) method described in each embodiment of the present invention is performed, it stores and is situated between as a kind of computer It can include operating system, network communication module, Subscriber Interface Module SIM and the verification of financial business in the memory 1005 of matter Application program.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, is carried out with background server Data communicate;User interface 1003 is mainly used for connecting client (user terminal), with client into row data communication;And processor 1001 can be used for calling the verification application program of financial business stored in memory 1005, and perform and implement below the present invention Step in the verification method for the financial business that example provides.
Before the step of the present embodiment performs, user is needed in the corresponding banking application software of terminal or finance pages The Login Register of user is carried out on interface, specifically:
Step a1 receives the application request of finance account input by user, obtains the identity included in the application request Information;
Step a2 establishes finance account, and set verification library on the finance account based on the identity information, will The standard information of operating right verification is preserved into the verification library.
User triggers the application request of finance account in terminal, and the application that terminal receives finance account input by user please It asks, obtains the identity information included in the application request, that is, user applies for that finance account needs to input the basic identity letter of user Breath, such as:Address name, user contact details (user contact details:Including subscriber phone number, user mail account etc.), (user certificate information includes user certificate information:User certificate copy, user certificate number etc.), station address information (use Family address information includes:Subscriber household certificate address information, user CompanyAddress information) and user biological characteristic information (user biological Characteristic information includes:User fingerprints data, user's head image information, user voice information) and other user related informations, terminal base Finance account is established, and using application information input by user as later stage subscriber authentication in application information input by user Standard information.
Terminal sets verification library after finance account is established on the finance account, and verification library is built for preserving user The basic identity information inputted during vertical finance account, wherein, basic identity information user verifies relevant mark as operating right Calibration information.
Further, when user's finance account establishes completion, it is relevant that user can log in finance account progress finance Business operation, that is, user be based on terminal trigger finance account log-in instruction, to user login information carry out login authentication, with Family login authentication shows corresponding financial business by rear on the finance account of user's login, it should be added that: Before the embodiment of the verification method of the application financial business, user is needed to establish relevant finance account, user is logging in During finance account, login authentication is carried out, not as the emphasis of the application, the application steps on mainly around user for the mode of login authentication After recording finance account, financial business operation is triggered on finance account, so as to carry out authentication to user, finally realizes user The operating right mandate of financial business operation.
It is related to different verification modes in force to be combined, for example, the 1, testimony of a witness compares, i.e., with cloud platform interface tune Form according to the ID card information of user, compares user from taking pictures and user Ministry of Public Security base map, veritifies user's body in real time Part;2nd, face alignment service, that is, in the form of cloud platform interface calls and algorithm private is disposed, uploaded twice by comparing user Take pictures certainly, to veritify user identity;3rd, (OCR technique is the abbreviation (Optical of optical character identification to OCR technique Character Recognition), be by scan etc. optics input mode by various bills, newpapers and periodicals, books, manuscript and its The word of its printed matter is converted into image information, recycles character recognition technology that image information is converted into the calculating that can be used Machine input technology), the identification of identity card certificate and bank card card recognition function are provided, clothes are provided in the form of cloud platform interface calls Business, the identity card picture and bank card photo that user is uploaded are converted into editable word, carry out subscriber identity information really Recognize.4th, Application on Voiceprint Recognition, that is, database is entered by the voiceprint of the speaker of acquisition, when speaker speaks again, system Voiceprint data in comparison database identifies the identity of (identification/confirmation) speaker;5th, fingerprint recognition adopts user in advance The finger print information of collection with perform operation finger print information be compared, 6, mobile phone dynamic verification code identification etc..
With reference to Fig. 2, in the first embodiment of the verification method of financial business of the present invention, the verification method of the financial business Including:
Step S10 receives the operational order of financial business, obtains the business information included in the operational order.
User logs in finance account and the operational order of financial business is triggered on the finance account of login, and terminal receives gold Melt the operational order of business, terminal obtains the business information included in operational order, and the business information that operational order includes includes: Type of service that the operational order of user's triggering is directed to, Business Name, operating time, the business operation amount of money etc., that is, service class Type includes:Application is transferred accounts, fund purchase, Stock Purchase, contract purchasing, insures the business that purchase etc. is related to fund flow, example Such as, user triggers the operational order of fund product purchase on the finance account of login, then is included in the operational order:ProductName Title, exchange hour, transaction amount.
Step S20 determines the safe class of the operational order according to the business information, to obtain the safe class Corresponding proof rule.
Terminal determines the safe class of user operation instruction according to the business information carried in user operation instruction, for example, Terminal can (predetermined level table be according to tool with predetermined level table according to the Business Name in business information and the relevant operation amount of money The operation scenario setting of body, information of the terminal in predetermined level table determine the corresponding safe class of user operation instruction) into Row compare, if in predetermined level table exist with the Business Name in business information and operation the matched safe class of the amount of money, by With the safe class of the Business Name in business information and the operation matched safe class of the amount of money as operational order, terminal obtains The corresponding proof rule of safe class, to be verified according to the proof rule.
Step S30 obtains the unit to be verified included in the proof rule, and will be to be tested in the unit to be verified Card element is shown, so that user inputs the corresponding verification information of element to be verified.
