CN110009322A - Auth method and device in transfer procedure - Google Patents

Auth method and device in transfer procedure Download PDF

Info

Publication number
CN110009322A
CN110009322A CN201811588868.2A CN201811588868A CN110009322A CN 110009322 A CN110009322 A CN 110009322A CN 201811588868 A CN201811588868 A CN 201811588868A CN 110009322 A CN110009322 A CN 110009322A
Authority
CN
China
Prior art keywords
beneficiary
information
client
paying party
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811588868.2A
Other languages
Chinese (zh)
Inventor
李亚龙
郑淇公
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811588868.2A priority Critical patent/CN110009322A/en
Publication of CN110009322A publication Critical patent/CN110009322A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This specification embodiment provides the auth method and device in a kind of transfer procedure, pass through triple verifyings to beneficiary identity information, dynamic verification code and remark information of transferring accounts, it avoids existing scheme and the risk unilaterally verified is made by requestee completely, effectively reduce mistake and transfer accounts and cause monetary losses risk.

Description

Auth method and device in transfer procedure
Technical field
This specification is related to auth method and device in technical field of data processing more particularly to transfer procedure.
Background technique
Transfer accounts (transfer of account), refers to not directly using cash, but by bank by fund from payment Account transfers a kind of bank money clearing form that collecting account completes currency receipt and payment.In user's transfer procedure, for one Determine in degree guarantee beneficiary Receiving information it is correct, avoid paying party due to filling out wrong information caused by monetary losses, it is necessary to Authentication is carried out to beneficiary.
Summary of the invention
Based on this, present description provides the auth methods and device in transfer procedure.
According to this specification embodiment in a first aspect, providing the auth method in a kind of transfer procedure, the side Method includes:
Receive the transfer request that paying party client is sent, carry in the transfer request collecting account information, transfer accounts it is standby Infuse the contact information of information and beneficiary;
The transfer request is responded, to send dynamic verification code to the corresponding communication account of the contact information, and Authentication request is sent to beneficiary client;
If the beneficiary body for receiving authentication request described in beneficiary client end response within a preset time and returning Part information, dynamic verification code and remark information of transferring accounts, and beneficiary identity information, dynamic verification code and remarks of the transferring accounts letter returned Breath is verified, and determines beneficiary authentication success.
Optionally, the method also includes:
If the identity information that the beneficiary client returns matches with the identity information prestored, determine that identity information is tested Card passes through;And/or
If the dynamic verification code that the beneficiary client returns and the dynamic verification code one sent to the communication account It causes, determines that dynamic verification code is verified;And/or
If the remark information of transferring accounts of the transfer accounts remark information and the transmission of paying party client of the beneficiary client return Unanimously, determine that remark information of transferring accounts is verified.
Optionally, the method also includes:
If not receiving identity information, dynamic verification code and the remarks of transferring accounts of the return of beneficiary client within a preset time In information at least any one, determine beneficiary authentication failure.
Optionally, the method also includes:
If beneficiary authentication fails, authentication failure is sent to paying party client and/or beneficiary client Prompt information.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain the account risk information of paying party client and/or beneficiary client in historical time section;
If there are transaction risk and/or beneficiaries for the account risk information instruction paying party client of paying party client The account risk information instruction beneficiary client of client there are transaction risk, to paying party client send to beneficiary into The prompt information of row authentication.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain the current network environment information of paying party client;
If there are security risks for the current network environment of the network environment information instruction paying party client, to paying party Client sends the prompt information that authentication is carried out to beneficiary.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain transfer amounts;
If the transfer amounts are greater than preset amount of money threshold value, are sent to paying party client and beneficiary progress identity is tested The prompt information of card.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain the identity information of beneficiary;
The identity information of paying party is verified.
According to the second aspect of this specification embodiment, the authentication means in a kind of transfer procedure, the dress are provided It sets and includes:
Receiving module carries gathering account for receiving the transfer request of paying party client transmission in the transfer request The contact information of family information, transfer accounts remark information and beneficiary;
Sending module, for responding the transfer request, to be sent to the corresponding communication account of the contact information Dynamic verification code, and authentication request is sent to beneficiary client;
Authentication module, if being returned for receiving authentication request described in beneficiary client end response within a preset time Beneficiary identity information, dynamic verification code and the remark information of transferring accounts returned, and beneficiary identity information, the dynamic verification code returned Remark information is verified with transferring accounts, and determines beneficiary authentication success.
According to the third aspect of this specification embodiment, a kind of computer readable storage medium is provided, is stored thereon with meter Calculation machine program realizes method described in power any embodiment when the program is executed by processor.
According to the fourth aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, the processor realizes any reality when executing described program Apply method described in example.
