CN108269187A - Verification method, device, equipment and the computer storage media of financial business - Google Patents
Verification method, device, equipment and the computer storage media of financial business Download PDFInfo
- Publication number
- CN108269187A CN108269187A CN201810081998.0A CN201810081998A CN108269187A CN 108269187 A CN108269187 A CN 108269187A CN 201810081998 A CN201810081998 A CN 201810081998A CN 108269187 A CN108269187 A CN 108269187A
- Authority
- CN
- China
- Prior art keywords
- verification
- verified
- information
- operational order
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3672—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of verification methods of financial business, include the following steps:The operational order of financial business is received, obtains the business information included in the operational order;The safe class of the operational order is determined according to the business information, to obtain the corresponding proof rule of the safe class;The unit to be verified included in the proof rule is obtained, and the element to be verified in the unit to be verified is shown, so that user inputs the corresponding verification information of element to be verified;The verification information and default verification library are compared, to carry out the verification of the operating right of the operational order;When detecting that operating right is verified, the operational order is performed.The invention also discloses verification device, equipment and the computer storage medias of a kind of financial business.The present invention sets the scheme of corresponding operating right verification by using the operational order of financial business so that the safety of financial operation verification efficiency and business operation is laid equal stress on.
Description
Technical field
The present invention relates to the verification method of authentication field more particularly to financial business, device, equipment and computers to deposit
Storage media.
Background technology
With the development of information technology, the business performed by network is more and more, and in order to when improving execution business
Safety usually can carry out authentication to user.
Especially when being related to internet financial business, in order to allow user is self-service under computer assisted to complete various behaviour
Make, such as remotely handle various businesses, such as remote control, Telnet etc. by network technology.Operation for user needs
Authentication is carried out to user, with the user internet financial business of guarantee by safety, for example, handling internet gold in user
It, can be with remote validation (can carry out authentication by two-way video with remote validation, such as user), Huo Zheyong when melting business
Family by mobile phone (such as passing through mobile phone identifying code, method of password authentication) these verification methods, as long as other people possess the account and
Password can be by verification, and safety is relatively low, can not ensure to verify the object authenticity of identity.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill
Art.
Invention content
It is a primary object of the present invention to provide a kind of verification method of financial business, device, equipment and computer storage
Medium, it is intended to efficiently to subscriber authentication, to determine whether user has financial business operating right, ensure user's operation
Safety.
To achieve the above object, the present invention provides a kind of verification method of financial business, the authentication of the financial business
Method includes the following steps:
The operational order of financial business is received, obtains the business information included in the operational order;
The safe class of the operational order is determined according to the business information, the safe class is corresponding to be tested to obtain
Card rule;
Obtain the unit to be verified included in the proof rule, and by the element to be verified in the unit to be verified into
Row display, so that user inputs the corresponding verification information of element to be verified;
The verification information and default verification library are compared, to carry out the verification of the operating right of the operational order;
When detecting that operating right is verified, the operational order is performed.
Optionally, the operational order for receiving financial business, obtains the business information that is included in the operational order
Before step, including:
The application request of finance account input by user is received, obtains the identity information included in the application request;
Finance account is established, and set verification library on the finance account based on the identity information, by operating rights
The standard information of limit verification is preserved into the verification library.
Optionally, the safe class that the operational order is determined according to the business information, to obtain the safety
The step of grade corresponding proof rule, includes:
The business information with predetermined level table is compared, is believed with judging to whether there is in predetermined level table with business
Cease matched safe class;
If exist in predetermined level table with the matched safe class of business information, and using the safe class as the behaviour
Make the safe class instructed;
If in predetermined level table be not present with the matched safe class of business information, using the operational order as be exempt from customs examination
Card instruction.
Optionally, the safe class that the operational order is determined according to the business information, to obtain the safety
The step of grade corresponding proof rule, includes:
The relevant historical operation record of business information is obtained, obtains the operation information in the historical operation record;
The operation information with preset instructions safe class is compared, determines the safe class of the operational order,
To obtain the corresponding proof rule of the safe class.
Optionally, it is described to obtain the unit to be verified included in the proof rule, and be in the unit to be verified
Element to be verified shown, the step of inputting element to be verified corresponding verification information for user includes:
Default validation database is inquired according to the safe class of operational order, is obtained in default validation database with safety etc.
The matched proof rule of grade;
Obtain the unit to be verified included in the proof rule, and obtain in the unit to be verified it is each it is to be verified will
The history verification record of element;
It is verified and recorded according to the history of element to be verified each in unit to be verified, determined to be verified in unit to be verified
Element;
The element to be verified is shown, so that user inputs the corresponding verification information of element to be verified.
Optionally, it is described to be compared the verification information and default verification library, to carry out the behaviour of the operational order
The step of making Authority Verification includes:
Verification information input by user is obtained, the verification information and the standard information in default verification library are compared
It is right;
If verification information is matched with the standard information in preset verification library, the corresponding operating right verification of operational order is logical
It crosses;
If verification information is mismatched with the standard information in preset verification library, the corresponding operating right verification of operational order
Do not pass through, and adjust the element to be verified in the unit to be verified, to carry out secondary verification.
Optionally, if the verification information is mismatched with the standard information in preset verification library, operational order is corresponding
Operating right verification does not pass through, and adjust the element to be verified in the unit to be verified, the step of to carry out secondary verification it
Afterwards, including:
Statistical operation Authority Verification not by verification frequency, by it is described verification frequency be compared with predetermined threshold value;
If the verification frequency is more than predetermined threshold value, the corresponding operation service of operational order is carried out part freezes.
In addition, to achieve the above object, the present invention also provides a kind of verification devices of financial business;
The verification device of the financial business includes:
Acquisition module is received, for receiving the operational order of financial business, obtains the business included in the operational order
Information;
Level determination module, for determining the safe class of the operational order according to the business information, to obtain
State the corresponding proof rule of safe class;
Display module is obtained, for obtaining the unit to be verified included in the proof rule, and by the list to be verified
Element to be verified in member is shown, so that user inputs the corresponding verification information of element to be verified;
Authority Verification module for the verification information and default verification library to be compared, is referred to carrying out the operation
The operating right verification of order;
Execution module is instructed, for when detecting that operating right is verified, performing the operational order.
In addition, to achieve the above object, the present invention also provides a kind of verification equipment of financial business;
The verification equipment of the financial business includes:It memory, processor and is stored on the memory and can be in institute
The proving program of the financial business run on processor is stated, wherein:
The proving program of the financial business realizes the authentication of financial business as described above when being performed by the processor
The step of method.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
The proving program of financial business, the proving program quilt of the financial business are stored on the computer storage media
The step of processor realizes the verification method of financial business as described above when performing.