The unit to be verified included in the proof rule is obtained, unit to be verified refers to the verification information of a type, Unit to be verified is divided into the present embodiment:Dynamic password verification, user certificate verification and biological characteristic validation, determine it is to be tested After demonstrate,proving unit, the element to be verified in unit to be verified is determined, and the element to be verified in the unit to be verified is carried out Display, that is, include the authentication unit of same type in a kind of proof rule, included in a unit to be verified different to be verified (e.g., the first safe class corresponds to the first proof rule to element, and including three authentication units in the first proof rule is respectively:It is dynamic (the verification element that dynamic password verification includes is for state password authentification:Mobile phone dynamic verification code, mailbox dynamic verification code etc.), user (user certificate verification includes certificate verification:Identity card, driver's license, passport or social security information etc.) and biological characteristic validation (life Object signature verification includes:Fingerprint authentication, face verification, voice authentication)), terminal is true according to random or according to setting rule Element to be verified in fixed unit to be verified, so that user inputs the corresponding verification information of element to be verified.
Such as:A, user's financial business it is entitled transfer accounts, transfer amounts 500000, then correspond to the first safe class, First safe class corresponds to the first proof rule, and including three authentication units in the first proof rule is respectively:Dynamic password is tested Card, user certificate verification and biological characteristic validation, the band verification element that corresponding unit to be verified determines are:Mobile phone dynamic password, User identity card number, fingerprint authentication;B, user's financial business it is entitled transfer accounts, transfer amounts 50000, then correspond to second Safe class, the second safe class correspond to the second proof rule, and including two authentication units in the second proof rule is respectively:It is dynamic State password authentification and user certificate verification;The band that corresponding unit to be verified determines verifies that element is:Mailbox dynamic password, user drive Sail number;C, the entitled payment of user's financial business, transfer amounts 500 then correspond to third safe class, third safety etc. Grade corresponds to third proof rule, and including an authentication unit in third proof rule is respectively:Dynamic password verification, correspondence are to be tested The band that card unit determines verifies that element is:Mobile phone dynamic password;D, the entitled payment amount of user's financial business is 50, then not There are corresponding safe classes, then carry out exempting from close payment.
The verification information and default verification library are compared by step S40, to carry out the operating rights of the operational order Limit verification.
Verification information and default verification library (are preset verification library by terminal:It sets when being established for finance account, is protected in verification library Have user and the identity information provided during account be provided) it is compared, to carry out the verification of the operating right of operational order.That is, eventually The identity information of verification information input by user and default verification library storage is compared by end, in verification information input by user During with information matches in presupposed information library, then authorize operational order corresponding operating right.
Specifically, step S40 includes:
Step b1 obtains verification information input by user, by the standard information in the verification information and default verification library It is compared;
Step b2, if verification information is matched with the standard information in preset verification library, the corresponding operating rights of operational order Limit is verified;
Step b3, if verification information is mismatched with the standard information in preset verification library, the corresponding operation of operational order Authority Verification does not pass through, and adjusts the element to be verified in the unit to be verified, to carry out secondary verification.
Terminal obtains verification information input by user, and verification information and the standard information in default verification library are compared It is right;If verification information is matched with the standard information in preset verification library, that is, verification information is identical with standard information, then operation refers to Corresponding operating right is enabled to be verified;If verification information is mismatched with the standard information in preset verification library, that is, verification information Different from standard information, then the corresponding operating right verification of operational order does not pass through, and adjust and treated in the unit to be verified Element is verified, to carry out secondary verification.
Specific processing step is determined according to verification situation in the present embodiment, obstructed out-of-date, terminal is verified detecting The adjusting of element to be verified in unit to be verified can automatically be carried out, that is, after being determined as the first safe class, the first safe class In authentication unit include dynamic password verification, user certificate verification and biological characteristic validation, the element to be verified verified for the first time It is mobile phone dynamic password, user identity card number, fingerprint authentication, verifies not over carrying out secondary verification terminal will be to be verified Element is adjusted to:Date verification that mailbox dynamic password verification, car papers take, user's voice print verification, when secondary verification still Do not pass through, adjust element to be verified again, until verification is more than threshold value herein, carry out corresponding account part financial business function freezing Knot.
Step S50 when detecting that operating right is verified, performs the operational order.
It obtains subscriber authentication according to verification message input by user in terminal and passes through, then terminal is according to the operation of user Instruction performs corresponding operation.
User's trigger action in terminal instructs in the present embodiment, and terminal receives the operational order of financial business, obtains The business information included in operational order;The safe class of the operational order is determined according to business information, to obtain the peace The corresponding proof rule of congruent grade;The unit to be verified included in the proof rule is obtained, and will be in the unit to be verified Element to be verified shown, so that user inputs the corresponding verification information of element to be verified;Verification input by user is believed Breath is compared with default verification library, if verification information input by user and default verification storehouse matching, operational order are corresponding Operating right authentication passes through;When detecting that operating right is verified, the operational order is performed.The present invention based on Terminal carries out operating right verification mode of the financial operation by the operation setting to financial business, improves financial business operation Safety.