Using this specification example scheme, by beneficiary identity information, dynamic verification code and remark information of transferring accounts Triple verifyings, avoid existing scheme and the risk unilaterally verified made by requestee completely, effectively reduce mistake and transfer accounts and make At monetary losses risk.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not This specification can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the reality for meeting this specification Example is applied, and is used to explain the principle of this specification together with specification.
Fig. 1 is the application scenarios schematic diagram of this specification one embodiment.
Fig. 2 is the auth method flow chart in the transfer procedure of this specification one embodiment.
Fig. 3 (a) and Fig. 3 (b) is the schematic diagram at the interface of transferring accounts of the paying party client of this specification one embodiment.
Fig. 4 is the schematic diagram at the authentication interface of the beneficiary client of this specification one embodiment.
Fig. 5 is the timing diagram of the auth method in the transfer procedure of this specification one embodiment.
Fig. 6 is the block diagram of the authentication means in the transfer procedure of this specification one embodiment.
Fig. 7 is the structural representation of the computer equipment for implementing this specification method of this specification one embodiment Figure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... " or " in response to determination ".
It include payment visitor in the application scenarios as shown in Figure 1, being the application scenarios schematic diagram of this specification one embodiment Family end, gathering client and server.Wherein, payment client is the client that paying party uses, and beneficiary client is to receive The client that money side uses, wherein client can be the tool such as Alipay client, wechat client, Web bank's client There is the client of payment by the transfer of accounts function.Beneficiary and paying party can be natural person, be also possible to enterprise or organization etc. Group.Respective Account Logon client, in transfer procedure, paying party client can be respectively adopted in paying party and beneficiary Transfer request can be sent to the server of payment system can be from Send only Account after server receives transfer request The assets of the corresponding amount of money are deducted, and the assets of deduction are transferred to collecting account.Server can also record the money in transfer procedure Golden transition information, and update the remaining sum of collecting account and Send only Account.Further, server can also be with paying party client It is communicated with beneficiary client, to realize various data interactions and the control function in transfer procedure.
It should be understood that above-mentioned application scenarios are the adoptable one of application scenarios of this specification embodiment, It is not intended as the restriction to this specification embodiment.
Based on this, this specification embodiment provides the auth method in a kind of transfer procedure, as shown in Fig. 2, described Method can include:
Step 202: receiving the transfer request that paying party client is sent, collecting account letter is carried in the transfer request It ceases, the contact information of transfer accounts remark information and beneficiary;
Step 204: responding the transfer request, tested with sending dynamic to the corresponding communication account of the contact information Code is demonstrate,proved, and sends authentication request to beneficiary client;
Step 206: if receiving authentication request described in beneficiary client end response within a preset time and returning Beneficiary identity information, dynamic verification code and remark information of transferring accounts, and return beneficiary identity information, dynamic verification code and turn Account remark information is verified, and determines beneficiary authentication success.
This specification embodiment can the server in application scenarios as shown in Figure 1 execute.In step 202, server It can receive the transfer request of paying party client transmission, the transfer request is for paying party client request to beneficiary client End carry out authentication, the information to ensure beneficiary is correct, avoid paying party due to filling out wrong beneficiary information caused by money Gold loss.
The contact information of collecting account information, transfer accounts remark information and beneficiary can be carried in transfer request.Its In, collecting account information may include the information that account name or account ID of collecting account etc. are used for unique identification collecting account. Remark information of transferring accounts can be the information that beneficiary and paying party have been made an appointment by other communications conduits, for example, for branch It pays treasured to transfer accounts, remark information of transferring accounts can be made an appointment with beneficiary by channels such as phones or short message by paying party.The letter Breath can be in short, is also possible to a picture, can also be other kinds of information;Correspondingly, paying party client can With in the form of text, graphic form or the extended formatting remark information that will transfer accounts be uploaded to server.In practical applications, it transfers accounts standby Note information can be used for recording reason of transferring accounts, in this way, on the one hand beneficiary client and paying party client can be made clearly to turn On the other hand account reason can also play the role of carrying out authentication to beneficiary.The contact information of beneficiary can be with Including but not limited at least one of information such as the cell-phone number of beneficiary, E-mail address, nail nail account.
Fig. 3 (a) and Fig. 3 (b) is the schematic diagram at the interface of transferring accounts of the paying party client of this specification one embodiment.Such as Shown in Fig. 3 (a), it may include that beneficiary account obtains entrance and contact method obtains entrance on interface of transferring accounts, be respectively used to pay the bill Side's input beneficiary account and beneficiary contact method.Transferring accounts may also include remark information of transferring accounts on interface and obtains entrance, if turning Account remark information is text information, then remark information of transferring accounts can be inputted directly in text box;If remark information of transferring accounts is figure The information such as piece can then click the "+" uploading pictures on the right side of text box.User may choose whether using three-factor authentication, such as Fruit uses, the choice box before can choosing on interface " three-factor authentication ", then clicks in next step.As shown in Fig. 3 (b), user Transfer amounts can be inputted on the surface, then click confirmation.It should be noted that above-mentioned interface is by way of example only, and The non-restriction as to this specification embodiment.For example, remark information of transferring accounts can also be as user interface shown in Fig. 3 (b) Upper input.