Verification method, device, equipment and the computer storage media for a kind of financial business that the embodiment of the present invention proposes.With
Family trigger action in terminal instructs, and terminal receives the operational order of financial business, obtains the business letter included in operational order
Breath;The safe class of the operational order is determined according to business information, to obtain the corresponding proof rule of safe class;It determines to test
The unit to be verified included in card rule, and the element to be verified in unit to be verified is shown, so that user's input is treated
Verify the corresponding verification information of element;Verification information input by user and default verification library are compared, if input by user
Verification information passes through with default verification storehouse matching, the then corresponding operating right authentication of operational order;When detecting operating rights
When limit is verified, the operational order is performed.The present invention is passing through the behaviour to financial business based on terminal progress financial operation
Make the operating right verification mode set, improve the safety of financial business operation, the input of multi information was carried out without user
Can the identity information of user accurately verified so that the safety of financial operation verification efficiency and business operation is simultaneously
Weight.
Description of the drawings
Fig. 1 is the apparatus structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the verification method first embodiment of financial business of the present invention;
The refinement flow diagram that Fig. 3 is the step S20 of the verification method of financial business in Fig. 2;
Fig. 4 is another refinement flow diagram of the step S20 of the verification method of financial business in Fig. 2;
Fig. 5 is the refinement flow diagram of the step S30 of the verification method of financial business in Fig. 2;
Fig. 6 is the flow diagram of the verification method second embodiment of financial business of the present invention;
Fig. 7 is the high-level schematic functional block diagram of verification one embodiment of device of financial business of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, the terminal structure schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
Terminal of the embodiment of the present invention can with fixed terminal or mobile terminal, wherein, fixed terminal such as " Internet of Things
Equipment ", the intelligent air condition with network savvy, intelligent electric lamp, intelligent power etc.;Mobile terminal, such as AR/VR with network savvy
Equipment, intelligent sound box, autonomous driving vehicle, PC, smart mobile phone, tablet computer, E-book reader, pocket computer etc. have
The terminal device of display function, it should be added that, the terminal in the present embodiment can also be called the verification of financial business
Equipment.
As shown in Figure 1, the terminal can include:Processor 1001, such as CPU, network interface 1004, user interface
1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is used to implement the connection communication between these components.
User interface 1003 can include display screen (Display), input unit such as keyboard (Keyboard), optional user interface
1003 can also include standard wireline interface and wireless interface.Network interface 1004 can optionally connect including the wired of standard
Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory or the memory of stabilization
(non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor
1001 storage device.
Optionally, terminal can also include camera, RF (Radio Frequency, radio frequency) circuit, sensor, audio
Circuit, WiFi module;Input unit, than display screen, touch screen;Network interface can in blanking wireless interface in addition to WiFi, bluetooth,
Probe, 3G/4G/5G internet base station equipment etc..Wherein, sensor such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display screen, proximity sensor can when mobile terminal is moved in one's ear, close display screen and/
Or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally three axis) and accelerate
The size of degree can detect that size and the direction of gravity when static, the application that can be used to identify mobile terminal posture is (such as vertical and horizontal
Shield switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;Certainly, it is mobile
Terminal can also configure the other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, no longer superfluous herein
It states.
It will be understood by those skilled in the art that the restriction of the terminal structure shown in Fig. 1 not structure paired terminal, can wrap
It includes and either combines certain components or different components arrangement than illustrating more or fewer components.
As shown in Figure 1, the computer software product is stored in a storage medium (storage medium:It is called computer storage
Medium, computer media, readable medium, readable storage medium storing program for executing, computer readable storage medium are directly medium etc., such as
ROM/RAM, magnetic disc, CD) in, it is used including some instructions so that a station terminal equipment (can be mobile phone, computer services
Device, air conditioner or network equipment etc.) method described in each embodiment of the present invention is performed, it stores and is situated between as a kind of computer
It can include operating system, network communication module, Subscriber Interface Module SIM and the verification of financial business in the memory 1005 of matter
Application program.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, is carried out with background server
Data communicate;User interface 1003 is mainly used for connecting client (user terminal), with client into row data communication;And processor
1001 can be used for calling the verification application program of financial business stored in memory 1005, and perform and implement below the present invention
Step in the verification method for the financial business that example provides.
Before the step of the present embodiment performs, user is needed in the corresponding banking application software of terminal or finance pages
The Login Register of user is carried out on interface, specifically:
Step a1 receives the application request of finance account input by user, obtains the identity included in the application request
Information;
Step a2 establishes finance account, and set verification library on the finance account based on the identity information, will
The standard information of operating right verification is preserved into the verification library.
User triggers the application request of finance account in terminal, and the application that terminal receives finance account input by user please
It asks, obtains the identity information included in the application request, that is, user applies for that finance account needs to input the basic identity letter of user
Breath, such as:Address name, user contact details (user contact details:Including subscriber phone number, user mail account etc.),
(user certificate information includes user certificate information:User certificate copy, user certificate number etc.), station address information (use
Family address information includes:Subscriber household certificate address information, user CompanyAddress information) and user biological characteristic information (user biological
Characteristic information includes:User fingerprints data, user's head image information, user voice information) and other user related informations, terminal base
Finance account is established, and using application information input by user as later stage subscriber authentication in application information input by user
Standard information.
Terminal sets verification library after finance account is established on the finance account, and verification library is built for preserving user
The basic identity information inputted during vertical finance account, wherein, basic identity information user verifies relevant mark as operating right
Calibration information.
Further, when user's finance account establishes completion, it is relevant that user can log in finance account progress finance
Business operation, that is, user be based on terminal trigger finance account log-in instruction, to user login information carry out login authentication, with
Family login authentication shows corresponding financial business by rear on the finance account of user's login, it should be added that:
Before the embodiment of the verification method of the application financial business, user is needed to establish relevant finance account, user is logging in
During finance account, login authentication is carried out, not as the emphasis of the application, the application steps on mainly around user for the mode of login authentication
After recording finance account, financial business operation is triggered on finance account, so as to carry out authentication to user, finally realizes user
The operating right mandate of financial business operation.