Further, on the basis of first embodiment of the invention, it is proposed that the verification method of financial business of the present invention The present embodiment, the present embodiment are the refinements for step S20 in first embodiment, specifically illustrate in the present embodiment how root The realization method of the grade of operational order safety is determined according to business information;
The verification method of the financial business includes:
Mode one:With reference to Fig. 3, determining safe class is compared with predetermined level table in business information.
The business information is compared step S21 with predetermined level table, to judge to whether there is in predetermined level table With the matched safe class of business information.
By the business information and predetermined level table (predetermined level table:It is as shown in table 1 below, root is included in predetermined level table It is configured according to involved in operational order to operation service information, corresponding safety of user's operation etc. can be determined according to business information Grade) be compared, with judge in predetermined level table whether there is with the matched safe class of business information, for example, user trigger Operational order be to transfer accounts 50000 yuan, then search predetermined level table, determine type of service to transfer accounts, beneficiary is stranger, is turned The account amount of money is 50000, it is determined that it is level-one that user's trigger action, which instructs corresponding safe class,.
Table 1
Step S22, if exist in predetermined level table with the matched safe class of business information, and the safe class is made Safe class for the operational order.
Terminal exist in predetermined level table with the matched safe class of business information, and using the safe class as institute State the safe class of operational order, terminal determines the corresponding safe class of the operational order of user according to predetermined level table, with into One step, proof rule is determined according to safe class.
Step S23, if in predetermined level table be not present with the matched safe class of business information, by the operational order It is instructed as laissezpasser.
If terminal is not present and the matched safe class of business information in predetermined level table, that is, in predetermined level table not In the presence of safe class corresponding with business information in user operation instruction, then terminal is using operational order as laissezpasser instruction;Example Such as, user carries out 50 yuan of small amount payment in terminal, then verification instruction is instructed for laissezpasser, is not needed to user and is operated Authority Verification.
The business information in operational order with predetermined level table is compared in the present embodiment, pre-sets grade Table is accurately identified according to the business information included in user operation instruction, the corresponding safe class of operational order, realizes needle To the accurate validation of user operation instruction.
Mode two:With reference to Fig. 4, safe class is determined based on the historical operation record of business information.
Step S24 obtains the relevant historical operation record of business information, obtains the operation letter in the historical operation record Breath.
Terminal obtains the relevant historical operation record of business information, that is, terminal obtains the behaviour in the historical operation record Make information, the time of user's trigger action instruction, the frequency of user's trigger action instruction, the corresponding receipts of user's trigger action instruction Money side's information, for example, user is 3 time in terminal:00, it carries out 100 times, the operation to strange 500 yuan of account transfer, eventually End obtains the finance account operating time of preset time period.
The operation information with preset instructions safe class is compared, determines the peace of the operational order by step S25 Congruent grade, to obtain the corresponding proof rule of the safe class.
The operation information is compared terminal with preset instructions safe class, determines safety of the operational order etc. Grade, wherein, predetermined level table is the table of grading set previously according to operation informations such as operating time, operating frequencies, for example, default In table of grading:Operating time is morning 3:00, operational order corresponding safe class of the operating frequency more than 30 times is 3 grades, eventually The operational order corresponding operating time for triggering user is held, operating frequency or other information are compared with predetermined level table It is right, determine the safe class of operational order, when the safe class of operational order is higher than preset value, preset value can be as the case may be Setting, such as be set as 2 grades, then the operational order that user triggers is regarded as sensitive operation by terminal, and terminal determines operational order Safe class, to obtain the corresponding proof rule of the safe class.
It should be added that the mode one and mode two in the present embodiment can be combined, that is, in the present embodiment If the verification for the grade for only carrying out user operation instruction safety according to the scheme described in mode one in is directed to the operation of user's single, If continually being operated there are user can not be effectively prevented from, carry out user's operation according to the scheme described in mode two and refer to The safe class of order determines to be inaccurate, after the mode one in the present embodiment is determined safe class, further, terminal according to The historical operation situation of finance account determines again.
In the present embodiment according to the business information included in operational order, corresponding safety of user operation instruction etc. is determined Grade, and according to the determining proof rule such as safety so that financial operation more has accuracy.
Further, with reference to Fig. 5, on the basis of first embodiment of the invention, it is proposed that financial business of the present invention is tested The present embodiment of card method, the present embodiment are the refinements for step S30 in first embodiment, are illustrated in the present embodiment Determine the specific implementation of element to be shown;
Step S30 includes in the verification method of the financial business:
Step S31 inquires default validation database according to the safe class of operational order, obtains in default validation database With the matched proof rule of safe class;
Terminal inquires default validation database according to the safe class of operational order, obtain in default validation database with peace The congruent matched proof rule of grade, that is, the safe class of terminal operation instruction is traversed with default validation database, and terminal obtains Take in default validation database with the matched proof rule of safe class, wherein, proof rule is set in advance according to safe class Put, comprising different verification elements in different proof rules, set between proof rule and authentication unit it is relevant, For example, the first proof rule is the most stringent of verification to user, the first proof rule includes user's dynamic password verification, user certificate Part is verified and the unit to be verified of biological characteristic validation;Second proof rule is the verification stringenter to user, and the second verification is advised The unit to be verified then verified comprising user's dynamic password verification and user certificate, third proof rule are most basic to user Verification, it is unit to be verified that third proof rule, which includes user's dynamic password verification,.