In step 204, server can generate dynamic verification code with the transfer request in response of step 202, this is dynamically tested Card code can be randomly generated, what the rule for being also possible to be pre-established according to certain generated.In practical applications, it dynamically tests Card code can be the character identifying code including several characters, such as: 6 bit digital identifying codes;It is also possible to picture verifying Code or gesture identifying code etc..The dynamic verification code of generation can be sent in step 202 by paying party client by server The corresponding communication account of the contact information of the beneficiary of offer, so that beneficiary be allow to read dynamic from communication account Identifying code is used for authentication.If contact information is cell-phone number, corresponding communication account is short message account;If correspondent party Formula information is email address, then corresponding communication account is email accounts.Server can be asked with transferring accounts in response of step 202 It asks to beneficiary client and sends authentication request, authentication request obtains the authentication letter of beneficiary for server Breath, to carry out authentication to beneficiary.
In practical applications, server can first send dynamic verification code, retransmit authentication request;It can also first send out Authentication request is sent, dynamic verification code is retransmited;Authentication request and dynamic verification code can also be sent simultaneously, herein not It limits.In one embodiment, server can also be after having sent authentication request and dynamic verification code, can be with Start timing.
In step 206, beneficiary client can be returned to server and be collected money after receiving authentication request Square identity information, dynamic verification code and remark information of transferring accounts.Wherein, beneficiary identity information is for checking collecting account holder Whether it is me, avoids criminal from usurping collecting account and falsely claim as one's own assets of transferring accounts, beneficiary identity information may include but be not limited to It is at least any below: payment cipher, beneficiary finger print information, beneficiary face information etc..Dynamic verification code can be by beneficiary Beneficiary client is read and is input to, from communication account so that dynamic verification code is committed to service by beneficiary client Device.The purpose for submitting dynamic verification code is that whether the beneficiary information that inspection paying party is filled in is correct, and checks again for gathering account Whether family holder is me.Remark information of transferring accounts is the information that beneficiary and paying party are made an appointment, wherein may include using In the information for characterizing reason of transferring accounts, the purpose of this step is to check receipt and payment both sides with the presence or absence of supply-demand relationship of transferring accounts, and gathering Whether people clearly knows this purpose transferred accounts.
Fig. 4 is the schematic diagram at the authentication interface of the beneficiary client of this specification one embodiment.Such as Fig. 4 institute Show, may include the identification card number acquisition entrance of beneficiary on authentication interface, finger print information obtains entrance, dynamic verification code It obtains entrance and remark information of transferring accounts obtains entrance.
In one embodiment, if the identity information of beneficiary client return and the identity information phase prestored Match, determines that identity information is verified.In another embodiment, if the beneficiary client return dynamic verification code with The dynamic verification code sent to the communication account is consistent, determines that dynamic verification code is verified.In another embodiment, if The remark information of transferring accounts that the beneficiary client returns is consistent with the remark information of transferring accounts that paying party client is sent, and determines to turn Account remark information is verified.
It is appreciated that server is held to what beneficiary identity information, dynamic verification code and remark information of transferring accounts were verified Row sequence can carry out in any order, for example, beneficiary identity information can be verified first, then verify dynamic verification code, most Remark information of transferring accounts is verified afterwards;Dynamic verification code can also be first verified, then verifies beneficiary identity information, finally verifying is transferred accounts standby Infuse information;Or it is sequentially verified using other.
If the beneficiary body for receiving authentication request described in beneficiary client end response within a preset time and returning Part information, dynamic verification code and remark information of transferring accounts, and beneficiary identity information, dynamic verification code and remarks of the transferring accounts letter returned It ceases triple verifyings to be verified, determines beneficiary authentication success.Conversely, if not in preset time (for example, 30 minutes) Inside receive the identity information of beneficiary client return, in dynamic verification code and remark information of transferring accounts at least any one, Determine beneficiary authentication failure.It is lost at this point it is possible to send authentication to paying party client and/or beneficiary client Lose prompt information.Meanwhile this cancellation of transferring accounts, fund is retracted and advice and pay people.
Above-mentioned triple verification process are option, and requestee can bear energy according to transfer amounts, risk when initiating to transfer accounts Power and payee's situation voluntarily choose whether to open all the elements or partial content of triple verifyings.
