CN109978317A - Abnormal transaction processing method, interaction platform and computer readable storage medium - Google Patents
Abnormal transaction processing method, interaction platform and computer readable storage medium Download PDFInfo
- Publication number
- CN109978317A CN109978317A CN201811085079.7A CN201811085079A CN109978317A CN 109978317 A CN109978317 A CN 109978317A CN 201811085079 A CN201811085079 A CN 201811085079A CN 109978317 A CN109978317 A CN 109978317A
- Authority
- CN
- China
- Prior art keywords
- transaction
- safety verification
- application
- information
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000002159 abnormal effect Effects 0.000 title claims abstract description 80
- 230000003993 interaction Effects 0.000 title claims abstract description 53
- 238000003672 processing method Methods 0.000 title claims abstract description 27
- 238000003860 storage Methods 0.000 title claims abstract description 17
- 238000012795 verification Methods 0.000 claims abstract description 128
- 238000012790 confirmation Methods 0.000 claims abstract description 41
- 238000011217 control strategy Methods 0.000 claims abstract description 32
- 238000000034 method Methods 0.000 claims abstract description 21
- 230000001815 facial effect Effects 0.000 claims description 38
- 230000001755 vocal effect Effects 0.000 claims description 38
- 238000000605 extraction Methods 0.000 claims description 6
- 230000007306 turnover Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 3
- 238000012954 risk control Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- BQCADISMDOOEFD-UHFFFAOYSA-N Silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000012011 method of payment Methods 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Educational Administration (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of abnormal transaction processing method, interaction platform and computer readable storage mediums, this method comprises: in the abnormal transaction of offence air control strategy for getting host system interception, generate the safety verification link traded extremely, and determine the application for receiving the safety verification link, and safety verification link is sent to by the application by notification platform;Judge the safety verification information that the application returns whether is received in preset duration threshold value;If receiving the safety verification information that the application returns in preset duration threshold value, judge whether abnormal trade is Secure Transaction according to safety verification information;If abnormal transaction is Secure Transaction, the request for updating air control policing parameter is sent to host system;When the air control policing parameter for receiving host system return updates confirmation message, the prompt information of transaction is re-initiated to application push.The present invention can promote the treatment effeciency traded extremely, promote customer experience.
Description
Technical field
The present invention relates to technical field of financial safety more particularly to a kind of abnormal transaction processing methods, interaction platform and meter
Calculation machine readable storage medium storing program for executing.
Background technique
Financial field is to the more demanding of transaction risk control.Financial platform would generally be using some air control means to accepting
Client trading detected, to identify fraudulent trading and be intercepted.However, there are the arm's length dealing of portions of client also by
The case where interception, for intercepted arm's length dealing, existing processing mode is to send a telegraph customer service by client or reply to confirm short message
Trade confirmation is carried out, then intercepted arm's length dealing of being let pass by relevant staff's consistency operation, this processing mode are related to people
Work intervention, process flow is tediously long, low efficiency, causes the waiting time of client longer, customer experience is also bad.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill
Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of abnormal transaction processing method, interaction platform and computer-readable storages
Medium, it is intended to realize that trades extremely automatically processes, can be improved treatment effeciency, reduce the time that client waits, promote client
Experience.
To achieve the above object, the present invention provides a kind of abnormal transaction processing method, and the method is applied to interaction platform,
It the described method comprises the following steps:
In the abnormal transaction of offence air control strategy for getting host system interception, the safety traded extremely is generated
Confirmation link, and determine the application for receiving the safety verification link, and the safety verification is linked by notification platform
It is sent to the application;
Judge the safety verification information that the application returns whether is received in preset duration threshold value;
If the safety verification information that the application returns is received in preset duration threshold value, according to the safety verification
Information judges whether the abnormal transaction is Secure Transaction;
If the abnormal transaction is Secure Transaction, the request for updating air control policing parameter is sent to host system;
When the air control policing parameter for receiving host system return updates confirmation message, sent out again to application push
Play the prompt information of transaction.
Optionally, described in the abnormal transaction of offence air control strategy for getting host system interception, it generates described different
Before the safety verification link often traded, and the step of determining the application of the reception safety verification link, comprising:
The failed transactions that receiving host system intercepts;
According to the transaction record information that the failed transactions carry, offence air control strategy is obtained from the failed transactions
Abnormal transaction.
Optionally, after described the step of safety verification link is sent to the application by notification platform, packet
It includes:
It is linked based on the safety verification, establishes the interface channel with the application.
Optionally, the safety verification link includes trade confirmation request and authentication request, wherein the identity is tested
Card request includes credible equipment checking request and face verification request or voice print verification request.