Step S32 obtains the unit to be verified included in the proof rule, and obtains each in the unit to be verified The history verification record of element to be verified.
Terminal obtains the unit to be verified included in proof rule, terminal obtains according to proof rule and corresponding incidence relation The history verification record of unit to be verified in finance account is taken, for example, unit to be verified is user biological feature in finance account It verifies, the unit to be verified included in biological characteristic validation is user's voice print verification, fingerprint authentication and facial expression acquisition are verified; History verification in preset time period is recorded as user's voice print verification 10 times, fingerprint authentication 50 times, and facial expression acquisition identification is tested Card 15 times, user's voice print verification percent of pass 95%, pass rate of fingerprint authentication 99%, facial expression acquisition identification are verified rate 85%.
Step S33 is verified according to the history of element to be verified each in unit to be verified and is recorded, determines in unit to be verified Element to be verified.
Terminal is verified according to the history of element to be verified each in unit to be verified and is recorded, and determines to treat in unit to be verified Verify element, that is, terminal is verified according to history and recorded, and is obtained and is verified that element verification number is few in unit to be verified, is verified The low verification element of rate is as the corresponding element to be verified of operational order.
Step S34 shows the element to be verified, so that user inputs the corresponding verification letter of element to be verified Breath.
Terminal shows element to be verified by what is determined, so that user inputs the corresponding verification letter of element to be verified Breath, it should be added that, the method that element to be verified is determined in the present embodiment is to verify situation according to history, equally may be used also Other to be taken to determine the method for element to be verified, such as randomly select or set corresponding weight to determine element to be verified.
Terminal can be determined element to be verified in the present embodiment, and the verification that other people accidentally get user carries out, Financial business operation is carried out to the finance account of user so that the safety higher of terminal finance account.
Further, with reference to Fig. 6, on the basis of first embodiment of the invention, it is proposed that financial business of the present invention is tested The second embodiment of card method.
The second embodiment of the present invention is not by the processing scheme of proposition for verification, that is, in the step of first embodiment Rapid S40:The verification information and default verification library are compared, it is verified with the operating right for carrying out the operational order Afterwards, if verification does not pass through, step is being performed:The corresponding operating right verification of operational order does not pass through, and adjust described to be verified Element to be verified in unit, to also need to perform following steps while carrying out secondary verification:
Step S60, statistical operation Authority Verification not by verification frequency, verification frequency and the predetermined threshold value are carried out Compare.
Terminal statistical operation Authority Verification not by verification frequency, it is and verification frequency and the predetermined threshold value is (default Threshold value:Set according to specific circumstances, for example, predetermined threshold value is set as 10 times) it is compared, to determine the need for freezing Corresponding operational order freezes finance account.
The corresponding operation service of operational order if the verification frequency is more than predetermined threshold value, is carried out part by step S70 Freeze.
If it is more than predetermined threshold value to verify frequency, the corresponding operation service of operational order is subjected to part and is freezed, that is, terminal The part operation of financial operation involved in finance account can be instructed and freezed, and in the application for receiving user again Unlatching.
In the present embodiment terminal multiple financial operation not over when, to part financial circles in the finance account of terminal The problem of business is freezed, and user's operation caused by both having avoided finance account fully charge in this way is inconvenient, ensure that simultaneously The safety of user's financial operation.
In addition, with reference to Fig. 7, the embodiment of the present invention also proposes a kind of verification device of financial business, the financial business Verification device includes:
Acquisition module 10 is received, for receiving the operational order of financial business, obtains the industry included in the operational order Business information;
Level determination module 20, for determining the safe class of the operational order according to the business information, to obtain The corresponding proof rule of the safe class;
Display module 30 is obtained, for obtaining the unit to be verified included in the proof rule, and will be described to be verified Element to be verified in unit is shown, so that user inputs the corresponding verification information of element to be verified;
Authority Verification module 40, for the verification information and default verification library to be compared, to carry out the operation The operating right verification of instruction;
Execution module 50 is instructed, for when detecting that operating right is verified, performing the operational order.
Wherein, the step of each Implement of Function Module of the verification device of financial business can refer to financial business of the present invention Each embodiment of verification method, details are not described herein again.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
The proving program of financial business, the proving program quilt of the financial business are stored on the computer storage media Processor realizes the operation in the verification method for the financial business that above-described embodiment provides when performing.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/ There are any actual relationship or orders between object;Term " comprising ", "comprising" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or system including a series of elements not only include that A little elements, but also including other elements that are not explicitly listed or further include for this process, method, article or The intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except also there are other identical elements in the process including the element, method, article or system.
For device embodiment, since it is substantially similar to embodiment of the method, so describe fairly simple, it is related Part illustrates referring to the part of embodiment of the method.The apparatus embodiments described above are merely exemplary, wherein making The unit illustrated for separating component may or may not be physically separate.In can selecting according to the actual needs Some or all of module realize the purpose of the present invention program.Those of ordinary skill in the art are not making the creative labor In the case of, you can to understand and implement.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone, Computer, server, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of verification method of financial business, which is characterized in that the verification method of the financial business includes the following steps:
