Summary of the invention
Based on this, present description provides the auth methods and device in transfer procedure.
According to this specification embodiment in a first aspect, providing the auth method in a kind of transfer procedure, the side
Method includes:
Receive the transfer request that paying party client is sent, carry in the transfer request collecting account information, transfer accounts it is standby
Infuse the contact information of information and beneficiary;
The transfer request is responded, to send dynamic verification code to the corresponding communication account of the contact information, and
Authentication request is sent to beneficiary client;
If the beneficiary body for receiving authentication request described in beneficiary client end response within a preset time and returning
Part information, dynamic verification code and remark information of transferring accounts, and beneficiary identity information, dynamic verification code and remarks of the transferring accounts letter returned
Breath is verified, and determines beneficiary authentication success.
Optionally, the method also includes:
If the identity information that the beneficiary client returns matches with the identity information prestored, determine that identity information is tested
Card passes through;And/or
If the dynamic verification code that the beneficiary client returns and the dynamic verification code one sent to the communication account
It causes, determines that dynamic verification code is verified;And/or
If the remark information of transferring accounts of the transfer accounts remark information and the transmission of paying party client of the beneficiary client return
Unanimously, determine that remark information of transferring accounts is verified.
Optionally, the method also includes:
If not receiving identity information, dynamic verification code and the remarks of transferring accounts of the return of beneficiary client within a preset time
In information at least any one, determine beneficiary authentication failure.
Optionally, the method also includes:
If beneficiary authentication fails, authentication failure is sent to paying party client and/or beneficiary client
Prompt information.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain the account risk information of paying party client and/or beneficiary client in historical time section;
If there are transaction risk and/or beneficiaries for the account risk information instruction paying party client of paying party client
The account risk information instruction beneficiary client of client there are transaction risk, to paying party client send to beneficiary into
The prompt information of row authentication.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain the current network environment information of paying party client;
If there are security risks for the current network environment of the network environment information instruction paying party client, to paying party
Client sends the prompt information that authentication is carried out to beneficiary.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain transfer amounts;
If the transfer amounts are greater than preset amount of money threshold value, are sent to paying party client and beneficiary progress identity is tested
The prompt information of card.
Optionally, before receiving the transfer request that paying party client is sent, the method also includes:
Obtain the identity information of beneficiary;
The identity information of paying party is verified.
According to the second aspect of this specification embodiment, the authentication means in a kind of transfer procedure, the dress are provided
It sets and includes:
Receiving module carries gathering account for receiving the transfer request of paying party client transmission in the transfer request
The contact information of family information, transfer accounts remark information and beneficiary;
Sending module, for responding the transfer request, to be sent to the corresponding communication account of the contact information
Dynamic verification code, and authentication request is sent to beneficiary client;
Authentication module, if being returned for receiving authentication request described in beneficiary client end response within a preset time
Beneficiary identity information, dynamic verification code and the remark information of transferring accounts returned, and beneficiary identity information, the dynamic verification code returned
Remark information is verified with transferring accounts, and determines beneficiary authentication success.
According to the third aspect of this specification embodiment, a kind of computer readable storage medium is provided, is stored thereon with meter
Calculation machine program realizes method described in power any embodiment when the program is executed by processor.
According to the fourth aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, the processor realizes any reality when executing described program
Apply method described in example.
Using this specification example scheme, by beneficiary identity information, dynamic verification code and remark information of transferring accounts
Triple verifyings, avoid existing scheme and the risk unilaterally verified made by requestee completely, effectively reduce mistake and transfer accounts and make
At monetary losses risk.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
This specification can be limited.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute
The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses
Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims
Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is
Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but
These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off
In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed
For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or
" when ... " or " in response to determination ".
It include payment visitor in the application scenarios as shown in Figure 1, being the application scenarios schematic diagram of this specification one embodiment
Family end, gathering client and server.Wherein, payment client is the client that paying party uses, and beneficiary client is to receive
The client that money side uses, wherein client can be the tool such as Alipay client, wechat client, Web bank's client
There is the client of payment by the transfer of accounts function.Beneficiary and paying party can be natural person, be also possible to enterprise or organization etc.