It is related to different verification modes in force to be combined, for example, the 1, testimony of a witness compares, i.e., with cloud platform interface tune
Form according to the ID card information of user, compares user from taking pictures and user Ministry of Public Security base map, veritifies user's body in real time
Part;2nd, face alignment service, that is, in the form of cloud platform interface calls and algorithm private is disposed, uploaded twice by comparing user
Take pictures certainly, to veritify user identity;3rd, (OCR technique is the abbreviation (Optical of optical character identification to OCR technique
Character Recognition), be by scan etc. optics input mode by various bills, newpapers and periodicals, books, manuscript and its
The word of its printed matter is converted into image information, recycles character recognition technology that image information is converted into the calculating that can be used
Machine input technology), the identification of identity card certificate and bank card card recognition function are provided, clothes are provided in the form of cloud platform interface calls
Business, the identity card picture and bank card photo that user is uploaded are converted into editable word, carry out subscriber identity information really
Recognize.4th, Application on Voiceprint Recognition, that is, database is entered by the voiceprint of the speaker of acquisition, when speaker speaks again, system
Voiceprint data in comparison database identifies the identity of (identification/confirmation) speaker;5th, fingerprint recognition adopts user in advance
The finger print information of collection with perform operation finger print information be compared, 6, mobile phone dynamic verification code identification etc..
With reference to Fig. 2, in the first embodiment of the verification method of financial business of the present invention, the verification method of the financial business
Including:
Step S10 receives the operational order of financial business, obtains the business information included in the operational order.
User logs in finance account and the operational order of financial business is triggered on the finance account of login, and terminal receives gold
Melt the operational order of business, terminal obtains the business information included in operational order, and the business information that operational order includes includes:
Type of service that the operational order of user's triggering is directed to, Business Name, operating time, the business operation amount of money etc., that is, service class
Type includes:Application is transferred accounts, fund purchase, Stock Purchase, contract purchasing, insures the business that purchase etc. is related to fund flow, example
Such as, user triggers the operational order of fund product purchase on the finance account of login, then is included in the operational order:ProductName
Title, exchange hour, transaction amount.
Step S20 determines the safe class of the operational order according to the business information, to obtain the safe class
Corresponding proof rule.
Terminal determines the safe class of user operation instruction according to the business information carried in user operation instruction, for example,
Terminal can (predetermined level table be according to tool with predetermined level table according to the Business Name in business information and the relevant operation amount of money
The operation scenario setting of body, information of the terminal in predetermined level table determine the corresponding safe class of user operation instruction) into
Row compare, if in predetermined level table exist with the Business Name in business information and operation the matched safe class of the amount of money, by
With the safe class of the Business Name in business information and the operation matched safe class of the amount of money as operational order, terminal obtains
The corresponding proof rule of safe class, to be verified according to the proof rule.
Step S30 obtains the unit to be verified included in the proof rule, and will be to be tested in the unit to be verified
Card element is shown, so that user inputs the corresponding verification information of element to be verified.
The unit to be verified included in the proof rule is obtained, unit to be verified refers to the verification information of a type,
Unit to be verified is divided into the present embodiment:Dynamic password verification, user certificate verification and biological characteristic validation, determine it is to be tested
After demonstrate,proving unit, the element to be verified in unit to be verified is determined, and the element to be verified in the unit to be verified is carried out
Display, that is, include the authentication unit of same type in a kind of proof rule, included in a unit to be verified different to be verified
(e.g., the first safe class corresponds to the first proof rule to element, and including three authentication units in the first proof rule is respectively:It is dynamic
(the verification element that dynamic password verification includes is for state password authentification:Mobile phone dynamic verification code, mailbox dynamic verification code etc.), user
(user certificate verification includes certificate verification:Identity card, driver's license, passport or social security information etc.) and biological characteristic validation (life
Object signature verification includes:Fingerprint authentication, face verification, voice authentication)), terminal is true according to random or according to setting rule
Element to be verified in fixed unit to be verified, so that user inputs the corresponding verification information of element to be verified.
Such as:A, user's financial business it is entitled transfer accounts, transfer amounts 500000, then correspond to the first safe class,
First safe class corresponds to the first proof rule, and including three authentication units in the first proof rule is respectively:Dynamic password is tested
Card, user certificate verification and biological characteristic validation, the band verification element that corresponding unit to be verified determines are:Mobile phone dynamic password,
User identity card number, fingerprint authentication;B, user's financial business it is entitled transfer accounts, transfer amounts 50000, then correspond to second
Safe class, the second safe class correspond to the second proof rule, and including two authentication units in the second proof rule is respectively:It is dynamic
State password authentification and user certificate verification;The band that corresponding unit to be verified determines verifies that element is:Mailbox dynamic password, user drive
Sail number;C, the entitled payment of user's financial business, transfer amounts 500 then correspond to third safe class, third safety etc.
Grade corresponds to third proof rule, and including an authentication unit in third proof rule is respectively:Dynamic password verification, correspondence are to be tested
The band that card unit determines verifies that element is:Mobile phone dynamic password;D, the entitled payment amount of user's financial business is 50, then not
There are corresponding safe classes, then carry out exempting from close payment.
The verification information and default verification library are compared by step S40, to carry out the operating rights of the operational order
Limit verification.
Verification information and default verification library (are preset verification library by terminal:It sets when being established for finance account, is protected in verification library
Have user and the identity information provided during account be provided) it is compared, to carry out the verification of the operating right of operational order.That is, eventually
The identity information of verification information input by user and default verification library storage is compared by end, in verification information input by user
During with information matches in presupposed information library, then authorize operational order corresponding operating right.
Specifically, step S40 includes:
Step b1 obtains verification information input by user, by the standard information in the verification information and default verification library
It is compared;
Step b2, if verification information is matched with the standard information in preset verification library, the corresponding operating rights of operational order
Limit is verified;
Step b3, if verification information is mismatched with the standard information in preset verification library, the corresponding operation of operational order
Authority Verification does not pass through, and adjusts the element to be verified in the unit to be verified, to carry out secondary verification.
Terminal obtains verification information input by user, and verification information and the standard information in default verification library are compared
It is right;If verification information is matched with the standard information in preset verification library, that is, verification information is identical with standard information, then operation refers to
Corresponding operating right is enabled to be verified;If verification information is mismatched with the standard information in preset verification library, that is, verification information
Different from standard information, then the corresponding operating right verification of operational order does not pass through, and adjust and treated in the unit to be verified
Element is verified, to carry out secondary verification.