The operational order of financial business is received, obtains the business information included in the operational order;
The safe class of the operational order is determined according to the business information, is advised with obtaining the corresponding verification of the safe class Then;
The unit to be verified included in the proof rule is obtained, and the element to be verified in the unit to be verified is shown Show, so that user inputs the corresponding verification information of element to be verified;
The verification information and default verification library are compared, to carry out the verification of the operating right of the operational order;
When detecting that operating right is verified, the operational order is performed.
2. the verification method of financial business as described in claim 1, which is characterized in that the operation for receiving financial business refers to Before the step of enabling, obtaining the business information included in the operational order, including:
The application request of finance account input by user is received, obtains the identity information included in the application request;
Finance account is established, and set verification library on the finance account based on the identity information, operating right is tested The standard information of card is preserved into the verification library.
3. the verification method of financial business as described in claim 1, which is characterized in that described to be determined according to the business information The safe class of the operational order is included with obtaining the step of the safe class corresponding proof rule:
The business information is compared with predetermined level table, to judge to whether there is and business information in predetermined level table The safe class matched;
If in predetermined level table exist with the matched safe class of business information, and using the safe class as it is described operation refer to The safe class of order;
If in predetermined level table be not present with the matched safe class of business information, the operational order is referred to as laissezpasser It enables.
4. the verification method of financial business as described in claim 1, which is characterized in that described to be determined according to the business information The safe class of the operational order is included with obtaining the step of the safe class corresponding proof rule:
The relevant historical operation record of business information is obtained, obtains the operation information in the historical operation record;
The operation information with preset instructions safe class is compared, the safe class of the operational order is determined, to obtain Take the corresponding proof rule of the safe class.
5. the verification method of the financial business as described in Claims 1-4 any one, which is characterized in that described in the acquisition The unit to be verified included in proof rule, and the element to be verified in the unit to be verified is shown, for user The step of inputting element to be verified corresponding verification information includes:
Default validation database is inquired according to the safe class of operational order, obtain in default validation database with safe class The proof rule matched;
The unit to be verified included in the proof rule is obtained, and obtains each element to be verified in the unit to be verified History verification record;
According to the history of element to be verified each in unit to be verified verify record, determine in unit to be verified it is to be verified will Element;
The element to be verified is shown, so that user inputs the corresponding verification information of element to be verified.
6. the verification method of financial business as described in claim 1, which is characterized in that described by the verification information and default Verification library is compared, to include the step of carrying out the verification of the operating right of the operational order:
Verification information input by user is obtained, the verification information is compared with the standard information in default verification library;
If verification information is matched with the standard information in preset verification library, the corresponding operating right of operational order is verified;
If verification information is mismatched with the standard information in preset verification library, the corresponding operating right verification of operational order is obstructed It crosses, and adjusts the element to be verified in the unit to be verified, to carry out secondary verification.
7. the verification method of financial business as claimed in claim 6, which is characterized in that if the verification information and preset verification Standard information in library mismatches, then the corresponding operating right verification of operational order does not pass through, and adjust the unit to be verified In element to be verified, the step of to carry out secondary verification after, including:
Statistical operation Authority Verification not by verification frequency, by it is described verification frequency be compared with predetermined threshold value;
If the verification frequency is more than predetermined threshold value, the corresponding operation service of operational order is carried out part freezes.
8. the verification device of a kind of financial business, which is characterized in that the verification device of the financial business includes:
Acquisition module is received, for receiving the operational order of financial business, obtains the business information included in the operational order;
Level determination module, for determining the safe class of the operational order according to the business information, to obtain the peace The corresponding proof rule of congruent grade;
Display module is obtained, for obtaining the unit to be verified included in the proof rule, and will be in the unit to be verified Element to be verified shown, so that user inputs the corresponding verification information of element to be verified;
Authority Verification module, for the verification information and default verification library to be compared, to carry out the operational order Operating right is verified;
Execution module is instructed, for when detecting that operating right is verified, performing the operational order.
9. the verification equipment of a kind of financial business, which is characterized in that the verification equipment of the financial business includes:Memory, place It manages device and is stored in the proving program of financial business that can be run on the memory and on the processor, wherein:
It is realized as described in any one of claim 1 to 7 when the proving program of the financial business is performed by the processor The step of verification method of financial business.
10. a kind of computer storage media, which is characterized in that the verification of financial business is stored on the computer storage media Program realizes the finance as described in any one of claim 1 to 7 when the proving program of the financial business is executed by processor The step of verification method of business.
CN201810081998.0A 2018-01-29 2018-01-29 Verification method, device, equipment and the computer storage media of financial business Pending CN108269187A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810081998.0A CN108269187A (en) 2018-01-29 2018-01-29 Verification method, device, equipment and the computer storage media of financial business
PCT/CN2018/122609 WO2019144738A1 (en) 2018-01-29 2018-12-21 Financial service verification method, apparatus and device, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810081998.0A CN108269187A (en) 2018-01-29 2018-01-29 Verification method, device, equipment and the computer storage media of financial business