Optionally, if the safety verification information for receiving the application in preset duration threshold value and returning, basis
The safety verification information judges that the step of whether abnormal transaction is Secure Transaction includes:
If receiving the transaction confirmation message and facility information and face that the application returns in preset duration threshold value
Image or voice messaging, then judge whether the facility information belongs to the information of credible equipment;
If the facility information belongs to the information of credible equipment, confirm that authentication passes through, determines the abnormal transaction
For Secure Transaction.
Optionally, it is described judge the step of whether facility information belongs to the information of credible equipment after, further includes:
If the facility information is not belonging to the information of credible equipment, by the facial image and facial image progress is prestored
It compares, or, extracting the vocal print feature of the voice messaging and the vocal print feature of extraction being compared with vocal print feature is prestored;
If the facial image prestores facial image with the People's Bank and matches, or, extract vocal print feature and prestore vocal print
Characteristic matching then confirms that authentication passes through, and determines that the abnormal transaction is Secure Transaction.Optionally, the air control strategy ginseng
Number includes transaction limit.
Optionally, whether the judgement receives the safety verification information that the application returns in preset duration threshold value
After step, further includes:
If receiving the safety verification information that the application returns after beyond preset time threshold, pushed away to the application
Deliver easily expired prompt information.
In addition, to achieve the above object, the present invention also provides a kind of interaction platform, the interaction platform include: memory,
Processor and it is stored in the abnormal transaction processing program that can be run on the memory and on the processor, it is described abnormal to hand over
The step of abnormal transaction processing method as described above is realized when easy to handle program is executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of computer readable storage mediums, which is characterized in that institute
It states and is stored with abnormal transaction processing program on computer readable storage medium, the exception transaction processing program is executed by processor
Shi Shixian as described above abnormal transaction processing method the step of.
The present invention provides a kind of abnormal transaction processing method, and interaction platform is in the offence air control for getting host system interception
When the abnormal transaction of strategy, the safety verification link traded extremely is generated, and determine and receive the safety verification link
Application, and by notification platform by the safety verification link be sent to the application;Judge be in preset duration threshold value
The no safety verification information for receiving the application and returning;If receiving the safety that the application returns in preset duration threshold value
Confirmation message then judges whether the abnormal transaction is Secure Transaction according to the safety verification information;If the abnormal transaction
For Secure Transaction, then the request for updating air control policing parameter is sent to host system;In the air control for receiving host system return
When policing parameter updates confirmation message, the prompt information of transaction is re-initiated to application push.The present invention is by building mutually
Moving platform automatically processes the abnormal transaction of offence air control strategy based on interaction platform, is not necessarily to personnel intervention, can mention
Treatment effeciency is risen, the time that client waits is reduced, to improve customer experience.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the abnormal transaction processing method first embodiment of the present invention;
Fig. 3 is the schematic diagram at the application display PUSH message interface that the present invention receives safety verification link;
Fig. 4 is the schematic diagram at the application display push detailed content interface that the present invention receives safety verification link;
Fig. 5 is the schematic diagram that interface is confirmed using display safety of payment that the present invention receives safety verification link;
Fig. 6 is the schematic diagram at the application display authentication interface that the present invention receives safety verification link;
Fig. 7 is the schematic diagram that interface is confirmed using display safety of payment that the present invention receives safety verification link;
Fig. 8 is that the application of present invention reception safety verification link shows the schematic diagram at expired time-out prompting interface;
Fig. 9 is the schematic diagram for repeating to submit prompting interface using display that the present invention receives safety verification link.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are: in the exception for the offence air control strategy for getting host system interception
When transaction, the safety verification link traded extremely is generated, and determine the application for receiving the safety verification link, and lead to
It crosses notification platform and safety verification link is sent to the application;Judge whether to receive in preset duration threshold value described
Using the safety verification information of return;If receiving the safety verification information that the application returns in preset duration threshold value,
Judge whether the abnormal transaction is Secure Transaction according to the safety verification information;If the abnormal transaction is Secure Transaction,
The request for updating air control policing parameter is then sent to host system;It is updated in the air control policing parameter for receiving host system return
When confirmation message, the prompt information of transaction is re-initiated to application push.
As shown in Figure 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The terminal of that embodiment of the invention carries interaction platform, can be the equipment such as PC, server.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU, communication bus 1002, user interface
1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is for realizing the connection communication between these components.
User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface
1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include that the wired of standard connects
Mouth, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory
(non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor
1001 storage device.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
Optionally, terminal shown in Fig. 1 can also include camera, RF (Radio Frequency, radio frequency) circuit,
Sensor, voicefrequency circuit, WiFi module etc..