In one embodiment, before receiving the transfer request that paying party client is sent, paying party can also be obtained The account risk information of client and/or beneficiary client in historical time section;If the account risk of paying party client Information indicates paying party client, and there are the account risk information of transaction risk and/or beneficiary client instruction beneficiary visitors There are transaction risks at family end, and the prompt information that authentication is carried out to beneficiary is sent to paying party client.
Wherein, historical time section can be set according to actual needs, for example, can be set to 1 week, 1 month equal time.Account Family risk information can be used for indicating account in historical time section with the presence or absence of transaction risk (i.e. security risk).Account risk letter It may include the historical transactional information of account in breath, right in the historical operation information and/or historical time section executed to account Account carries out the network identity identification information of input when authentication.Wherein, historical transactional information is for indicating account in history With the presence or absence of abnormal transaction in period, abnormal transaction can be the transaction reported or complained, or hidden with there is safety The transaction etc. that the account of trouble carries out.The historical operation information executed to account may include logon account, publish account, using account The information such as assets, for indicating account with the presence or absence of stolen risk.For example, account is in a short time continuously in different IP Address repeatedly logs in or up to a hundred transaction etc. occur within the short time (for example, 1 day) for account, indicates that account is probably deposited In stolen risk.Network identity identification information is stolen risk for characterizing account.Network identity identification information may include account Name in an account book, the account pet name, email address and with aforementioned related password and cryptoguard problem and answer etc..For real-name authentication mistake Account, can also include and the information such as identity card, passport or driver's license of account binding.If user exists in historical time section The number of the network identity identification information of input error is more than preset frequency threshold value when carrying out authentication to account, then it represents that There are certain accounts to be stolen risk.
The present embodiment can the security risk according to existing for paying party client and/or beneficiary client come present the bill for payment Square client selects safer triple verification modes, when security risk is higher, then sends to paying party client to receipts Money side carries out the prompt information of authentication, improves the safety of transfer procedure.
In one embodiment, before receiving the transfer request that paying party client is sent, paying party can also be obtained The current network environment information of client;If the current network environment of the network environment information instruction paying party client exists Security risk sends the prompt information that authentication is carried out to beneficiary to paying party client.
Wherein, network environment information may include for characterizing the network type letter that network is public network or home network Breath and/or the information etc. whether once reported for characterizing network ip address.If paying party client it is currently employed be public Common network network and/or current network IP address are once reported, then it represents that there are certain risks for the network environment of paying party, therefore, can To send the prompt information for carrying out authentication to beneficiary to paying party client.
The present embodiment can select more according to the network environment information of paying party client come present the bill for payment side's client Triple verification modes of safety then send to paying party client and carry out to beneficiary when network environment security risk is higher The prompt information of authentication improves the safety of transfer procedure.
In one embodiment, before receiving the transfer request that paying party client is sent, gold of transferring accounts can also be obtained Volume;If the transfer amounts are greater than preset amount of money threshold value, are sent to paying party client and authentication is carried out to beneficiary Prompt information.Wherein, amount of money threshold value can be by paying party sets itself.It, can be to if transfer amounts are greater than preset amount of money threshold value Paying party client send to beneficiary carry out authentication prompt information, to avoid because mistake transfer accounts caused by paying party weight Big loss.
It further, can be simultaneously according to above-mentioned account risk information, network environment information and transfer amounts come to paying party Client sends the prompt information that authentication is carried out to beneficiary.Specifically, if account risk information instruction paying party visitor There are transaction risk or the network environment information current network environments of instruction paying party client at family end there are security risk, Or transfer amounts are greater than preset amount of money threshold value, then the prompt that authentication is carried out to beneficiary is sent to paying party client Information.
In one embodiment, before receiving the transfer request that paying party client is sent, beneficiary can also be obtained Identity information;The identity information of paying party is verified.Paying party identity information may include but be not limited to following at least appoint One: payment cipher, paying party finger print information, paying party face information etc..By carrying out authentication to paying party, can be confirmed Paying party identity avoids other people from usurping paying party account and transfers accounts.Only after confirming paying party identity, just execute subsequent The operation for carrying out authentication in transfer procedure to beneficiary, improves account transfer safety.
As shown in figure 5, being the timing diagram of the auth method in the transfer procedure of this specification one embodiment, can wrap Include following steps:
Step 502: paying party and beneficiary negotiate transfer accounts reason and transfer amounts.
Negotiate after completing in step 504, execute step 506 and step 508: paying party is filled out in paying party client Write beneficiary account, beneficiary contact method, transfer amounts and remark information of transferring accounts.Execution sequence is not limited to first carry out step 506, then step 508 is executed, details are not described herein again.