Group.Respective Account Logon client, in transfer procedure, paying party client can be respectively adopted in paying party and beneficiary
Transfer request can be sent to the server of payment system can be from Send only Account after server receives transfer request
The assets of the corresponding amount of money are deducted, and the assets of deduction are transferred to collecting account.Server can also record the money in transfer procedure
Golden transition information, and update the remaining sum of collecting account and Send only Account.Further, server can also be with paying party client
It is communicated with beneficiary client, to realize various data interactions and the control function in transfer procedure.
It should be understood that above-mentioned application scenarios are the adoptable one of application scenarios of this specification embodiment,
It is not intended as the restriction to this specification embodiment.
Based on this, this specification embodiment provides the auth method in a kind of transfer procedure, as shown in Fig. 2, described
Method can include:
Step 202: receiving the transfer request that paying party client is sent, collecting account letter is carried in the transfer request
It ceases, the contact information of transfer accounts remark information and beneficiary;
Step 204: responding the transfer request, tested with sending dynamic to the corresponding communication account of the contact information
Code is demonstrate,proved, and sends authentication request to beneficiary client;
Step 206: if receiving authentication request described in beneficiary client end response within a preset time and returning
Beneficiary identity information, dynamic verification code and remark information of transferring accounts, and return beneficiary identity information, dynamic verification code and turn
Account remark information is verified, and determines beneficiary authentication success.
This specification embodiment can the server in application scenarios as shown in Figure 1 execute.In step 202, server
It can receive the transfer request of paying party client transmission, the transfer request is for paying party client request to beneficiary client
End carry out authentication, the information to ensure beneficiary is correct, avoid paying party due to filling out wrong beneficiary information caused by money
Gold loss.
The contact information of collecting account information, transfer accounts remark information and beneficiary can be carried in transfer request.Its
In, collecting account information may include the information that account name or account ID of collecting account etc. are used for unique identification collecting account.
Remark information of transferring accounts can be the information that beneficiary and paying party have been made an appointment by other communications conduits, for example, for branch
It pays treasured to transfer accounts, remark information of transferring accounts can be made an appointment with beneficiary by channels such as phones or short message by paying party.The letter
Breath can be in short, is also possible to a picture, can also be other kinds of information;Correspondingly, paying party client can
With in the form of text, graphic form or the extended formatting remark information that will transfer accounts be uploaded to server.In practical applications, it transfers accounts standby
Note information can be used for recording reason of transferring accounts, in this way, on the one hand beneficiary client and paying party client can be made clearly to turn
On the other hand account reason can also play the role of carrying out authentication to beneficiary.The contact information of beneficiary can be with
Including but not limited at least one of information such as the cell-phone number of beneficiary, E-mail address, nail nail account.
Fig. 3 (a) and Fig. 3 (b) is the schematic diagram at the interface of transferring accounts of the paying party client of this specification one embodiment.Such as
Shown in Fig. 3 (a), it may include that beneficiary account obtains entrance and contact method obtains entrance on interface of transferring accounts, be respectively used to pay the bill
Side's input beneficiary account and beneficiary contact method.Transferring accounts may also include remark information of transferring accounts on interface and obtains entrance, if turning
Account remark information is text information, then remark information of transferring accounts can be inputted directly in text box;If remark information of transferring accounts is figure
The information such as piece can then click the "+" uploading pictures on the right side of text box.User may choose whether using three-factor authentication, such as
Fruit uses, the choice box before can choosing on interface " three-factor authentication ", then clicks in next step.As shown in Fig. 3 (b), user
Transfer amounts can be inputted on the surface, then click confirmation.It should be noted that above-mentioned interface is by way of example only, and
The non-restriction as to this specification embodiment.For example, remark information of transferring accounts can also be as user interface shown in Fig. 3 (b)
Upper input.
In step 204, server can generate dynamic verification code with the transfer request in response of step 202, this is dynamically tested
Card code can be randomly generated, what the rule for being also possible to be pre-established according to certain generated.In practical applications, it dynamically tests
Card code can be the character identifying code including several characters, such as: 6 bit digital identifying codes;It is also possible to picture verifying
Code or gesture identifying code etc..The dynamic verification code of generation can be sent in step 202 by paying party client by server
The corresponding communication account of the contact information of the beneficiary of offer, so that beneficiary be allow to read dynamic from communication account
Identifying code is used for authentication.If contact information is cell-phone number, corresponding communication account is short message account;If correspondent party
Formula information is email address, then corresponding communication account is email accounts.Server can be asked with transferring accounts in response of step 202
It asks to beneficiary client and sends authentication request, authentication request obtains the authentication letter of beneficiary for server
Breath, to carry out authentication to beneficiary.