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium
Believe module, Subscriber Interface Module SIM and abnormal transaction processing program.Wherein, in Fig. 1, network communication module is mainly used for connecting
Other equipment such as host system and notification platform, carry out data communication therewith;And processor 1001 can be used for calling memory
The abnormal transaction processing program stored in 1005, and execute following operation:
In the abnormal transaction of offence air control strategy for getting host system interception, the safety traded extremely is generated
Confirmation link, and determine the application for receiving the safety verification link, and the safety verification is linked by notification platform
It is sent to the application;
Judge the safety verification information that the application returns whether is received in preset duration threshold value;
If the safety verification information that the application returns is received in preset duration threshold value, according to the safety verification
Information judges whether the abnormal transaction is Secure Transaction;
If the abnormal transaction is Secure Transaction, the request for updating air control policing parameter is sent to host system;
When the air control policing parameter for receiving host system return updates confirmation message, sent out again to application push
Play the prompt information of transaction.
Further, processor 1001 can call the abnormal transaction processing program stored in memory 1005, also execute
It operates below:
The failed transactions that receiving host system intercepts;
According to the transaction record information that the failed transactions carry, offence air control strategy is obtained from the failed transactions
Abnormal transaction.
Further, processor 1001 can call the abnormal transaction processing program stored in memory 1005, also execute
It operates below:
It is linked based on the safety verification, establishes the interface channel with the application.
Further, the safety verification link includes trade confirmation request and authentication request, wherein the identity
Checking request includes credible equipment checking request and face verification request or voice print verification request.
Further, processor 1001 can call the abnormal transaction processing program stored in memory 1005, also execute
It operates below:
If receiving the transaction confirmation message and facility information and face that the application returns in preset duration threshold value
Image or voice messaging, then judge whether the facility information belongs to the information of credible equipment;
If the facility information belongs to the information of credible equipment, confirm that authentication passes through, determines the abnormal transaction
For Secure Transaction.
Further, processor 1001 can call the abnormal transaction processing program stored in memory 1005, also execute
It operates below:
If the facility information is not belonging to the information of credible equipment, by the facial image and facial image progress is prestored
It compares, or, extracting the vocal print feature of the voice messaging and the vocal print feature of extraction being compared with vocal print feature is prestored;
If the facial image prestores facial image with the People's Bank and matches, or, extract vocal print feature and prestore vocal print
Characteristic matching then confirms that authentication passes through, and determines that the abnormal transaction is Secure Transaction.
Further, the air control policing parameter includes transaction limit.
Further, processor 1001 can call the abnormal transaction processing program stored in memory 1005, also execute
It operates below:
If receiving the safety verification information that the application returns after beyond preset time threshold, pushed away to the application
Deliver easily expired prompt information.
Based on the hardware configuration of above-mentioned terminal, each embodiment of the abnormal transaction processing method of the present invention is proposed.
It is the flow diagram of the abnormal transaction processing method first embodiment of the present invention referring to Fig. 2, Fig. 2.
In the present embodiment, the application scenarios of the abnormal transaction processing method are bank and other financial mechanism, the present embodiment
It is illustrated by taking bank's scene as an example.The present invention builds an interaction platform, and the exception transaction processing method is by interaction platform
It realizes, the interaction platform docking host system and notification platform, wherein the host system is made of multiple servers, is
Control the core system of transaction;The notification platform be used for PUSH message, it is described exception transaction processing method the following steps are included:
Step S10 generates the abnormal friendship in the abnormal transaction for offending air control strategy for getting host system interception
Easy safety verification link, and determine the application for receiving the safety verification link, and pass through notification platform for the safety
Confirmation link is sent to the application;
In the present embodiment, risk control strategy is deployed in host system in advance, abbreviation air control strategy, air control strategy can
To be not understood as the control means of anti-fraudulent trading, for identifying fraudulent trading from the transaction accepted and being intercepted.Its
In, air control strategy is related to air control policing parameter, and air control policing parameter is air control quantizating index, and air control policing parameter includes turnover
Degree, account safety authentication data, logging device safety certification data etc..
In the present embodiment, when client applies (such as wechat, Alipay, bank APP) by the payment that mobile terminal is installed
The transaction request of submission or by using bank card, credit card and after the transaction request generated accepted, host system can be right
The transaction of client is audited, and audit means include but is not limited to risk control strategy, is audited unacceptable transaction and is then intercepted,
As failed transactions, that is to say, that failed transactions include but is not limited to offend the abnormal transaction of air control strategy, also include because of other
Reason leads to intercepted transaction.However, in the transaction intercepted because offending air control strategy, there may be the normal friendships of client
Easily, the present embodiment is by building interaction platform, provides a kind of mechanism and realizes the automatic place to trade extremely to offence air control strategy
Reason.
The failed transactions that host system intercepts can all be sent to interaction platform, wherein failed transactions carry transaction record
Information, the transaction record information include Fail Transaction reason.In the present embodiment, before step S10, interaction platform needs to receive
The failed transactions that host system intercepts mark off the abnormal transaction of offence air control strategy from failed transactions.Specifically, step
Before S10, may include:
The failed transactions that receiving host system intercepts;
According to the transaction record information that the failed transactions carry, offence air control strategy is obtained from the failed transactions
Abnormal transaction.