Specific processing step is determined according to verification situation in the present embodiment, obstructed out-of-date, terminal is verified detecting
The adjusting of element to be verified in unit to be verified can automatically be carried out, that is, after being determined as the first safe class, the first safe class
In authentication unit include dynamic password verification, user certificate verification and biological characteristic validation, the element to be verified verified for the first time
It is mobile phone dynamic password, user identity card number, fingerprint authentication, verifies not over carrying out secondary verification terminal will be to be verified
Element is adjusted to:Date verification that mailbox dynamic password verification, car papers take, user's voice print verification, when secondary verification still
Do not pass through, adjust element to be verified again, until verification is more than threshold value herein, carry out corresponding account part financial business function freezing
Knot.
Step S50 when detecting that operating right is verified, performs the operational order.
It obtains subscriber authentication according to verification message input by user in terminal and passes through, then terminal is according to the operation of user
Instruction performs corresponding operation.
User's trigger action in terminal instructs in the present embodiment, and terminal receives the operational order of financial business, obtains
The business information included in operational order;The safe class of the operational order is determined according to business information, to obtain the peace
The corresponding proof rule of congruent grade;The unit to be verified included in the proof rule is obtained, and will be in the unit to be verified
Element to be verified shown, so that user inputs the corresponding verification information of element to be verified;Verification input by user is believed
Breath is compared with default verification library, if verification information input by user and default verification storehouse matching, operational order are corresponding
Operating right authentication passes through;When detecting that operating right is verified, the operational order is performed.The present invention based on
Terminal carries out operating right verification mode of the financial operation by the operation setting to financial business, improves financial business operation
Safety.
Further, on the basis of first embodiment of the invention, it is proposed that the verification method of financial business of the present invention
The present embodiment, the present embodiment are the refinements for step S20 in first embodiment, specifically illustrate in the present embodiment how root
The realization method of the grade of operational order safety is determined according to business information;
The verification method of the financial business includes:
Mode one:With reference to Fig. 3, determining safe class is compared with predetermined level table in business information.
The business information is compared step S21 with predetermined level table, to judge to whether there is in predetermined level table
With the matched safe class of business information.
By the business information and predetermined level table (predetermined level table:It is as shown in table 1 below, root is included in predetermined level table
It is configured according to involved in operational order to operation service information, corresponding safety of user's operation etc. can be determined according to business information
Grade) be compared, with judge in predetermined level table whether there is with the matched safe class of business information, for example, user trigger
Operational order be to transfer accounts 50000 yuan, then search predetermined level table, determine type of service to transfer accounts, beneficiary is stranger, is turned
The account amount of money is 50000, it is determined that it is level-one that user's trigger action, which instructs corresponding safe class,.
Table 1
Step S22, if exist in predetermined level table with the matched safe class of business information, and the safe class is made
Safe class for the operational order.
Terminal exist in predetermined level table with the matched safe class of business information, and using the safe class as institute
State the safe class of operational order, terminal determines the corresponding safe class of the operational order of user according to predetermined level table, with into
One step, proof rule is determined according to safe class.
Step S23, if in predetermined level table be not present with the matched safe class of business information, by the operational order
It is instructed as laissezpasser.
If terminal is not present and the matched safe class of business information in predetermined level table, that is, in predetermined level table not
In the presence of safe class corresponding with business information in user operation instruction, then terminal is using operational order as laissezpasser instruction;Example
Such as, user carries out 50 yuan of small amount payment in terminal, then verification instruction is instructed for laissezpasser, is not needed to user and is operated
Authority Verification.
The business information in operational order with predetermined level table is compared in the present embodiment, pre-sets grade
Table is accurately identified according to the business information included in user operation instruction, the corresponding safe class of operational order, realizes needle
To the accurate validation of user operation instruction.
Mode two:With reference to Fig. 4, safe class is determined based on the historical operation record of business information.
Step S24 obtains the relevant historical operation record of business information, obtains the operation letter in the historical operation record
Breath.
Terminal obtains the relevant historical operation record of business information, that is, terminal obtains the behaviour in the historical operation record
Make information, the time of user's trigger action instruction, the frequency of user's trigger action instruction, the corresponding receipts of user's trigger action instruction
Money side's information, for example, user is 3 time in terminal:00, it carries out 100 times, the operation to strange 500 yuan of account transfer, eventually
End obtains the finance account operating time of preset time period.
The operation information with preset instructions safe class is compared, determines the peace of the operational order by step S25
Congruent grade, to obtain the corresponding proof rule of the safe class.
The operation information is compared terminal with preset instructions safe class, determines safety of the operational order etc.
Grade, wherein, predetermined level table is the table of grading set previously according to operation informations such as operating time, operating frequencies, for example, default
In table of grading:Operating time is morning 3:00, operational order corresponding safe class of the operating frequency more than 30 times is 3 grades, eventually
The operational order corresponding operating time for triggering user is held, operating frequency or other information are compared with predetermined level table
It is right, determine the safe class of operational order, when the safe class of operational order is higher than preset value, preset value can be as the case may be
Setting, such as be set as 2 grades, then the operational order that user triggers is regarded as sensitive operation by terminal, and terminal determines operational order
Safe class, to obtain the corresponding proof rule of the safe class.
It should be added that the mode one and mode two in the present embodiment can be combined, that is, in the present embodiment
If the verification for the grade for only carrying out user operation instruction safety according to the scheme described in mode one in is directed to the operation of user's single,
If continually being operated there are user can not be effectively prevented from, carry out user's operation according to the scheme described in mode two and refer to
The safe class of order determines to be inaccurate, after the mode one in the present embodiment is determined safe class, further, terminal according to
The historical operation situation of finance account determines again.
In the present embodiment according to the business information included in operational order, corresponding safety of user operation instruction etc. is determined
Grade, and according to the determining proof rule such as safety so that financial operation more has accuracy.
Further, with reference to Fig. 5, on the basis of first embodiment of the invention, it is proposed that financial business of the present invention is tested
The present embodiment of card method, the present embodiment are the refinements for step S30 in first embodiment, are illustrated in the present embodiment
Determine the specific implementation of element to be shown;
Step S30 includes in the verification method of the financial business:
Step S31 inquires default validation database according to the safe class of operational order, obtains in default validation database
With the matched proof rule of safe class;
Terminal inquires default validation database according to the safe class of operational order, obtain in default validation database with peace
The congruent matched proof rule of grade, that is, the safe class of terminal operation instruction is traversed with default validation database, and terminal obtains
Take in default validation database with the matched proof rule of safe class, wherein, proof rule is set in advance according to safe class
Put, comprising different verification elements in different proof rules, set between proof rule and authentication unit it is relevant,
For example, the first proof rule is the most stringent of verification to user, the first proof rule includes user's dynamic password verification, user certificate
Part is verified and the unit to be verified of biological characteristic validation;Second proof rule is the verification stringenter to user, and the second verification is advised
The unit to be verified then verified comprising user's dynamic password verification and user certificate, third proof rule are most basic to user
Verification, it is unit to be verified that third proof rule, which includes user's dynamic password verification,.