In practical applications, server can first send dynamic verification code, retransmit authentication request;It can also first send out
Authentication request is sent, dynamic verification code is retransmited;Authentication request and dynamic verification code can also be sent simultaneously, herein not
It limits.In one embodiment, server can also be after having sent authentication request and dynamic verification code, can be with
Start timing.
In step 206, beneficiary client can be returned to server and be collected money after receiving authentication request
Square identity information, dynamic verification code and remark information of transferring accounts.Wherein, beneficiary identity information is for checking collecting account holder
Whether it is me, avoids criminal from usurping collecting account and falsely claim as one's own assets of transferring accounts, beneficiary identity information may include but be not limited to
It is at least any below: payment cipher, beneficiary finger print information, beneficiary face information etc..Dynamic verification code can be by beneficiary
Beneficiary client is read and is input to, from communication account so that dynamic verification code is committed to service by beneficiary client
Device.The purpose for submitting dynamic verification code is that whether the beneficiary information that inspection paying party is filled in is correct, and checks again for gathering account
Whether family holder is me.Remark information of transferring accounts is the information that beneficiary and paying party are made an appointment, wherein may include using
In the information for characterizing reason of transferring accounts, the purpose of this step is to check receipt and payment both sides with the presence or absence of supply-demand relationship of transferring accounts, and gathering
Whether people clearly knows this purpose transferred accounts.
Fig. 4 is the schematic diagram at the authentication interface of the beneficiary client of this specification one embodiment.Such as Fig. 4 institute
Show, may include the identification card number acquisition entrance of beneficiary on authentication interface, finger print information obtains entrance, dynamic verification code
It obtains entrance and remark information of transferring accounts obtains entrance.
In one embodiment, if the identity information of beneficiary client return and the identity information phase prestored
Match, determines that identity information is verified.In another embodiment, if the beneficiary client return dynamic verification code with
The dynamic verification code sent to the communication account is consistent, determines that dynamic verification code is verified.In another embodiment, if
The remark information of transferring accounts that the beneficiary client returns is consistent with the remark information of transferring accounts that paying party client is sent, and determines to turn
Account remark information is verified.
It is appreciated that server is held to what beneficiary identity information, dynamic verification code and remark information of transferring accounts were verified
Row sequence can carry out in any order, for example, beneficiary identity information can be verified first, then verify dynamic verification code, most
Remark information of transferring accounts is verified afterwards;Dynamic verification code can also be first verified, then verifies beneficiary identity information, finally verifying is transferred accounts standby
Infuse information;Or it is sequentially verified using other.
If the beneficiary body for receiving authentication request described in beneficiary client end response within a preset time and returning
Part information, dynamic verification code and remark information of transferring accounts, and beneficiary identity information, dynamic verification code and remarks of the transferring accounts letter returned
It ceases triple verifyings to be verified, determines beneficiary authentication success.Conversely, if not in preset time (for example, 30 minutes)
Inside receive the identity information of beneficiary client return, in dynamic verification code and remark information of transferring accounts at least any one,
Determine beneficiary authentication failure.It is lost at this point it is possible to send authentication to paying party client and/or beneficiary client
Lose prompt information.Meanwhile this cancellation of transferring accounts, fund is retracted and advice and pay people.
Above-mentioned triple verification process are option, and requestee can bear energy according to transfer amounts, risk when initiating to transfer accounts
Power and payee's situation voluntarily choose whether to open all the elements or partial content of triple verifyings.
In one embodiment, before receiving the transfer request that paying party client is sent, paying party can also be obtained
The account risk information of client and/or beneficiary client in historical time section;If the account risk of paying party client
Information indicates paying party client, and there are the account risk information of transaction risk and/or beneficiary client instruction beneficiary visitors
There are transaction risks at family end, and the prompt information that authentication is carried out to beneficiary is sent to paying party client.