That is, interaction platform obtains the corresponding transaction record information of failed transactions, the friendship in transaction record information is then judged
Easily failure the reason is that it is no for offence air control strategy, for the Fail Transaction reason in transaction record information be offend air control strategy
Failed transactions, it is determined that for the abnormal transaction of offence air control strategy, mark off and from failed transactions.Interaction platform can be preparatory
Associative key, such as " air control ", " violation ", " offence " etc. are set, it is default by searching for whether there is in Fail Transaction reason
Keyword, to judge whether the Fail Transaction reason in transaction record information is offence air control strategy.
Interaction platform generates exception transaction pair when getting the abnormal transaction of offence air control strategy from failed transactions
The safety verification link answered, and, determine the application for receiving safety verification link.
In the present embodiment, corresponding bank APP account also can be open-minded simultaneously when client opens an account, in addition, what client opened
Bank card or credit card can also be bound in payment application (such as Alipay or wechat), and client can also directly pay close attention to
The wechat public platform of the bank of deposit, if client has carried out any one of aforesaid operations, host system or interaction platform
In be also just stored with the client account and bank APP, Alipay or wechat application ID incidence relation.Interaction platform can be with
According to the corresponding account of trading extremely, the application for receiving the safety verification traded extremely link is determined.For example, even if this is different
Often transaction is that client is generated by bankcard consumption, as long as client has paid close attention to the wechat public platform of the bank of deposit, and client is
The card is bound in wechat, passes through the account of the client, so that it may be determined as wechat to receive the application of safety verification link.
In step slo, to ensure transaction security, safety verification link includes that trade confirmation request and authentication are asked
It asks, which includes credible equipment checking request and face verification request or voice print verification request.It needs to illustrate
, at this point, interaction platform not with receive that the safety verification traded extremely link using establishing connection, interact as a result,
The ID that safety verification is linked and received the application of safety verification link by platform is thrown to notification platform, by notification platform according to this
ID links safety verification pushes to the application for receiving safety verification link in a manner of message.Safety verification link is sent to
After acting the application for receiving safety verification link, interaction platform can be linked by safety verification, be established true with reception safety
Recognize the interface channel between the application of link.
Step S20 judges the safety verification information that the application returns whether is received in preset duration threshold value;
Receive applying after receiving safety verification link for safety verification link, i.e., the equipment of equipment where acquiring it
Information, and if client safety verification link is responded in preset duration threshold value, that is, in preset duration threshold value
In application interface by a key clicking operation response transaction confirmation request, and the operation of face verification or voice print verification is carried out,
The payment affirmation message and collected facility information that the application of safety verification link can trigger one key of client are received, and
Facial image or voice messaging are back to interaction platform, wherein in the present embodiment, the payment affirmation that one key of client triggers is disappeared
Breath and collected facility information and facial image or voice messaging are referred to as safety verification information, that is, safety verification information
It may include payment affirmation message, facility information and facial image, also may include payment affirmation message, facility information and voice
Information.So interaction platform can receive in preset duration threshold value receives the safety that the application of safety verification link returns
Confirmation message, the preset duration threshold value be for the decision threshold for the timeliness that ensures to trade, can flexible setting according to the actual situation, than
Such as 60S, it is not construed as limiting herein.
Certainly, if interaction platform receives the application return for receiving safety verification link after beyond preset duration threshold value
Safety verification information, interaction platform confirms that the transaction is out of date, can not continue with, and answers to receive that safety verification links
With the prompt information that push transaction is expired.In addition, if interaction platform do not received in preset duration threshold value reception safety it is true
Recognize the safety verification information that the application of link returns, is then not responding to.
Step S30, if the safety verification information that the application returns is received in preset duration threshold value, according to
Safety verification information judges whether the abnormal transaction is Secure Transaction;
If interaction platform receives the safety for the application return for receiving safety verification link really in preset duration threshold value
Recognize information, then judges whether exception transaction is Secure Transaction according to the safety verification information.