Publications (1)

Publication Number Publication Date
CN108269187A true CN108269187A (en) 2018-07-10

Family

ID=62776843

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810081998.0A Pending CN108269187A (en) 2018-01-29 2018-01-29 Verification method, device, equipment and the computer storage media of financial business

Country Status (2)

Country Link
CN (1) CN108269187A (en)
WO (1) WO2019144738A1 (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254378A (en) * 2016-09-09 2016-12-21 宇龙计算机通信科技(深圳)有限公司 The method of controlling security of a kind of short-range communication NFC mobile terminal and system
CN109686011A (en) * 2018-12-18 2019-04-26 维拓智能科技(深圳)有限公司 The user identification method of self-aided terminal and self-aided terminal
CN110011957A (en) * 2018-12-13 2019-07-12 阿里巴巴集团控股有限公司 Safety certifying method, device, electronic equipment and the storage medium of business account
WO2019144738A1 (en) * 2018-01-29 2019-08-01 深圳壹账通智能科技有限公司 Financial service verification method, apparatus and device, and computer storage medium
CN110113168A (en) * 2019-04-03 2019-08-09 厦门历思科技服务有限公司 A kind of information authentication method, client, system and computer readable storage medium
CN110166438A (en) * 2019-04-19 2019-08-23 平安科技(深圳)有限公司 Login method, device, computer equipment and the computer storage medium of account information
CN110188159A (en) * 2019-05-27 2019-08-30 深圳前海微众银行股份有限公司 Collage-credit data cut-in method, device, equipment and computer readable storage medium
CN110457876A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 Identity identifying method, apparatus and system
CN110889106A (en) * 2018-09-11 2020-03-17 北京京东金融科技控股有限公司 Configuration method, device, system and computer readable storage medium
CN110909013A (en) * 2019-10-12 2020-03-24 中国平安财产保险股份有限公司 Service list generation method, device, equipment and computer readable storage medium
CN111160137A (en) * 2019-12-12 2020-05-15 天目爱视(北京)科技有限公司 Intelligent business processing equipment based on biological 3D information
CN111181725A (en) * 2018-11-12 2020-05-19 奇酷互联网络科技(深圳)有限公司 Identity information verification method, mobile terminal and computer storage medium
CN111786936A (en) * 2019-11-27 2020-10-16 北京沃东天骏信息技术有限公司 Method and device for authentication
CN112231617A (en) * 2020-10-12 2021-01-15 深圳市欢太科技有限公司 Service call checking method and device, storage medium and electronic equipment
CN112328482A (en) * 2020-11-05 2021-02-05 中国平安人寿保险股份有限公司 Test method and device based on script template, computer equipment and storage medium
CN112395541A (en) * 2020-12-29 2021-02-23 畅捷通信息技术股份有限公司 Data content verification method, device and system, storage medium and computing equipment
CN112465503A (en) * 2020-11-17 2021-03-09 葛云霞 Information security protection method based on internet finance and biological recognition and cloud platform
CN112669042A (en) * 2021-03-15 2021-04-16 中国银联股份有限公司 Payment method, server, user terminal, system and storage medium
CN112669163A (en) * 2021-01-20 2021-04-16 何青波 Financial business management method and system based on big data and cloud computing
CN112686760A (en) * 2021-01-20 2021-04-20 何青波 Financial business processing method and platform based on big data
CN112714108A (en) * 2020-12-21 2021-04-27 中国移动通信集团江苏有限公司 Method, device and equipment for verifying terminal communication number and computer storage medium
CN112801619A (en) * 2021-01-29 2021-05-14 中国农业银行股份有限公司上海市分行 Method and device for screening financial business operation logs
CN112995227A (en) * 2021-05-13 2021-06-18 深圳格隆汇信息科技有限公司 One-stop information service platform based on three-party credit management
CN113191757A (en) * 2021-06-03 2021-07-30 中国银行股份有限公司 Bank business control method, device, server and storage medium
CN113299016A (en) * 2021-04-27 2021-08-24 深圳市怡化时代科技有限公司 Service timing method and system of self-service terminal, self-service equipment and storage medium
CN114138790A (en) * 2021-12-02 2022-03-04 中国建设银行股份有限公司 Interface element verification method, device, storage medium and program product
CN114553838A (en) * 2022-02-23 2022-05-27 京东方科技集团股份有限公司 Method, system and server for implementing remote service handling
CN115001779A (en) * 2022-05-26 2022-09-02 中国农业银行股份有限公司 Verification method, device, equipment and medium of operation instruction