Step S32 obtains the unit to be verified included in the proof rule, and obtains each in the unit to be verified
The history verification record of element to be verified.
Terminal obtains the unit to be verified included in proof rule, terminal obtains according to proof rule and corresponding incidence relation
The history verification record of unit to be verified in finance account is taken, for example, unit to be verified is user biological feature in finance account
It verifies, the unit to be verified included in biological characteristic validation is user's voice print verification, fingerprint authentication and facial expression acquisition are verified;
History verification in preset time period is recorded as user's voice print verification 10 times, fingerprint authentication 50 times, and facial expression acquisition identification is tested
Card 15 times, user's voice print verification percent of pass 95%, pass rate of fingerprint authentication 99%, facial expression acquisition identification are verified rate
85%.
Step S33 is verified according to the history of element to be verified each in unit to be verified and is recorded, determines in unit to be verified
Element to be verified.
Terminal is verified according to the history of element to be verified each in unit to be verified and is recorded, and determines to treat in unit to be verified
Verify element, that is, terminal is verified according to history and recorded, and is obtained and is verified that element verification number is few in unit to be verified, is verified
The low verification element of rate is as the corresponding element to be verified of operational order.
Step S34 shows the element to be verified, so that user inputs the corresponding verification letter of element to be verified
Breath.
Terminal shows element to be verified by what is determined, so that user inputs the corresponding verification letter of element to be verified
Breath, it should be added that, the method that element to be verified is determined in the present embodiment is to verify situation according to history, equally may be used also
Other to be taken to determine the method for element to be verified, such as randomly select or set corresponding weight to determine element to be verified.
Terminal can be determined element to be verified in the present embodiment, and the verification that other people accidentally get user carries out,
Financial business operation is carried out to the finance account of user so that the safety higher of terminal finance account.
Further, with reference to Fig. 6, on the basis of first embodiment of the invention, it is proposed that financial business of the present invention is tested
The second embodiment of card method.
The second embodiment of the present invention is not by the processing scheme of proposition for verification, that is, in the step of first embodiment
Rapid S40:The verification information and default verification library are compared, it is verified with the operating right for carrying out the operational order
Afterwards, if verification does not pass through, step is being performed:The corresponding operating right verification of operational order does not pass through, and adjust described to be verified
Element to be verified in unit, to also need to perform following steps while carrying out secondary verification:
Step S60, statistical operation Authority Verification not by verification frequency, verification frequency and the predetermined threshold value are carried out
Compare.
Terminal statistical operation Authority Verification not by verification frequency, it is and verification frequency and the predetermined threshold value is (default
Threshold value:Set according to specific circumstances, for example, predetermined threshold value is set as 10 times) it is compared, to determine the need for freezing
Corresponding operational order freezes finance account.
The corresponding operation service of operational order if the verification frequency is more than predetermined threshold value, is carried out part by step S70
Freeze.
If it is more than predetermined threshold value to verify frequency, the corresponding operation service of operational order is subjected to part and is freezed, that is, terminal
The part operation of financial operation involved in finance account can be instructed and freezed, and in the application for receiving user again
Unlatching.
In the present embodiment terminal multiple financial operation not over when, to part financial circles in the finance account of terminal
The problem of business is freezed, and user's operation caused by both having avoided finance account fully charge in this way is inconvenient, ensure that simultaneously
The safety of user's financial operation.
In addition, with reference to Fig. 7, the embodiment of the present invention also proposes a kind of verification device of financial business, the financial business
Verification device includes:
Acquisition module 10 is received, for receiving the operational order of financial business, obtains the industry included in the operational order
Business information;
Level determination module 20, for determining the safe class of the operational order according to the business information, to obtain
The corresponding proof rule of the safe class;
Display module 30 is obtained, for obtaining the unit to be verified included in the proof rule, and will be described to be verified
Element to be verified in unit is shown, so that user inputs the corresponding verification information of element to be verified;
Authority Verification module 40, for the verification information and default verification library to be compared, to carry out the operation
The operating right verification of instruction;
Execution module 50 is instructed, for when detecting that operating right is verified, performing the operational order.
Wherein, the step of each Implement of Function Module of the verification device of financial business can refer to financial business of the present invention
Each embodiment of verification method, details are not described herein again.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
The proving program of financial business, the proving program quilt of the financial business are stored on the computer storage media
Processor realizes the operation in the verification method for the financial business that above-described embodiment provides when performing.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/
There are any actual relationship or orders between object;Term " comprising ", "comprising" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or system including a series of elements not only include that
A little elements, but also including other elements that are not explicitly listed or further include for this process, method, article or
The intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except also there are other identical elements in the process including the element, method, article or system.
For device embodiment, since it is substantially similar to embodiment of the method, so describe fairly simple, it is related
Part illustrates referring to the part of embodiment of the method.The apparatus embodiments described above are merely exemplary, wherein making
The unit illustrated for separating component may or may not be physically separate.In can selecting according to the actual needs
Some or all of module realize the purpose of the present invention program.Those of ordinary skill in the art are not making the creative labor
In the case of, you can to understand and implement.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone,
Computer, server, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of verification method of financial business, which is characterized in that the verification method of the financial business includes the following steps:
The operational order of financial business is received, obtains the business information included in the operational order;
The safe class of the operational order is determined according to the business information, is advised with obtaining the corresponding verification of the safe class
Then;
The unit to be verified included in the proof rule is obtained, and the element to be verified in the unit to be verified is shown
Show, so that user inputs the corresponding verification information of element to be verified;
The verification information and default verification library are compared, to carry out the verification of the operating right of the operational order;
When detecting that operating right is verified, the operational order is performed.
2. the verification method of financial business as described in claim 1, which is characterized in that the operation for receiving financial business refers to
Before the step of enabling, obtaining the business information included in the operational order, including:
The application request of finance account input by user is received, obtains the identity information included in the application request;
Finance account is established, and set verification library on the finance account based on the identity information, operating right is tested
The standard information of card is preserved into the verification library.