Specifically, if interaction platform receives the transaction that the application for initiating to trade extremely returns in preset duration threshold value
Confirmation message and facility information and facial image or voice messaging, then judge whether the facility information returned belongs to credible set
Standby information confirms that authentication passes through, it is possible to determine that this is different if the facility information returned belongs to the information of credible equipment
Often transaction is Secure Transaction.If the facility information returned is not belonging to the information of credible equipment, by the facial image of return with
Facial image is prestored to be compared, or, extract return voice messaging vocal print feature and by the vocal print feature of extraction with prestore
Vocal print feature is compared, wherein and it is the user identity additional clause image saved when client opens an account that this, which prestores facial image,
This, which prestores vocal print feature, is extracted and preserved in the customer voice acquired when opening an account from client to increase account security, such as
The facial image that fruit returns is matched with facial image is prestored, or, the vocal print feature extracted is matched with vocal print feature is prestored, is then confirmed
Authentication passes through, it is possible to determine that transaction is Secure Transaction extremely for this.If return facial image and prestore facial image not
Matching, or the vocal print feature extracted are mismatched with vocal print feature is prestored, then confirm that authentication does not pass through, it is possible to determine that the exception
Transaction is fraudulent trading, and interaction platform is not responding to.
Step S40 sends to host system if the abnormal transaction is Secure Transaction and updates asking for air control policing parameter
It asks;
Interaction platform is if it is confirmed that it is Secure Transaction that this trades extremely, then to host system transmission update air control policing parameter
Request, that is, requesting host system relaxes air control quantizating index, for example request increases the transaction limit etc. of corresponding client.
Step S50 is pushed away when the air control policing parameter for receiving host system return updates confirmation message to the application
Send the prompt information for re-initiating transaction.
After host system receives the request of update air control policing parameter of interaction platform transmission, make a response, for right
Air control policing parameter is updated using family, and air control policing parameter update confirmation message is back to interaction platform.Interaction platform exists
When receiving the air control policing parameter update confirmation message of host system return, to receiving, the application push that safety verification links is heavy
The new prompt information for initiating transaction, for example " your complete transaction safety verification please pays this friendship again before same day 24:00
Easily, more security settings please go to security centre ".In this way, the transaction that user re-initiates, because host system has updated air control
Policing parameter can be passed through when carrying out the audit based on air control strategy, complete transaction.As a result, without staff's
Intervene, can be completed to offence air control strategy trade extremely automatically process, it is not only more convenient, and ensure safety,
Improve flexibility and timeliness.
To be best understood from the present embodiment, referring to Fig. 3, Fig. 4, Fig. 5, Fig. 6 and Fig. 7.
It trades if client belongs to the abnormal of offence air control strategy by the transaction that bank APP is initiated, notification platform
Bank APP will be pushed to comprising the message that safety verification links, as shown in figure 3, Fig. 3 is that bank APP shows PUSH message interface
Schematic diagram.Client can put open PUSH message, and the interface of bank APP will show push detailed content, that is, safety is really
Recognize link, as shown in figure 4, Fig. 4 is the schematic diagram at bank APP display push detailed content interface, client clicks in Fig. 4 and pushes in detail
After " trade confirmation " link of thin content, bank APP then shows that safety of payment confirms interface, as shown in figure 5, Fig. 5 is bank APP
Show the schematic diagram at safety of payment confirmation interface, in preset duration threshold value, client clicks " trade confirmation " key in Fig. 5
Afterwards, interaction platform can receive transaction confirmation message, while bank APP acquires the facility information of its place equipment and turns
Authentication interface is changed, as shown in fig. 6, Fig. 6 is the schematic diagram that bank APP shows authentication interface, client can be in Fig. 6
Carry out the operation of face verification or voice print verification, bank APP can collected client's facial image or voice messaging, and will
Collected facility information and client's facial image or voice messaging are back to interaction platform.When interaction platform is based on user
The transaction confirmation message and the collected facility information of bank APP and client's facial image or voice letter that the triggering of one key is submitted
Breath then sends the request for updating air control policing parameter when determining that abnormal transaction is Secure Transaction to host system;Receiving master
When the air control policing parameter that machine system returns updates confirmation message, Xiang Yinhang APP pushes the prompt information for re-initiating transaction, silver
Row APP, which is then shown, confirms successfully interface, including the prompt information for re-initiating transaction, as shown in fig. 7, Fig. 7 is bank APP
Show the schematic diagram at safety of payment confirmation interface.
In addition, referring to Fig. 8 and Fig. 9.
If interaction platform just receives the safety verification information of bank APP return after beyond preset duration threshold value, mutually
The moving platform prompt information expired to bank APP push transaction, Fig. 8 are that bank APP shows that expired time-out reminds the signal at interface
Figure.If client's repetition shows mentioning for repetition submission if the safety of payment confirmation interface progress confirmation operation of Fig. 5, bank APP
Show information, as shown in figure 9, Fig. 9 is that bank APP display repeats to submit the schematic diagram of prompting interface.