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2438651A (en) * 2006-06-02 2007-12-05 Michael Arnold Secure financial transactions
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN104158665A (en) * 2014-08-25 2014-11-19 小米科技有限责任公司 Method and device of verification
CN105991590A (en) * 2015-02-15 2016-10-05 阿里巴巴集团控股有限公司 Method and system for verifying user identity, client, and server
CN106027543A (en) * 2016-06-23 2016-10-12 北京孔方同鑫科技有限公司 Identification method and apparatus based on weight calculation
CN107231232A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 A kind of auth method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150302411A1 (en) * 2014-04-22 2015-10-22 Bank Of America Corporation Proximity to a location as a form of authentication
CN104867010A (en) * 2015-05-20 2015-08-26 杨淼彬 User friendly payment method
CN107316195A (en) * 2017-06-26 2017-11-03 北京明华联盟科技有限公司 The method of payment and device of a kind of safe and convenient
CN108269187A (en) * 2018-01-29 2018-07-10 深圳壹账通智能科技有限公司 Verification method, device, equipment and the computer storage media of financial business

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2438651A (en) * 2006-06-02 2007-12-05 Michael Arnold Secure financial transactions
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN104158665A (en) * 2014-08-25 2014-11-19 小米科技有限责任公司 Method and device of verification
CN105991590A (en) * 2015-02-15 2016-10-05 阿里巴巴集团控股有限公司 Method and system for verifying user identity, client, and server
CN107231232A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 A kind of auth method and device
CN106027543A (en) * 2016-06-23 2016-10-12 北京孔方同鑫科技有限公司 Identification method and apparatus based on weight calculation