3. the verification method of financial business as described in claim 1, which is characterized in that described to be determined according to the business information
The safe class of the operational order is included with obtaining the step of the safe class corresponding proof rule:
The business information is compared with predetermined level table, to judge to whether there is and business information in predetermined level table
The safe class matched;
If in predetermined level table exist with the matched safe class of business information, and using the safe class as it is described operation refer to
The safe class of order;
If in predetermined level table be not present with the matched safe class of business information, the operational order is referred to as laissezpasser
It enables.
4. the verification method of financial business as described in claim 1, which is characterized in that described to be determined according to the business information
The safe class of the operational order is included with obtaining the step of the safe class corresponding proof rule:
The relevant historical operation record of business information is obtained, obtains the operation information in the historical operation record;
The operation information with preset instructions safe class is compared, the safe class of the operational order is determined, to obtain
Take the corresponding proof rule of the safe class.
5. the verification method of the financial business as described in Claims 1-4 any one, which is characterized in that described in the acquisition
The unit to be verified included in proof rule, and the element to be verified in the unit to be verified is shown, for user
The step of inputting element to be verified corresponding verification information includes:
Default validation database is inquired according to the safe class of operational order, obtain in default validation database with safe class
The proof rule matched;
The unit to be verified included in the proof rule is obtained, and obtains each element to be verified in the unit to be verified
History verification record;
According to the history of element to be verified each in unit to be verified verify record, determine in unit to be verified it is to be verified will
Element;
The element to be verified is shown, so that user inputs the corresponding verification information of element to be verified.
6. the verification method of financial business as described in claim 1, which is characterized in that described by the verification information and default
Verification library is compared, to include the step of carrying out the verification of the operating right of the operational order:
Verification information input by user is obtained, the verification information is compared with the standard information in default verification library;
If verification information is matched with the standard information in preset verification library, the corresponding operating right of operational order is verified;
If verification information is mismatched with the standard information in preset verification library, the corresponding operating right verification of operational order is obstructed
It crosses, and adjusts the element to be verified in the unit to be verified, to carry out secondary verification.
7. the verification method of financial business as claimed in claim 6, which is characterized in that if the verification information and preset verification
Standard information in library mismatches, then the corresponding operating right verification of operational order does not pass through, and adjust the unit to be verified
In element to be verified, the step of to carry out secondary verification after, including:
Statistical operation Authority Verification not by verification frequency, by it is described verification frequency be compared with predetermined threshold value;
If the verification frequency is more than predetermined threshold value, the corresponding operation service of operational order is carried out part freezes.
8. the verification device of a kind of financial business, which is characterized in that the verification device of the financial business includes:
Acquisition module is received, for receiving the operational order of financial business, obtains the business information included in the operational order;
Level determination module, for determining the safe class of the operational order according to the business information, to obtain the peace
The corresponding proof rule of congruent grade;
Display module is obtained, for obtaining the unit to be verified included in the proof rule, and will be in the unit to be verified
Element to be verified shown, so that user inputs the corresponding verification information of element to be verified;
Authority Verification module, for the verification information and default verification library to be compared, to carry out the operational order
Operating right is verified;
Execution module is instructed, for when detecting that operating right is verified, performing the operational order.
9. the verification equipment of a kind of financial business, which is characterized in that the verification equipment of the financial business includes:Memory, place
It manages device and is stored in the proving program of financial business that can be run on the memory and on the processor, wherein:
It is realized as described in any one of claim 1 to 7 when the proving program of the financial business is performed by the processor
The step of verification method of financial business.
10. a kind of computer storage media, which is characterized in that the verification of financial business is stored on the computer storage media
Program realizes the finance as described in any one of claim 1 to 7 when the proving program of the financial business is executed by processor
The step of verification method of business.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810081998.0A CN108269187A (en) | 2018-01-29 | 2018-01-29 | Verification method, device, equipment and the computer storage media of financial business |
PCT/CN2018/122609 WO2019144738A1 (en) | 2018-01-29 | 2018-12-21 | Financial service verification method, apparatus and device, and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810081998.0A CN108269187A (en) | 2018-01-29 | 2018-01-29 | Verification method, device, equipment and the computer storage media of financial business |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108269187A true CN108269187A (en) | 2018-07-10 |
Family
ID=62776843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810081998.0A Pending CN108269187A (en) | 2018-01-29 | 2018-01-29 | Verification method, device, equipment and the computer storage media of financial business |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108269187A (en) |
WO (1) | WO2019144738A1 (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106254378A (en) * | 2016-09-09 | 2016-12-21 | 宇龙计算机通信科技(深圳)有限公司 | The method of controlling security of a kind of short-range communication NFC mobile terminal and system |