In step 510, paying party chooses triple verifying switches in paying party client.
Step 512: payment direction server submits transfer request.
Step 514: server sends advice of collection to beneficiary client.
Step 516: server sends dynamic verification code to beneficiary communication account.Execution sequence is not limited to first carry out step 514, then step 516 is executed, details are not described herein again.
Step 518: starting gathering verifying.Step 518a to step 518f is specifically included, in step 518a, server is wanted Ask beneficiary client executing authentication;In step 518c, server requirement beneficiary client executing dynamic verification code Verifying;In step 518e, server requirement beneficiary client executing transfer accounts remarks verifying.If completing body in step 518b Part verifying, in step 518d complete dynamic verification code verifying, and in step 518f complete transfer accounts remark information verifying, then hold Row step 518g, that is, transfer accounts to collecting account and beat money.
This specification embodiment is comprehensive raw using password authentification, living body by the triple verifyings newly-increased in beneficiary side A variety of verifying means such as object identification technology, dynamic verification code and traditional contract, effectively ensure money transfer safety, avoid The risk that existing scheme is unilaterally verified by paying party completely effectively reduces wrong transfer accounts and causes the wind of monetary losses Danger.The verifying movement of beneficiary is alternatively arranged as confirming the legal argument for validity of transferring accounts, and when there is dispute over obligation, sufficiently ensures The legitimate rights and interests of both sides.
Various technical characteristics in above embodiments can be arbitrarily combined, as long as there is no punchings for the combination between feature Prominent or contradiction, but as space is limited, is not described one by one, thus the various technical characteristics in above embodiment it is any into Row combination also belongs to the range of this disclosure.
As shown in fig. 6, being the authentication means in the transfer procedure of this specification one embodiment, described device packet It includes:
Receiving module 602 carries gathering in the transfer request for receiving the transfer request of paying party client transmission The contact information of account information, transfer accounts remark information and beneficiary;
Sending module 604, for responding the transfer request, to be sent out to the corresponding communication account of the contact information Dynamic verification code is sent, and sends authentication request to beneficiary client;
Authentication module 606, if for receiving authentication request described in beneficiary client end response within a preset time And return beneficiary identity information, dynamic verification code and remark information of transferring accounts, and return beneficiary identity information, dynamically test Card code and remark information of transferring accounts are verified, and determine beneficiary authentication success.
The specific details of the realization process of the function of modules and effect, which are shown in, in above-mentioned apparatus corresponds to step in the above method Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The module of explanation may or may not be physically separated, and the component shown as module can be or can also be with It is not physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to actual The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not In the case where making the creative labor, it can understand and implement.
The embodiment of this specification device can be applied on a computing device, such as server or intelligent terminal.Device Embodiment can also be realized by software realization by way of hardware or software and hardware combining.Taking software implementation as an example, As the device on a logical meaning, being will be corresponding in nonvolatile memory by the processor of file process where it Computer program instructions are read into memory what operation was formed.For hardware view, as shown in fig. 7, being this specification device A kind of hardware structure diagram of place computer equipment, in addition to processor 702 shown in Fig. 7, memory 704, network interface 706, with And except nonvolatile memory 708, server or electronic equipment in embodiment where device are set generally according to the computer Standby actual functional capability can also include other hardware, repeat no more to this.
Correspondingly, this specification embodiment also provides a kind of computer storage medium, is stored with journey in the storage medium Sequence realizes the method in any of the above-described embodiment when described program is executed by processor.
Correspondingly, this specification embodiment also provides a kind of computer equipment, including memory, processor and is stored in On reservoir and the computer program that can run on a processor, the processor realize any of the above-described implementation when executing described program Method in example.
It wherein includes storage medium (the including but not limited to disk of program code that the application, which can be used in one or more, Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium packet Permanent and non-permanent, removable and non-removable media is included, can be accomplished by any method or technique information storage.Letter Breath can be computer readable instructions, data structure, the module of program or other data.The example packet of the storage medium of computer Include but be not limited to: phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), Other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices or any other non-biography Defeated medium, can be used for storage can be accessed by a computing device information.
Those skilled in the art will readily occur to the disclosure after considering specification and practicing specification disclosed herein Other embodiments.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes Or adaptive change follow the general principles of this disclosure and including the disclosure it is undocumented in the art known in often Knowledge or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim point out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
The foregoing is merely the preferred embodiments of the disclosure, not to limit the disclosure, all essences in the disclosure Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of disclosure protection.