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254378A (en) * 2016-09-09 2016-12-21 宇龙计算机通信科技(深圳)有限公司 The method of controlling security of a kind of short-range communication NFC mobile terminal and system
CN106254378B (en) * 2016-09-09 2020-02-07 宇龙计算机通信科技(深圳)有限公司 Safety control method and system for Near Field Communication (NFC) mobile terminal
WO2019144738A1 (en) * 2018-01-29 2019-08-01 深圳壹账通智能科技有限公司 Financial service verification method, apparatus and device, and computer storage medium
CN110889106A (en) * 2018-09-11 2020-03-17 北京京东金融科技控股有限公司 Configuration method, device, system and computer readable storage medium
CN111181725A (en) * 2018-11-12 2020-05-19 奇酷互联网络科技(深圳)有限公司 Identity information verification method, mobile terminal and computer storage medium
CN110011957A (en) * 2018-12-13 2019-07-12 阿里巴巴集团控股有限公司 Safety certifying method, device, electronic equipment and the storage medium of business account
CN109686011A (en) * 2018-12-18 2019-04-26 维拓智能科技(深圳)有限公司 The user identification method of self-aided terminal and self-aided terminal
CN110113168A (en) * 2019-04-03 2019-08-09 厦门历思科技服务有限公司 A kind of information authentication method, client, system and computer readable storage medium
CN110113168B (en) * 2019-04-03 2022-04-22 厦门历思科技服务有限公司 Information authentication method, client, system and computer readable storage medium
CN110166438A (en) * 2019-04-19 2019-08-23 平安科技(深圳)有限公司 Login method, device, computer equipment and the computer storage medium of account information
WO2020211247A1 (en) * 2019-04-19 2020-10-22 平安科技(深圳)有限公司 Account information login method and device, computer device and computer storage medium
CN110188159A (en) * 2019-05-27 2019-08-30 深圳前海微众银行股份有限公司 Collage-credit data cut-in method, device, equipment and computer readable storage medium
CN110457876A (en) * 2019-08-15 2019-11-15 中国银行股份有限公司 Identity identifying method, apparatus and system
CN110909013A (en) * 2019-10-12 2020-03-24 中国平安财产保险股份有限公司 Service list generation method, device, equipment and computer readable storage medium
CN110909013B (en) * 2019-10-12 2023-10-03 中国平安财产保险股份有限公司 Service list generation method, device, equipment and computer readable storage medium
CN111786936A (en) * 2019-11-27 2020-10-16 北京沃东天骏信息技术有限公司 Method and device for authentication
CN113011348B (en) * 2019-12-12 2024-05-14 天目爱视(北京)科技有限公司 Intelligent service processing equipment based on 3D information identification
CN111160137A (en) * 2019-12-12 2020-05-15 天目爱视(北京)科技有限公司 Intelligent business processing equipment based on biological 3D information
CN113011348A (en) * 2019-12-12 2021-06-22 天目爱视(北京)科技有限公司 Intelligent service processing equipment based on 3D information identification
CN112231617A (en) * 2020-10-12 2021-01-15 深圳市欢太科技有限公司 Service call checking method and device, storage medium and electronic equipment
CN112328482A (en) * 2020-11-05 2021-02-05 中国平安人寿保险股份有限公司 Test method and device based on script template, computer equipment and storage medium
CN112465503A (en) * 2020-11-17 2021-03-09 葛云霞 Information security protection method based on internet finance and biological recognition and cloud platform
CN112465503B (en) * 2020-11-17 2021-10-29 深圳市快付通金融网络科技服务有限公司 Information security protection method based on internet finance and biological recognition and cloud platform
CN112714108A (en) * 2020-12-21 2021-04-27 中国移动通信集团江苏有限公司 Method, device and equipment for verifying terminal communication number and computer storage medium
CN112395541A (en) * 2020-12-29 2021-02-23 畅捷通信息技术股份有限公司 Data content verification method, device and system, storage medium and computing equipment
CN112669163A (en) * 2021-01-20 2021-04-16 何青波 Financial business management method and system based on big data and cloud computing
CN112686760A (en) * 2021-01-20 2021-04-20 何青波 Financial business processing method and platform based on big data
CN112686760B (en) * 2021-01-20 2021-09-14 深圳市全景网络有限公司 Financial business processing method and platform based on big data
CN112669163B (en) * 2021-01-20 2021-11-02 深圳市快付通金融网络科技服务有限公司 Financial business management method and system based on big data and cloud computing
CN112801619A (en) * 2021-01-29 2021-05-14 中国农业银行股份有限公司上海市分行 Method and device for screening financial business operation logs
CN112669042A (en) * 2021-03-15 2021-04-16 中国银联股份有限公司 Payment method, server, user terminal, system and storage medium
CN113299016A (en) * 2021-04-27 2021-08-24 深圳市怡化时代科技有限公司 Service timing method and system of self-service terminal, self-service equipment and storage medium
CN112995227B (en) * 2021-05-13 2021-07-13 深圳格隆汇信息科技有限公司 One-stop information service platform based on three-party credit management
CN112995227A (en) * 2021-05-13 2021-06-18 深圳格隆汇信息科技有限公司 One-stop information service platform based on three-party credit management
CN113191757A (en) * 2021-06-03 2021-07-30 中国银行股份有限公司 Bank business control method, device, server and storage medium
CN114138790A (en) * 2021-12-02 2022-03-04 中国建设银行股份有限公司 Interface element verification method, device, storage medium and program product
CN114553838A (en) * 2022-02-23 2022-05-27 京东方科技集团股份有限公司 Method, system and server for implementing remote service handling
CN115001779A (en) * 2022-05-26 2022-09-02 中国农业银行股份有限公司 Verification method, device, equipment and medium of operation instruction

Also Published As

Publication number Publication date
WO2019144738A1 (en) 2019-08-01

Similar Documents

Publication Publication Date Title
CN108269187A (en) Verification method, device, equipment and the computer storage media of financial business
US11501569B2 (en) System for verifying the identity of a user
US10911423B2 (en) Multi-level authentication for onboard systems
AU2016247162B2 (en) Methods and systems for improving the accuracy performance of authentication systems
EP2863339A2 (en) Methods and systems for determing user liveness
US20180374101A1 (en) Facial biometrics card emulation for in-store payment authorization
WO2017066002A1 (en) Blockchain-based identity and transaction platform
US20130067551A1 (en) Multilevel Authentication
CN103718192A (en) Image-based financial processing
EP3967014A1 (en) Methods and systems for generating a unique signature based on user device movements in a three-dimensional space
CN107944871A (en) Identity identifying method, device, computer equipment and computer-readable recording medium
US11669604B2 (en) Methods and systems for authenticating a user
US20200412715A1 (en) Biometric data contextual processing
WO2023276073A1 (en) Learning model evaluation system, learning model evaluation method, and program
US11682017B2 (en) Systems and methods for electronic payments with fraud prevention
TWM623959U (en) Identification authentication device
US20240144713A1 (en) Methods and systems for determining the authenticity of an identity document
US11961315B1 (en) Methods and systems for enhancing detection of a fraudulent identity document in an image
JP2019117480A (en) Information processing device and authentication system
US11755757B1 (en) Methods and systems for determining the authenticity of an identity document
US20230206240A1 (en) Account security system
US20230196333A1 (en) Card payment method and system through application linkage
US20230316795A1 (en) Auto-Document Detection & Capture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180710

RJ01 Rejection of invention patent application after publication