In the present embodiment, interaction platform is in the abnormal transaction of offence air control strategy for getting host system interception,
The safety verification link traded extremely is generated, and determines the application for receiving the safety verification link, and pass through notice
Safety verification link is sent to the application by platform;The safety verification link traded extremely is generated, and is determined
The application of the safety verification link is received, and safety verification link is sent to by the application by notification platform;Sentence
Break and whether receives the safety verification information that the application returns in preset duration threshold value;If being received in preset duration threshold value
The safety verification information returned to the application then judges whether the abnormal transaction is safety according to the safety verification information
Transaction;If the abnormal transaction is Secure Transaction, the request for updating air control policing parameter is sent to host system;It is receiving
When the air control policing parameter that host system returns updates confirmation message, the prompt letter of transaction is re-initiated to application push
Breath.The present embodiment automatically processes the abnormal transaction of offence air control strategy by building interaction platform, based on interaction platform,
Without personnel intervention, treatment effeciency can be promoted, the time that client waits is reduced, to improve customer experience.
Further, the second embodiment of the abnormal transaction processing method of the present invention is proposed based on first embodiment.
The difference of the first embodiment of the second embodiment and method of payment of abnormal transaction processing method is, the step
S30 may include:
If receiving the transaction confirmation message and facility information and face that the application returns in preset duration threshold value
Image or voice messaging, then judge whether the facility information belongs to the information of credible equipment;
If the facility information belongs to the information of credible equipment, confirm that authentication passes through, determines the abnormal transaction
For Secure Transaction;
If the facility information is not belonging to the information of credible equipment, by the facial image and facial image progress is prestored
It compares, or, extracting the vocal print feature of the voice messaging and the vocal print feature of extraction being compared with vocal print feature is prestored;
If the facial image prestores facial image with the People's Bank and matches, or, extract vocal print feature and prestore vocal print
Characteristic matching then confirms that authentication passes through, and determines that the abnormal transaction is Secure Transaction.
In the present embodiment, safety verification link is received when interaction platform judges whether to receive in preset duration threshold value
The safety verification information that returns of application after, initiate to trade extremely if interaction platform receives in preset duration threshold value
Using the transaction confirmation message and facility information and facial image or voice messaging of return, then the facility information returned is judged
Whether belong to the information of credible equipment, if the facility information returned belongs to the information of credible equipment, confirms that authentication is logical
It crosses, it is possible to determine that transaction is Secure Transaction extremely for this.
If the facility information returned is not belonging to the information of credible equipment, by the facial image of return and face figure is prestored
As being compared, or, extract the vocal print feature of the voice messaging returned and by the vocal print feature of extraction and prestore vocal print feature into
Row compares, wherein it is the user identity additional clause image saved when client opens an account that this, which prestores facial image, this prestores vocal print
It is characterized in being extracted and preserved in the customer voice that acquires when opening an account from client to increase account security, when the face of return
Image and when prestoring the similarity compared between facial image and reaching the first default similarity threshold, or, when the vocal print extracted is special
When levying and prestore the similarity compared between vocal print feature and reaching the second default similarity threshold, then confirm that authentication is logical
It crosses, it is possible to determine that transaction is Secure Transaction extremely for this.When return facial image to prestore compared between facial image it is similar
Default first similarity threshold is not achieved in degree, or, working as the vocal print feature extracted and prestoring the phase compared between vocal print feature
When the second default similarity threshold is not achieved like degree, then confirm that authentication does not pass through, it is possible to determine that transaction is fraud extremely for this
Transaction, interaction platform are not responding to.Wherein, which is the pre-set similarity critical value of interaction platform
(for example being set as 90%) is defined as same people greater than critical value, is then different people, specific facial image less than critical value
Comparison process can refer to existing face image comparison technology, and details are not described herein again;The second default similarity threshold is interaction
The pre-set similarity critical value (for example being set as 85%) of platform, is defined as same sound greater than critical value, is less than critical
Value is then different sound.Specific vocal print feature comparison process can refer to existing vocal print feature comparison technology, herein no longer
It repeats.
It in the present embodiment, include that trade confirmation is requested in the safety verification link that interaction platform is generated for abnormal transaction
And authentication request, key triggering is carried out for client and submits transaction confirmation message, and carries out face verification or voice print verification
Operation, while receive safety verification link application can also acquire facility information, interaction platform can be based on facility information, people
Face verifying or voice print verification carry out the confirmation of client identity, thus in conjunction with transaction confirmation message, it is ensured that the safety of transaction.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium.
Abnormal transaction processing program, the exception trading processing journey are stored on institute's computer readable storage medium of the present invention
Following operation is realized when sequence is executed by processor:
The failed transactions that receiving host system intercepts, and the exception for offending air control strategy is marked off from the failed transactions
Transaction;
The safety verification link traded extremely is generated, and determines the application for receiving the safety verification link, and
Safety verification link is sent to the application by notification platform;
Judge the safety verification information that the application returns whether is received in preset duration threshold value;
If the safety verification information that the application returns is received in preset duration threshold value, according to the safety verification
Information judges whether the abnormal transaction is Secure Transaction;
If the abnormal transaction is Secure Transaction, the request for updating air control policing parameter is sent to host system;
When the air control policing parameter for receiving host system return updates confirmation message, sent out again to application push
Play the prompt information of transaction.