Wherein, historical time section can be set according to actual needs, for example, can be set to 1 week, 1 month equal time.Account
Family risk information can be used for indicating account in historical time section with the presence or absence of transaction risk (i.e. security risk).Account risk letter
It may include the historical transactional information of account in breath, right in the historical operation information and/or historical time section executed to account
Account carries out the network identity identification information of input when authentication.Wherein, historical transactional information is for indicating account in history
With the presence or absence of abnormal transaction in period, abnormal transaction can be the transaction reported or complained, or hidden with there is safety
The transaction etc. that the account of trouble carries out.The historical operation information executed to account may include logon account, publish account, using account
The information such as assets, for indicating account with the presence or absence of stolen risk.For example, account is in a short time continuously in different IP
Address repeatedly logs in or up to a hundred transaction etc. occur within the short time (for example, 1 day) for account, indicates that account is probably deposited
In stolen risk.Network identity identification information is stolen risk for characterizing account.Network identity identification information may include account
Name in an account book, the account pet name, email address and with aforementioned related password and cryptoguard problem and answer etc..For real-name authentication mistake
Account, can also include and the information such as identity card, passport or driver's license of account binding.If user exists in historical time section
The number of the network identity identification information of input error is more than preset frequency threshold value when carrying out authentication to account, then it represents that
There are certain accounts to be stolen risk.
The present embodiment can the security risk according to existing for paying party client and/or beneficiary client come present the bill for payment
Square client selects safer triple verification modes, when security risk is higher, then sends to paying party client to receipts
Money side carries out the prompt information of authentication, improves the safety of transfer procedure.
In one embodiment, before receiving the transfer request that paying party client is sent, paying party can also be obtained
The current network environment information of client;If the current network environment of the network environment information instruction paying party client exists
Security risk sends the prompt information that authentication is carried out to beneficiary to paying party client.
Wherein, network environment information may include for characterizing the network type letter that network is public network or home network
Breath and/or the information etc. whether once reported for characterizing network ip address.If paying party client it is currently employed be public
Common network network and/or current network IP address are once reported, then it represents that there are certain risks for the network environment of paying party, therefore, can
To send the prompt information for carrying out authentication to beneficiary to paying party client.
The present embodiment can select more according to the network environment information of paying party client come present the bill for payment side's client
Triple verification modes of safety then send to paying party client and carry out to beneficiary when network environment security risk is higher
The prompt information of authentication improves the safety of transfer procedure.
In one embodiment, before receiving the transfer request that paying party client is sent, gold of transferring accounts can also be obtained
Volume;If the transfer amounts are greater than preset amount of money threshold value, are sent to paying party client and authentication is carried out to beneficiary
Prompt information.Wherein, amount of money threshold value can be by paying party sets itself.It, can be to if transfer amounts are greater than preset amount of money threshold value
Paying party client send to beneficiary carry out authentication prompt information, to avoid because mistake transfer accounts caused by paying party weight
Big loss.
It further, can be simultaneously according to above-mentioned account risk information, network environment information and transfer amounts come to paying party
Client sends the prompt information that authentication is carried out to beneficiary.Specifically, if account risk information instruction paying party visitor
There are transaction risk or the network environment information current network environments of instruction paying party client at family end there are security risk,
Or transfer amounts are greater than preset amount of money threshold value, then the prompt that authentication is carried out to beneficiary is sent to paying party client
Information.
In one embodiment, before receiving the transfer request that paying party client is sent, beneficiary can also be obtained
Identity information;The identity information of paying party is verified.Paying party identity information may include but be not limited to following at least appoint
One: payment cipher, paying party finger print information, paying party face information etc..By carrying out authentication to paying party, can be confirmed
Paying party identity avoids other people from usurping paying party account and transfers accounts.Only after confirming paying party identity, just execute subsequent
The operation for carrying out authentication in transfer procedure to beneficiary, improves account transfer safety.
As shown in figure 5, being the timing diagram of the auth method in the transfer procedure of this specification one embodiment, can wrap
Include following steps:
Step 502: paying party and beneficiary negotiate transfer accounts reason and transfer amounts.
Negotiate after completing in step 504, execute step 506 and step 508: paying party is filled out in paying party client
Write beneficiary account, beneficiary contact method, transfer amounts and remark information of transferring accounts.Execution sequence is not limited to first carry out step
506, then step 508 is executed, details are not described herein again.
In step 510, paying party chooses triple verifying switches in paying party client.
Step 512: payment direction server submits transfer request.
Step 514: server sends advice of collection to beneficiary client.
Step 516: server sends dynamic verification code to beneficiary communication account.Execution sequence is not limited to first carry out step
514, then step 516 is executed, details are not described herein again.
Step 518: starting gathering verifying.Step 518a to step 518f is specifically included, in step 518a, server is wanted
Ask beneficiary client executing authentication;In step 518c, server requirement beneficiary client executing dynamic verification code
Verifying;In step 518e, server requirement beneficiary client executing transfer accounts remarks verifying.If completing body in step 518b
Part verifying, in step 518d complete dynamic verification code verifying, and in step 518f complete transfer accounts remark information verifying, then hold
Row step 518g, that is, transfer accounts to collecting account and beat money.
This specification embodiment is comprehensive raw using password authentification, living body by the triple verifyings newly-increased in beneficiary side
A variety of verifying means such as object identification technology, dynamic verification code and traditional contract, effectively ensure money transfer safety, avoid
The risk that existing scheme is unilaterally verified by paying party completely effectively reduces wrong transfer accounts and causes the wind of monetary losses
Danger.The verifying movement of beneficiary is alternatively arranged as confirming the legal argument for validity of transferring accounts, and when there is dispute over obligation, sufficiently ensures
The legitimate rights and interests of both sides.
Various technical characteristics in above embodiments can be arbitrarily combined, as long as there is no punchings for the combination between feature
Prominent or contradiction, but as space is limited, is not described one by one, thus the various technical characteristics in above embodiment it is any into
Row combination also belongs to the range of this disclosure.
As shown in fig. 6, being the authentication means in the transfer procedure of this specification one embodiment, described device packet
It includes:
Receiving module 602 carries gathering in the transfer request for receiving the transfer request of paying party client transmission
The contact information of account information, transfer accounts remark information and beneficiary;
Sending module 604, for responding the transfer request, to be sent out to the corresponding communication account of the contact information
Dynamic verification code is sent, and sends authentication request to beneficiary client;
Authentication module 606, if for receiving authentication request described in beneficiary client end response within a preset time
And return beneficiary identity information, dynamic verification code and remark information of transferring accounts, and return beneficiary identity information, dynamically test
Card code and remark information of transferring accounts are verified, and determine beneficiary authentication success.
The specific details of the realization process of the function of modules and effect, which are shown in, in above-mentioned apparatus corresponds to step in the above method
Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The module of explanation may or may not be physically separated, and the component shown as module can be or can also be with
It is not physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to actual
The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not
In the case where making the creative labor, it can understand and implement.
The embodiment of this specification device can be applied on a computing device, such as server or intelligent terminal.Device
Embodiment can also be realized by software realization by way of hardware or software and hardware combining.Taking software implementation as an example,
As the device on a logical meaning, being will be corresponding in nonvolatile memory by the processor of file process where it
Computer program instructions are read into memory what operation was formed.For hardware view, as shown in fig. 7, being this specification device
A kind of hardware structure diagram of place computer equipment, in addition to processor 702 shown in Fig. 7, memory 704, network interface 706, with
And except nonvolatile memory 708, server or electronic equipment in embodiment where device are set generally according to the computer
Standby actual functional capability can also include other hardware, repeat no more to this.
Correspondingly, this specification embodiment also provides a kind of computer storage medium, is stored with journey in the storage medium
Sequence realizes the method in any of the above-described embodiment when described program is executed by processor.
Correspondingly, this specification embodiment also provides a kind of computer equipment, including memory, processor and is stored in
On reservoir and the computer program that can run on a processor, the processor realize any of the above-described implementation when executing described program
Method in example.
It wherein includes storage medium (the including but not limited to disk of program code that the application, which can be used in one or more,
Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium packet
Permanent and non-permanent, removable and non-removable media is included, can be accomplished by any method or technique information storage.Letter
Breath can be computer readable instructions, data structure, the module of program or other data.The example packet of the storage medium of computer
Include but be not limited to: phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM),
Other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory
(EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), digital versatile disc
(DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices or any other non-biography
Defeated medium, can be used for storage can be accessed by a computing device information.
Those skilled in the art will readily occur to the disclosure after considering specification and practicing specification disclosed herein
Other embodiments.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes
Or adaptive change follow the general principles of this disclosure and including the disclosure it is undocumented in the art known in often
Knowledge or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim point out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
The foregoing is merely the preferred embodiments of the disclosure, not to limit the disclosure, all essences in the disclosure
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of disclosure protection.