CN109686011A (en) * | 2018-12-18 | 2019-04-26 | 维拓智能科技(深圳)有限公司 | The user identification method of self-aided terminal and self-aided terminal |
CN110011957A (en) * | 2018-12-13 | 2019-07-12 | 阿里巴巴集团控股有限公司 | Safety certifying method, device, electronic equipment and the storage medium of business account |
WO2019144738A1 (en) * | 2018-01-29 | 2019-08-01 | 深圳壹账通智能科技有限公司 | Financial service verification method, apparatus and device, and computer storage medium |
CN110113168A (en) * | 2019-04-03 | 2019-08-09 | 厦门历思科技服务有限公司 | A kind of information authentication method, client, system and computer readable storage medium |
CN110166438A (en) * | 2019-04-19 | 2019-08-23 | 平安科技(深圳)有限公司 | Login method, device, computer equipment and the computer storage medium of account information |
CN110188159A (en) * | 2019-05-27 | 2019-08-30 | 深圳前海微众银行股份有限公司 | Collage-credit data cut-in method, device, equipment and computer readable storage medium |
CN110457876A (en) * | 2019-08-15 | 2019-11-15 | 中国银行股份有限公司 | Identity identifying method, apparatus and system |
CN110889106A (en) * | 2018-09-11 | 2020-03-17 | 北京京东金融科技控股有限公司 | Configuration method, device, system and computer readable storage medium |
CN110909013A (en) * | 2019-10-12 | 2020-03-24 | 中国平安财产保险股份有限公司 | Service list generation method, device, equipment and computer readable storage medium |
CN111160137A (en) * | 2019-12-12 | 2020-05-15 | 天目爱视(北京)科技有限公司 | Intelligent business processing equipment based on biological 3D information |
CN111181725A (en) * | 2018-11-12 | 2020-05-19 | 奇酷互联网络科技(深圳)有限公司 | Identity information verification method, mobile terminal and computer storage medium |
CN111786936A (en) * | 2019-11-27 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Method and device for authentication |
CN112231617A (en) * | 2020-10-12 | 2021-01-15 | 深圳市欢太科技有限公司 | Service call checking method and device, storage medium and electronic equipment |
CN112328482A (en) * | 2020-11-05 | 2021-02-05 | 中国平安人寿保险股份有限公司 | Test method and device based on script template, computer equipment and storage medium |
CN112395541A (en) * | 2020-12-29 | 2021-02-23 | 畅捷通信息技术股份有限公司 | Data content verification method, device and system, storage medium and computing equipment |
CN112465503A (en) * | 2020-11-17 | 2021-03-09 | 葛云霞 | Information security protection method based on internet finance and biological recognition and cloud platform |
CN112669042A (en) * | 2021-03-15 | 2021-04-16 | 中国银联股份有限公司 | Payment method, server, user terminal, system and storage medium |
CN112669163A (en) * | 2021-01-20 | 2021-04-16 | 何青波 | Financial business management method and system based on big data and cloud computing |
CN112686760A (en) * | 2021-01-20 | 2021-04-20 | 何青波 | Financial business processing method and platform based on big data |
CN112714108A (en) * | 2020-12-21 | 2021-04-27 | 中国移动通信集团江苏有限公司 | Method, device and equipment for verifying terminal communication number and computer storage medium |
CN112801619A (en) * | 2021-01-29 | 2021-05-14 | 中国农业银行股份有限公司上海市分行 | Method and device for screening financial business operation logs |
CN112995227A (en) * | 2021-05-13 | 2021-06-18 | 深圳格隆汇信息科技有限公司 | One-stop information service platform based on three-party credit management |
CN113191757A (en) * | 2021-06-03 | 2021-07-30 | 中国银行股份有限公司 | Bank business control method, device, server and storage medium |
CN113299016A (en) * | 2021-04-27 | 2021-08-24 | 深圳市怡化时代科技有限公司 | Service timing method and system of self-service terminal, self-service equipment and storage medium |
CN114138790A (en) * | 2021-12-02 | 2022-03-04 | 中国建设银行股份有限公司 | Interface element verification method, device, storage medium and program product |
CN114553838A (en) * | 2022-02-23 | 2022-05-27 | 京东方科技集团股份有限公司 | Method, system and server for implementing remote service handling |
CN115001779A (en) * | 2022-05-26 | 2022-09-02 | 中国农业银行股份有限公司 | Verification method, device, equipment and medium of operation instruction |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2438651A (en) * | 2006-06-02 | 2007-12-05 | Michael Arnold | Secure financial transactions |
CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
CN102790674A (en) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | Authentication method, equipment and system |
CN104158665A (en) * | 2014-08-25 | 2014-11-19 | 小米科技有限责任公司 | Method and device of verification |
CN105991590A (en) * | 2015-02-15 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Method and system for verifying user identity, client, and server |
CN106027543A (en) * | 2016-06-23 | 2016-10-12 | 北京孔方同鑫科技有限公司 | Identification method and apparatus based on weight calculation |
CN107231232A (en) * | 2016-03-23 | 2017-10-03 | 阿里巴巴集团控股有限公司 | A kind of auth method and device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150302411A1 (en) * | 2014-04-22 | 2015-10-22 | Bank Of America Corporation | Proximity to a location as a form of authentication |
CN104867010A (en) * | 2015-05-20 | 2015-08-26 | 杨淼彬 | User friendly payment method |
CN107316195A (en) * | 2017-06-26 | 2017-11-03 | 北京明华联盟科技有限公司 | The method of payment and device of a kind of safe and convenient |
CN108269187A (en) * | 2018-01-29 | 2018-07-10 | 深圳壹账通智能科技有限公司 | Verification method, device, equipment and the computer storage media of financial business |
-
2018
- 2018-01-29 CN CN201810081998.0A patent/CN108269187A/en active Pending
- 2018-12-21 WO PCT/CN2018/122609 patent/WO2019144738A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2438651A (en) * | 2006-06-02 | 2007-12-05 | Michael Arnold | Secure financial transactions |
CN102347929A (en) * | 2010-07-28 | 2012-02-08 | 阿里巴巴集团控股有限公司 | Verification method of user identity and apparatus thereof |
CN102790674A (en) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | Authentication method, equipment and system |
CN104158665A (en) * | 2014-08-25 | 2014-11-19 | 小米科技有限责任公司 | Method and device of verification |
CN105991590A (en) * | 2015-02-15 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Method and system for verifying user identity, client, and server |
CN107231232A (en) * | 2016-03-23 | 2017-10-03 | 阿里巴巴集团控股有限公司 | A kind of auth method and device |
CN106027543A (en) * | 2016-06-23 | 2016-10-12 | 北京孔方同鑫科技有限公司 | Identification method and apparatus based on weight calculation |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106254378A (en) * | 2016-09-09 | 2016-12-21 | 宇龙计算机通信科技(深圳)有限公司 | The method of controlling security of a kind of short-range communication NFC mobile terminal and system |
CN106254378B (en) * | 2016-09-09 | 2020-02-07 | 宇龙计算机通信科技(深圳)有限公司 | Safety control method and system for Near Field Communication (NFC) mobile terminal |
WO2019144738A1 (en) * | 2018-01-29 | 2019-08-01 | 深圳壹账通智能科技有限公司 | Financial service verification method, apparatus and device, and computer storage medium |
CN110889106A (en) * | 2018-09-11 | 2020-03-17 | 北京京东金融科技控股有限公司 | Configuration method, device, system and computer readable storage medium |
CN111181725A (en) * | 2018-11-12 | 2020-05-19 | 奇酷互联网络科技(深圳)有限公司 | Identity information verification method, mobile terminal and computer storage medium |
CN110011957A (en) * | 2018-12-13 | 2019-07-12 | 阿里巴巴集团控股有限公司 | Safety certifying method, device, electronic equipment and the storage medium of business account |
CN109686011A (en) * | 2018-12-18 | 2019-04-26 | 维拓智能科技(深圳)有限公司 | The user identification method of self-aided terminal and self-aided terminal |
CN110113168A (en) * | 2019-04-03 | 2019-08-09 | 厦门历思科技服务有限公司 | A kind of information authentication method, client, system and computer readable storage medium |
CN110113168B (en) * | 2019-04-03 | 2022-04-22 | 厦门历思科技服务有限公司 | Information authentication method, client, system and computer readable storage medium |
CN110166438A (en) * | 2019-04-19 | 2019-08-23 | 平安科技(深圳)有限公司 | Login method, device, computer equipment and the computer storage medium of account information |
WO2020211247A1 (en) * | 2019-04-19 | 2020-10-22 | 平安科技(深圳)有限公司 | Account information login method and device, computer device and computer storage medium |
CN110188159A (en) * | 2019-05-27 | 2019-08-30 | 深圳前海微众银行股份有限公司 | Collage-credit data cut-in method, device, equipment and computer readable storage medium |
CN110457876A (en) * | 2019-08-15 | 2019-11-15 | 中国银行股份有限公司 | Identity identifying method, apparatus and system |
CN110909013A (en) * | 2019-10-12 | 2020-03-24 | 中国平安财产保险股份有限公司 | Service list generation method, device, equipment and computer readable storage medium |
CN110909013B (en) * | 2019-10-12 | 2023-10-03 | 中国平安财产保险股份有限公司 | Service list generation method, device, equipment and computer readable storage medium |
CN111786936A (en) * | 2019-11-27 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Method and device for authentication |
CN113011348B (en) * | 2019-12-12 | 2024-05-14 | 天目爱视(北京)科技有限公司 | Intelligent service processing equipment based on 3D information identification |
CN111160137A (en) * | 2019-12-12 | 2020-05-15 | 天目爱视(北京)科技有限公司 | Intelligent business processing equipment based on biological 3D information |
CN113011348A (en) * | 2019-12-12 | 2021-06-22 | 天目爱视(北京)科技有限公司 | Intelligent service processing equipment based on 3D information identification |
CN112231617A (en) * | 2020-10-12 | 2021-01-15 | 深圳市欢太科技有限公司 | Service call checking method and device, storage medium and electronic equipment |
CN112328482A (en) * | 2020-11-05 | 2021-02-05 | 中国平安人寿保险股份有限公司 | Test method and device based on script template, computer equipment and storage medium |
CN112465503A (en) * | 2020-11-17 | 2021-03-09 | 葛云霞 | Information security protection method based on internet finance and biological recognition and cloud platform |
CN112465503B (en) * | 2020-11-17 | 2021-10-29 | 深圳市快付通金融网络科技服务有限公司 | Information security protection method based on internet finance and biological recognition and cloud platform |
CN112714108A (en) * | 2020-12-21 | 2021-04-27 | 中国移动通信集团江苏有限公司 | Method, device and equipment for verifying terminal communication number and computer storage medium |
CN112395541A (en) * | 2020-12-29 | 2021-02-23 | 畅捷通信息技术股份有限公司 | Data content verification method, device and system, storage medium and computing equipment |
CN112669163A (en) * | 2021-01-20 | 2021-04-16 | 何青波 | Financial business management method and system based on big data and cloud computing |
CN112686760A (en) * | 2021-01-20 | 2021-04-20 | 何青波 | Financial business processing method and platform based on big data |
CN112686760B (en) * | 2021-01-20 | 2021-09-14 | 深圳市全景网络有限公司 | Financial business processing method and platform based on big data |
CN112669163B (en) * | 2021-01-20 | 2021-11-02 | 深圳市快付通金融网络科技服务有限公司 | Financial business management method and system based on big data and cloud computing |
CN112801619A (en) * | 2021-01-29 | 2021-05-14 | 中国农业银行股份有限公司上海市分行 | Method and device for screening financial business operation logs |
CN112669042A (en) * | 2021-03-15 | 2021-04-16 | 中国银联股份有限公司 | Payment method, server, user terminal, system and storage medium |
CN113299016A (en) * | 2021-04-27 | 2021-08-24 | 深圳市怡化时代科技有限公司 | Service timing method and system of self-service terminal, self-service equipment and storage medium |
CN112995227B (en) * | 2021-05-13 | 2021-07-13 | 深圳格隆汇信息科技有限公司 | One-stop information service platform based on three-party credit management |
CN112995227A (en) * | 2021-05-13 | 2021-06-18 | 深圳格隆汇信息科技有限公司 | One-stop information service platform based on three-party credit management |
CN113191757A (en) * | 2021-06-03 | 2021-07-30 | 中国银行股份有限公司 | Bank business control method, device, server and storage medium |
CN114138790A (en) * | 2021-12-02 | 2022-03-04 | 中国建设银行股份有限公司 | Interface element verification method, device, storage medium and program product |
CN114553838A (en) * | 2022-02-23 | 2022-05-27 | 京东方科技集团股份有限公司 | Method, system and server for implementing remote service handling |
CN115001779A (en) * | 2022-05-26 | 2022-09-02 | 中国农业银行股份有限公司 | Verification method, device, equipment and medium of operation instruction |
Also Published As
Publication number | Publication date |
---|---|
WO2019144738A1 (en) | 2019-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108269187A (en) | Verification method, device, equipment and the computer storage media of financial business | |
US11501569B2 (en) | System for verifying the identity of a user | |
US10911423B2 (en) | Multi-level authentication for onboard systems | |
AU2016247162B2 (en) | Methods and systems for improving the accuracy performance of authentication systems | |
EP2863339A2 (en) | Methods and systems for determing user liveness | |
US20180374101A1 (en) | Facial biometrics card emulation for in-store payment authorization | |
WO2017066002A1 (en) | Blockchain-based identity and transaction platform | |
US20130067551A1 (en) | Multilevel Authentication | |
CN103718192A (en) | Image-based financial processing | |
EP3967014A1 (en) | Methods and systems for generating a unique signature based on user device movements in a three-dimensional space | |
CN107944871A (en) | Identity identifying method, device, computer equipment and computer-readable recording medium | |
US11669604B2 (en) | Methods and systems for authenticating a user | |
US20200412715A1 (en) | Biometric data contextual processing | |
WO2023276073A1 (en) | Learning model evaluation system, learning model evaluation method, and program | |
US11682017B2 (en) | Systems and methods for electronic payments with fraud prevention | |
TWM623959U (en) | Identification authentication device | |
US20240144713A1 (en) | Methods and systems for determining the authenticity of an identity document | |
US11961315B1 (en) | Methods and systems for enhancing detection of a fraudulent identity document in an image | |
JP2019117480A (en) | Information processing device and authentication system | |
US11755757B1 (en) | Methods and systems for determining the authenticity of an identity document | |
US20230206240A1 (en) | Account security system | |
US20230196333A1 (en) | Card payment method and system through application linkage | |
US20230316795A1 (en) | Auto-Document Detection & Capture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180710 |
|
RJ01 | Rejection of invention patent application after publication |