The specific embodiment of computer readable storage medium of the present invention and above-mentioned application software security flaw detection method are each
Embodiment is essentially identical, and therefore not to repeat here.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone,
Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of exception transaction processing method, which is characterized in that the method is applied to interaction platform, and the method includes following
Step:
In the abnormal transaction of offence air control strategy for getting host system interception, the safety verification traded extremely is generated
Link, and determine the application for receiving the safety verification link, and the safety verification chain is received and sent by notification platform
To the application;
Judge the safety verification information that the application returns whether is received in preset duration threshold value;
If the safety verification information that the application returns is received in preset duration threshold value, according to the safety verification information
Judge whether the abnormal transaction is Secure Transaction;
If the abnormal transaction is Secure Transaction, the request for updating air control policing parameter is sent to host system;
When the air control policing parameter for receiving host system return updates confirmation message, friendship is re-initiated to application push
Easy prompt information.
2. exception transaction processing method as described in claim 1, which is characterized in that described to get host system interception
When offending the abnormal transaction of air control strategy, the safety verification link traded extremely is generated, and determine and receive the safety
Before the step of confirming the application of link, comprising:
The failed transactions that receiving host system intercepts;
According to the transaction record information that the failed transactions carry, the exception of offence air control strategy is obtained from the failed transactions
Transaction.
3. exception transaction processing method as described in claim 1, which is characterized in that it is described by notification platform by the safety
After the step of confirmation link is sent to the application, comprising:
It is linked based on the safety verification, establishes the interface channel with the application.
4. exception transaction processing method as described in claim 1, which is characterized in that the safety verification link includes that transaction is true
Recognize request and authentication request, wherein the authentication request includes that credible equipment checking request and face verification are asked
It asks or voice print verification is requested.
5. exception transaction processing method as claimed in claim 4, which is characterized in that if described receive in preset duration threshold value
The safety verification information returned to the application then judges whether the abnormal transaction is safety according to the safety verification information
The step of transaction includes:
If receiving the transaction confirmation message and facility information and facial image that the application returns in preset duration threshold value
Or voice messaging, then judge whether the facility information belongs to the information of credible equipment;
If the facility information belongs to the information of credible equipment, confirm that authentication passes through, determines that the abnormal transaction is peace
Full transaction.
6. exception transaction processing method as claimed in claim 5, which is characterized in that described to judge whether the facility information belongs to
After in the information of credible equipment the step of, further includes:
If the facility information is not belonging to the information of credible equipment, the facial image is compared with facial image is prestored
It is right, or, extracting the vocal print feature of the voice messaging and the vocal print feature of extraction being compared with vocal print feature is prestored;
If the facial image prestores facial image with the People's Bank and matches, or, extract vocal print feature and prestore vocal print feature
Matching, then confirm that authentication passes through, and determines that the abnormal transaction is Secure Transaction.
7. exception transaction processing method as described in claim 1, which is characterized in that the air control policing parameter includes turnover
Degree.
8. exception transaction processing method as described in claim 1, which is characterized in that the judgement is in preset duration threshold value
After no the step of receiving the safety verification information that the application returns, further includes:
If receiving the safety verification information that the application returns after beyond preset time threshold, pushes and hand over to the application
Easily expired prompt information.