Claims (11)

1. the auth method in a kind of transfer procedure, which comprises
The transfer request that paying party client is sent is received, collecting account information, remarks of transferring accounts letter are carried in the transfer request The contact information of breath and beneficiary;
The transfer request is responded, to send dynamic verification code to the corresponding communication account of the contact information, and to receipts Money side's client sends authentication request;
If the beneficiary identity letter for receiving authentication request described in beneficiary client end response within a preset time and returning Breath, dynamic verification code and remark information of transferring accounts, and the beneficiary identity information, dynamic verification code and the remark information of transferring accounts that return are equal It is verified, determines beneficiary authentication success.
2. according to the method described in claim 1, the method also includes:
If the identity information that the beneficiary client returns matches with the identity information prestored, determine that identity information verifying is logical It crosses;And/or
If the dynamic verification code that the beneficiary client returns is consistent with the dynamic verification code sent to the communication account, sentence Determine dynamic verification code to be verified;And/or
If the remark information of transferring accounts that the beneficiary client returns is consistent with the remark information of transferring accounts that paying party client is sent, Judgement remark information of transferring accounts is verified.
3. according to the method described in claim 1, the method also includes:
If not receiving identity information, dynamic verification code and the remark information of transferring accounts of the return of beneficiary client within a preset time In at least any one, determine beneficiary authentication failure.
4. according to the method described in claim 3, the method also includes:
If beneficiary authentication fails, authentication is sent to paying party client and/or beneficiary client and is unsuccessfully prompted Information.
5. the method according to claim 1, receive transfer request that paying party client is sent it Before, the method also includes:
Obtain the account risk information of paying party client and/or beneficiary client in historical time section;
If there are transaction risk and/or beneficiary clients for the account risk information instruction paying party client of paying party client There are transaction risks for the account risk information instruction beneficiary client at end, send to paying party client and carry out body to beneficiary The prompt information of part verifying.
6. the method according to claim 1, receive transfer request that paying party client is sent it Before, the method also includes:
Obtain the current network environment information of paying party client;
If there are security risks for the current network environment of the network environment information instruction paying party client, to paying party client End sends the prompt information that authentication is carried out to beneficiary.
7. the method according to claim 1, receive transfer request that paying party client is sent it Before, the method also includes:
Obtain transfer amounts;
If the transfer amounts are greater than preset amount of money threshold value, are sent to paying party client and authentication is carried out to beneficiary Prompt information.
8. the method according to claim 1, receive transfer request that paying party client is sent it Before, the method also includes:
Obtain the identity information of beneficiary;
The identity information of paying party is verified.
9. the authentication means in a kind of transfer procedure, described device include:
Receiving module carries collecting account letter for receiving the transfer request of paying party client transmission in the transfer request It ceases, the contact information of transfer accounts remark information and beneficiary;
Sending module, for responding the transfer request, to send dynamic to the corresponding communication account of the contact information Identifying code, and authentication request is sent to beneficiary client;
Authentication module, if being returned for receiving authentication request described in beneficiary client end response within a preset time Beneficiary identity information, dynamic verification code and remark information of transferring accounts, and return beneficiary identity information, dynamic verification code and turn Account remark information is verified, and determines beneficiary authentication success.
10. a kind of computer readable storage medium, is stored thereon with computer program, power is realized when which is executed by processor Benefit requires method described in 1 to 8 any one.
11. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, the processor realize method described in claim 1 to 8 any one when executing described program.
CN201811588868.2A 2018-12-25 2018-12-25 Auth method and device in transfer procedure Pending CN110009322A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811588868.2A CN110009322A (en) 2018-12-25 2018-12-25 Auth method and device in transfer procedure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811588868.2A CN110009322A (en) 2018-12-25 2018-12-25 Auth method and device in transfer procedure

Publications (1)

Publication Number Publication Date
CN110009322A true CN110009322A (en) 2019-07-12

Family

ID=67165209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811588868.2A Pending CN110009322A (en) 2018-12-25 2018-12-25 Auth method and device in transfer procedure

Country Status (1)

Country Link
CN (1) CN110009322A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110838010A (en) * 2019-10-30 2020-02-25 腾讯科技(深圳)有限公司 Service processing method, device, terminal, server and storage medium
CN111027980A (en) * 2019-12-12 2020-04-17 支付宝(杭州)信息技术有限公司 Method and device for verifying use of limit
CN111784347A (en) * 2020-07-31 2020-10-16 支付宝(杭州)信息技术有限公司 Resource transfer method and device
CN111882321A (en) * 2020-07-08 2020-11-03 支付宝(杭州)信息技术有限公司 Identity verification processing method, device and system
CN112184239A (en) * 2020-09-23 2021-01-05 支付宝(杭州)信息技术有限公司 Secure payment method, device, equipment and readable medium
CN112801647A (en) * 2021-01-27 2021-05-14 中国银联股份有限公司 Transfer method, device, electronic equipment and storage medium
WO2021164571A1 (en) * 2020-02-18 2021-08-26 中国银联股份有限公司 Information processing method, apparatus, and device, and medium
CN113610515A (en) * 2021-08-26 2021-11-05 中国银行股份有限公司 Account early warning method and device, electronic equipment and storage medium
CN113643015A (en) * 2021-08-31 2021-11-12 中国银行股份有限公司 Transfer management method, device and system
CN114386984A (en) * 2022-03-23 2022-04-22 云账户技术(天津)有限公司 Risk payment processing method and device, electronic equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930469A (en) * 2012-11-13 2013-02-13 中国民生银行股份有限公司 Transfer data processing method and device
CN104021472A (en) * 2014-05-30 2014-09-03 中国工商银行股份有限公司 Identity verification method and system
CN105046481A (en) * 2015-04-29 2015-11-11 丁超 Independent payment system and independent payment method for internet transactions
CN105306202A (en) * 2014-06-24 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method and device, server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930469A (en) * 2012-11-13 2013-02-13 中国民生银行股份有限公司 Transfer data processing method and device
CN104021472A (en) * 2014-05-30 2014-09-03 中国工商银行股份有限公司 Identity verification method and system
CN105306202A (en) * 2014-06-24 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method and device, server
CN105046481A (en) * 2015-04-29 2015-11-11 丁超 Independent payment system and independent payment method for internet transactions

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110838010A (en) * 2019-10-30 2020-02-25 腾讯科技(深圳)有限公司 Service processing method, device, terminal, server and storage medium
CN110838010B (en) * 2019-10-30 2021-04-30 腾讯科技(深圳)有限公司 Service processing method, device, terminal, server and storage medium
CN111027980A (en) * 2019-12-12 2020-04-17 支付宝(杭州)信息技术有限公司 Method and device for verifying use of limit
CN111027980B (en) * 2019-12-12 2022-08-12 支付宝(杭州)信息技术有限公司 Method and device for verifying use of limit
TWI773119B (en) * 2020-02-18 2022-08-01 大陸商中國銀聯股份有限公司 Information processing method, apparatus, equipment and medium
WO2021164571A1 (en) * 2020-02-18 2021-08-26 中国银联股份有限公司 Information processing method, apparatus, and device, and medium
CN111882321A (en) * 2020-07-08 2020-11-03 支付宝(杭州)信息技术有限公司 Identity verification processing method, device and system
CN111784347A (en) * 2020-07-31 2020-10-16 支付宝(杭州)信息技术有限公司 Resource transfer method and device
CN111784347B (en) * 2020-07-31 2023-07-04 支付宝(杭州)信息技术有限公司 Resource transfer method and device
CN112184239A (en) * 2020-09-23 2021-01-05 支付宝(杭州)信息技术有限公司 Secure payment method, device, equipment and readable medium
CN112184239B (en) * 2020-09-23 2023-10-27 支付宝(中国)网络技术有限公司 Secure payment method, apparatus, device and readable medium
CN112801647A (en) * 2021-01-27 2021-05-14 中国银联股份有限公司 Transfer method, device, electronic equipment and storage medium
CN113610515A (en) * 2021-08-26 2021-11-05 中国银行股份有限公司 Account early warning method and device, electronic equipment and storage medium
CN113643015A (en) * 2021-08-31 2021-11-12 中国银行股份有限公司 Transfer management method, device and system
CN113643015B (en) * 2021-08-31 2024-02-27 中国银行股份有限公司 Method, device and system for managing account transfer
CN114386984A (en) * 2022-03-23 2022-04-22 云账户技术(天津)有限公司 Risk payment processing method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN110009322A (en) Auth method and device in transfer procedure
US10956906B2 (en) Secure account creation
CN109716707B (en) Server apparatus and method for distributed electronic recording and transaction history
CN106357644B (en) Identity identifying method, system and server based on block chain network
CN106372940B (en) Identity identifying method, server and terminal device based on block chain network
US10171961B1 (en) Transaction authorization service
Sherif Protocols for secure electronic commerce
CN112037068B (en) Resource transfer method, system, device, computer equipment and storage medium
US20150363768A1 (en) System and method for rendering virtual currency related services
CN105337928B (en) Method for identifying ID, safety protection problem generation method and device
CN109829767A (en) A kind of point reward exchanging system and method based on block chain technology
US7729989B1 (en) Method and apparatus for message correction in a transaction authorization service
CN110020786A (en) Business processing, air control recognition methods, device and equipment
US11810081B2 (en) Method and system for the generation of user-initiated federated identities
CN111784341B (en) Block chain transaction method and device, electronic equipment and storage medium
CN111738724B (en) Cross-border resource transfer authenticity auditing method and device, and electronic equipment
US20130226803A1 (en) Method and system for authenticating an entity using transaction processing
CN111784347B (en) Resource transfer method and device
CN110324314A (en) User registering method and device, storage medium, electronic equipment
CA3183183A1 (en) System and method for facilitating transfer of electronic payment information
US20100094756A1 (en) System and method for rapid financial transactions through an open financial exchange or wire transfer
CN110619566A (en) On-chain pledge asset return system and method through on-chain digital currency settlement
KR20200005322A (en) Electronic apparatus, method and computer readable recording medium for managing processing of funds remitted abroad
CN110138707A (en) Method, client, application and the electronic equipment of data interaction
Pust The future of money: How Bitcoin and its underlying Blockchain technology could affect the financial sector

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40010683

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200928

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200928

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.