9. a kind of interaction platform, which is characterized in that the interaction platform includes: memory, processor and is stored in the storage
On device and the abnormal transaction processing program that can run on the processor, the exception transaction processing program is by the processor
It is realized when execution such as the step of abnormal transaction processing method described in any item of the claim 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with abnormal friendship on the computer readable storage medium
Easy to handle program, the exception transaction processing program are realized when being executed by processor as described in any item of the claim 1 to 8
The step of abnormal transaction processing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811085079.7A CN109978317A (en) | 2018-09-17 | 2018-09-17 | Abnormal transaction processing method, interaction platform and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811085079.7A CN109978317A (en) | 2018-09-17 | 2018-09-17 | Abnormal transaction processing method, interaction platform and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109978317A true CN109978317A (en) | 2019-07-05 |
Family
ID=67075999
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811085079.7A Pending CN109978317A (en) | 2018-09-17 | 2018-09-17 | Abnormal transaction processing method, interaction platform and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109978317A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110400147A (en) * | 2019-07-23 | 2019-11-01 | 阿里巴巴集团控股有限公司 | A kind of exception delivery operation hold-up interception method, system and equipment |
CN111770093A (en) * | 2020-06-29 | 2020-10-13 | 深圳前海微众银行股份有限公司 | Transaction monitoring decision method, device, equipment and computer readable storage medium |
CN112685774A (en) * | 2020-12-30 | 2021-04-20 | 曹凤仙 | Payment data processing method based on big data and block chain finance and cloud server |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120157042A1 (en) * | 2010-12-20 | 2012-06-21 | Boku, Inc. | Systems and Methods to Accelerate Transactions Based on Predictions |
CN104867011A (en) * | 2014-02-21 | 2015-08-26 | 中国电信股份有限公司 | Method and device for carrying out safety control on mobile payment |
CN105654300A (en) * | 2015-04-27 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Payment abnormity processing method and apparatus thereof |
CN106709730A (en) * | 2016-12-30 | 2017-05-24 | 深圳天珑无线科技有限公司 | Bio-feature identification-based transaction method and apparatus |
CN106936792A (en) * | 2015-12-30 | 2017-07-07 | 卓望数码技术(深圳)有限公司 | Safety certifying method and system and the mobile terminal for safety certification |
CN108062629A (en) * | 2017-12-26 | 2018-05-22 | 平安科技(深圳)有限公司 | Processing method, terminal device and the medium of transaction event |
-
2018
- 2018-09-17 CN CN201811085079.7A patent/CN109978317A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120157042A1 (en) * | 2010-12-20 | 2012-06-21 | Boku, Inc. | Systems and Methods to Accelerate Transactions Based on Predictions |
CN104867011A (en) * | 2014-02-21 | 2015-08-26 | 中国电信股份有限公司 | Method and device for carrying out safety control on mobile payment |
CN105654300A (en) * | 2015-04-27 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Payment abnormity processing method and apparatus thereof |
CN106936792A (en) * | 2015-12-30 | 2017-07-07 | 卓望数码技术(深圳)有限公司 | Safety certifying method and system and the mobile terminal for safety certification |
CN106709730A (en) * | 2016-12-30 | 2017-05-24 | 深圳天珑无线科技有限公司 | Bio-feature identification-based transaction method and apparatus |
CN108062629A (en) * | 2017-12-26 | 2018-05-22 | 平安科技(深圳)有限公司 | Processing method, terminal device and the medium of transaction event |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110400147A (en) * | 2019-07-23 | 2019-11-01 | 阿里巴巴集团控股有限公司 | A kind of exception delivery operation hold-up interception method, system and equipment |
CN111770093A (en) * | 2020-06-29 | 2020-10-13 | 深圳前海微众银行股份有限公司 | Transaction monitoring decision method, device, equipment and computer readable storage medium |
CN111770093B (en) * | 2020-06-29 | 2023-03-24 | 深圳前海微众银行股份有限公司 | Transaction monitoring decision method, device, equipment and computer readable storage medium |
CN112685774A (en) * | 2020-12-30 | 2021-04-20 | 曹凤仙 | Payment data processing method based on big data and block chain finance and cloud server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113168637B (en) | Method and system for secondary fraud detection during transaction verification | |
US20220180231A1 (en) | Processing Machine Learning Attributes | |
CN108352022B (en) | System and method for monitoring computer authentication programs | |
CN106506524A (en) | Method and apparatus for verifying user | |
CN104660557B (en) | operation processing method and device | |
WO2019100607A1 (en) | Voice recognition-based transaction method, server and computer readable storage medium | |
CN101916478A (en) | Method for automatically acquiring, verifying and inputting dynamic password in normal short message by client | |
KR20180113229A (en) | Loan service providing method using black chain and system performing the same | |
US11494777B2 (en) | Enriching transaction request data for maintaining location privacy while improving fraud prevention systems on a data communication network with user controls injected to back-end transaction approval requests in real-time with transactions | |
US20220237603A1 (en) | Computer system security via device network parameters | |
CN109978317A (en) | Abnormal transaction processing method, interaction platform and computer readable storage medium | |
CN115398457A (en) | System and method for evaluating digital interactions using a digital third party account service | |
CN111754237B (en) | Verification method and device for transfer transaction | |
CN106529955A (en) | Payment method and device | |
CN107169753A (en) | Transfer account method, device and computer-readable recording medium | |
US20230020968A1 (en) | Systems and methods for verifying digital payments | |
US20240311839A1 (en) | Fraud detection and prevention system | |
US20240211935A1 (en) | Secure Transactions Over Communications Sessions | |
EP3906473A1 (en) | Computer and conduit for system testing | |
CN108550017B (en) | Consumption finance core system based on SAAS platform | |
CN114626719A (en) | Network appointment platform risk assessment method, equipment and storage medium | |
CN109426961B (en) | Card binding risk control method and device | |
CN116703395B (en) | Digital RMB payment method, device, equipment, system and medium | |
KR20190009862A (en) | Method and device for providing authentication service using mobile terminal | |
CN106373012A (en) | Financing product transaction control method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |