CN110414197A - The bank-user auth method and device of Behavior-based control feature - Google Patents
The bank-user auth method and device of Behavior-based control feature Download PDFInfo
- Publication number
- CN110414197A CN110414197A CN201910720676.0A CN201910720676A CN110414197A CN 110414197 A CN110414197 A CN 110414197A CN 201910720676 A CN201910720676 A CN 201910720676A CN 110414197 A CN110414197 A CN 110414197A
- Authority
- CN
- China
- Prior art keywords
- bank
- user
- data
- authentication
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Social Psychology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention provides a kind of bank-user auth method of Behavior-based control feature and device, the bank-user auth method of Behavior-based control feature includes: the authentication request for obtaining the bank-user, and the authentication request carries identity;Authentication is carried out to the bank-user according to the identity and preset behavioural characteristic matching database.The bank-user auth method of Behavior-based control feature provided by the invention makes full use of User Identity to handle the behavioural characteristic of all kinds of business in bank, and carries out labeling to behavioural characteristic, so that it is guaranteed that user identity is credible, safety.
Description
Technical field
The present invention relates to artificial intelligence field technical fields, and in particular to the big data excavation applications of financial industry, especially
It is to be related to the bank-user auth method and device of a kind of Behavior-based control feature.
Background technique
With the development of mobile internet, quick payment has become most one of the means of payment of people's routine use,
Popularity rate at home is more than 86%.Quick payment only needs user to provide the information such as bank card number, name in an account book, phone number,
After bank validation Client handset number correctness, Third-party payment sends mobile phone dynamic password to subscriber phone number, and user is defeated
Enter correct mobile phone dynamic password, payment or payment signing can be completed.If user completes quick payment signing, third party's branch
The information such as card number, phone number can be saved by paying mechanism, and when user pays next time, the payment that need to only input Third-party payment mechanism is close
Payment can be completed in code or mobile phone dynamic verification code.During quick payment, phone number verifying, which uniquely can determine that, is
The key of no client itself operation, accurate, the safety of phone number have a significant impact to the safety of quick payment, have become
An important factor for determining quick payment safety.When reducing phone number validation criteria, it will lead to quick payment and steal brush, influence
Clients fund safety causes quick payment success rate to decline, influences customer experience when improving phone number validation criteria.
Summary of the invention
For the problems of the prior art, the bank-user auth method of Behavior-based control feature provided by the invention,
It makes full use of User Identity to handle the behavioural characteristic of all kinds of business in bank, and labeling is carried out to behavioural characteristic, thus
It is credible, safe to ensure user identity, and the user experience is improved.
In order to solve the above technical problems, the present invention the following technical schemes are provided:
In a first aspect, the present invention provides a kind of bank-user auth method of Behavior-based control feature, comprising:
The authentication request of the bank-user is obtained, the authentication request carries identity;
Authentication is carried out to the bank-user according to the identity and preset behavioural characteristic matching database.
Preferably, the identity is phone number, ID card No. and the social security number of the bank-user.
It is preferably based on the bank-user auth method of behavioural characteristic further include:
Collect artificial on-site verification data, U-shield authentication data, the electronic cipher device data, bank card of the bank-user
Data test ciphertext data, the phone number carrier data and biological characteristic authentication data;
According to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, bank card data, test close number
The behavioural characteristic matching database is established according to, the phone number carrier data and biological characteristic authentication data.
Preferably, it is described according to the identity and preset behavioural characteristic matching database to the bank-user into
Row authentication, comprising:
The identities match result of the corresponding user of identity described in the behavioural characteristic matched data library inquiry;
Second aspect, the present invention provide a kind of bank-user authentication means of Behavior-based control feature, which includes:
Request unit, for obtaining the authentication request of the bank-user, the authentication request is carried
There is identity;
Identity authenticating unit is used for according to the identity and preset behavioural characteristic matching database to the bank
User carries out authentication.
Preferably, the identity is phone number, ID card No. and the social security number of the bank-user.
It is preferably based on the bank-user authentication means of behavioural characteristic further include:
Data collection module, for collecting artificial on-site verification data, the U-shield authentication data, electronics of the bank-user
Scrambler data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data;
Database unit, for according to the artificial on-site verification data, U-shield authentication data, electronic cipher device number
According to, bank card data, testing ciphertext data, the phone number carrier data and biological characteristic authentication data, to establish the behavior special
Levy matching database.
Preferably, the identity authenticating unit includes:
Enquiry module, the identity for the corresponding user of identity described in the behavioural characteristic matched data library inquiry
Matching result;
Authentication module carries out identity to the bank-user according to matching result for utilizing data digging method
Verifying.
The third aspect, the present invention provides a kind of electronic equipment, including memory, processor and storage are on a memory and can
The computer program run on a processor, processor realize the bank-user authentication of Behavior-based control feature when executing program
The step of method.
Fourth aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating
The step of bank-user auth method of Behavior-based control feature is realized when machine program is executed by processor.
As can be seen from the above description, the bank-user auth method and device of Behavior-based control feature provided by the invention,
By obtaining the authentication request of the bank-user, the authentication request carries identity;And it first passes through in advance
The behavioural characteristic of bank-user establishes database, then, matches in the database to the identity of the bank-user, from
And authentication is carried out to the bank-user.This method has fully considered that user handles all kinds of industry in bank using phone number
The behavioural characteristic of business, and labeling is carried out to behavioural characteristic, for client present in quick payment phone number verification process
Experience and safety challenge, have taken into account customer experience and safety, provide new approaches for phone number verifying, both improve hand
Machine authenticates percent of pass, in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is the bank-user auth method flow diagram one of Behavior-based control feature in the embodiment of the present invention;
Fig. 2 is the bank-user auth method flow diagram two of Behavior-based control feature in the embodiment of the present invention;
Fig. 3 is the process of the bank-user auth method step 200 of Behavior-based control feature in the embodiment of the present invention
Schematic diagram;
Fig. 4 is the bank-user auth method process signal of Behavior-based control feature in specific application example of the invention
Figure;
Fig. 5 is that the bank-user auth method stream thinking of Behavior-based control feature in specific application example of the invention is led
Figure;
Fig. 6 is that bank opens quick payment flow diagram in specific application example of the invention;
Fig. 7 is that behavioural characteristic matching database generates schematic diagram in specific application example of the invention;
Fig. 8 is that the structure of the bank-user authentication means of Behavior-based control feature in specific application example of the invention is shown
It is intended to one;
Fig. 9 is that the structure of the bank-user authentication means of Behavior-based control feature in specific application example of the invention is shown
It is intended to two;
Figure 10 is identity authenticating unit structural schematic diagram in specific application example of the invention;
Figure 11 is the structural schematic diagram of the electronic equipment in the embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of specific embodiment party of the bank-user auth method of Behavior-based control feature
Formula, referring to Fig. 1 this method10Specifically include following content:
Step 100: obtaining the authentication request of the bank-user, the authentication request carries identity mark
Know.
It is understood that identity in step 100 can for the phone number of bank-user, ID card No. and
Social security number etc..
Step 200: the bank-user being carried out according to the identity and preset behavioural characteristic matching database
Authentication.
It is understood that the behavioural characteristic in step 200 includes: whether the bank-user carried out artificial scene and recognize
Whether whether card carried out being authenticated using U-shield, carried out being authenticated using electronic cipher device, whether carry out Guo Shua bank card media
With test close certification, whether close certification tested by account, whether pass through whether biological characteristic authentication, the user mobile phone pass through operator
Whether certification carried out short message verification code certification and whether by the verifying system authentication of third party's phone number.
As can be seen from the above description, the bank-user auth method and device of Behavior-based control feature provided by the invention,
Current cash neck by obtaining bank outlets pays the weather forecast of the transaction data, geographical location and the geographical location in period
Data;And week is paid according to the cash dosage prediction model prediction bank outlets' target cash neck generated by bank outlets' historical data
Cash dosage in phase.The data such as site history cash dosage, site business feature, external environmental factor are processed
And model training, apply for that the work such as people's row cash tune plan of paying, essence are formulated in cash transfers and cash centre for bank outlets site
Standard provides site following one day, one week and one month cash dosage estimation results, effectively promotes bank outlets' cash buret
The precision and working efficiency of reason promote site cash service to reduce bank outlets' cash on hand total amount and O&M cost
Coverage ratio.
In one embodiment, referring to fig. 2, the bank-user auth method of Behavior-based control feature further include:
Step 300: collecting artificial on-site verification data, the U-shield authentication data, electronic cipher device number of the bank-user
According to, bank card data, test ciphertext data, the phone number carrier data and biological characteristic authentication data.
Step 400: according to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, bank card number
According to, test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavioural characteristic matched data
Library.
Step 400 implement when, specifically: according to client identity identify transacting business when authentication mode, record client
The historical behavior feature of identity.And behavioural characteristic coupling number historical behavior characteristic storage got up in forming step 400
According to library.
In one embodiment, referring to Fig. 3, step 200 includes:
Step 201: the identities match of the corresponding user of identity described in the behavioural characteristic matched data library inquiry
As a result.
Step 202: utilizing data digging method, authentication is carried out to the bank-user according to matching result.
Specifically, the data mining for the historical behavior feature for meeting client identity mark is gone out according to Association Rules Technology
Come, and be labeled as the historical behavior feature of client, is configured, passes through then according to confidence levels of the behavioural characteristic to the user
The mode of parametrization adjusts the confidence levels at any time.
As can be seen from the above description, the bank-user auth method of Behavior-based control feature provided by the invention, by obtaining
The authentication request of the bank-user is taken, the authentication request carries identity;And bank's use is first passed through in advance
The behavioural characteristic at family establishes database, then, matches in the database to the identity of the bank-user, thus to institute
It states bank-user and carries out authentication.This method has fully considered that user handles the row of all kinds of business using phone number in bank
Be characterized, and labeling carried out to behavioural characteristic, for customer experience present in quick payment phone number verification process and
Safety challenge has taken into account customer experience and safety, provides new approaches for phone number verifying, has both improved mobile phone certification
Percent of pass in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
To further explain this programme, the present invention provides Behavior-based control feature by taking the phone number of bank-user as an example
The specific application example of bank-user auth method, the specific application example specifically include following content20, referring to fig. 4 and
Fig. 5.
S0: the mobile phone checking request of bank-user is obtained.
It is understood that the mobile phone checking request in step S0 includes the phone number of the bank-user.
Many business scenario needs use phone number in banking system, and phone number, which can be used for client identity, to be recognized
Card, system account/user management contacts/notify client etc., and main business relevant to phone number is shown in Table 1:
The relevant banking of 1 phone number of table
Business serial number | Business Name |
1 | Issuing bank's card |
2 | It customizes remaining sum and changes prompting |
3 | Register Mobile banking |
4 | Handle loan |
5 | Open quick payment |
6 | Modify client reservation cellphone information |
7 | Client logs in Mobile banking using phone number |
8 | Client makes a phone call bank using phone number |
9 | Customize short message bill |
10 | Notifying messages are sent to client |
11 | Other and phone number related service |
Fig. 6 is the business process map that bank-user opens quick payment, first user need bank interface input name,
Passport NO., bank's card number and phone number, then whether the bank validation phone number is the preparatory indwelling of the user in silver
Capable phone number, if it is not, then authentication failed, user opens quick payment service fail.If phone number is the user
The phone number of preparatory indwelling, then send identifying code to user mobile phone, then, identifying code is input to bank interface by user, such as
Fruit identifying code is accurate, then user successfully opens quick payment business, and after can completing operation (such as setting password and
Close guarantor etc.).
By the application background technique it is found that in current technology, in quick payment, phone number verifying uniquely can be really
It is fixed whether the key of client itself operation.Therefore need to further increase phone number validation criteria.
S1: artificial on-site verification data, U-shield authentication data, the electronic cipher device data, bank of the bank-user are collected
Card data test ciphertext data, the phone number carrier data and biological characteristic authentication data.
It is understood that using up to tens of kinds of phone number business scenario in banking system, and every kind of business opponent
Machine number requires and authentication mode is not quite similar, such as: issuing bank's card needs artificial on-site verification, handles loan in e-bank
Money needs U-shield or scrambler to authenticate, customization remaining sum changes to remind and needs short-message verification certification etc., mobile phone when according to transacting business
Number authentication mode is classified, and referring to table 2, behavioural characteristic can be divided into following a few classes:
It should be noted that the bank-user in step S1 refers to all users of the bank, with refering in particular in step S0
Bank-user it is different.
2 phone number related service behavioural characteristic of table
Behavioural characteristic serial number | Phone number related service behavioural characteristic |
1 | Whether artificial on-site verification |
2 | Whether authenticated using U-shield |
3 | Whether authenticated using electronic cipher device |
4 | Whether brush bank's card media and tests close certification |
5 | Whether carrier authorization is passed through |
6 | Whether close certification tested by account |
7 | Whether short-message verification code authentication |
8 | Whether the verifying system authentication of third party's phone number is passed through |
9 | Whether biological characteristic authentication is passed through |
10 | Certification was not done |
11 | Whether authenticated by other modes |
S2: according to the artificial on-site verification data of bank-user, U-shield authentication data, electronic cipher device data, bank card number
According to, test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavioural characteristic matched data
Library.
Authentication mode when specifically, according to bank client phone number transacting business, record Client handset number are gone through
History behavioural characteristic.Record phone number history is carried out by phone number behavioural characteristic maintenance interface and data mining two ways
Behavioural characteristic, thus the behavioural characteristic matching database in forming step S2.
It additionally needs and behavioural characteristic confidence levels is divided, such as is (U-shield, close by artificial on-site verification and medium
Code device) certification confidence levels it is high, the confidence levels for testing close certification by account are general, pass through the credible of short-message verification code authentication
Rank is low, does not do the insincere of certification.Referring to table 3, act of authentication feature confidence levels are as follows:
The 3 credible grade of act of authentication feature of table
It is understood that needing the confidence levels to mobile phone act of authentication feature to carry out parametrization management, to facilitate root
Factually border safe effect adjusts confidence levels at any time.
S3: the identities match result of the corresponding user of phone number described in the behavioural characteristic matched data library inquiry.
S4: utilizing data digging method, carries out authentication to the bank-user according to matching result.
In step S3 and step S4, referring to Fig. 7, meet Client handset number historical behavior using Association Rules Technology handle
The data mining of feature comes out, and marks the historical behavior feature of Client handset number.Use mobile phone history act of authentication feature
When verifying mobile phone, client identity is first identified, re-inspection client uses the history act of authentication feature of the mobile phone, and and high credible grade
Other act of authentication characteristic matching, if matching any one high-grade credible behavioural characteristic, step S4 is verified.
S5: transmission short message verification code to bank-user, and the identifying code sended over user compares.
It is understood that (standard can repair when the behavioural characteristic confidence levels of bank-user are high when in step S4
Change), then just carry out step S5.
S6: authentication is carried out to bank-user according to identifying code comparing result.
When the identifying code that bank-user is sent is identical as the identifying code that bank is sent to the bank-user, then the bank
Subscriber authentication is by (mobile phone is verified), conversely, authentication failed.
As can be seen from the above description, the bank-user auth method of Behavior-based control feature provided by the invention, by obtaining
The authentication request of the bank-user is taken, the authentication request carries identity;And bank's use is first passed through in advance
The behavioural characteristic at family establishes database, then, matches in the database to the identity of the bank-user, thus to institute
It states bank-user and carries out authentication.This method has fully considered that user handles the row of all kinds of business using phone number in bank
Be characterized, and labeling carried out to behavioural characteristic, for customer experience present in quick payment phone number verification process and
Safety challenge has taken into account customer experience and safety, provides new approaches for phone number verifying, has both improved mobile phone certification
Percent of pass in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
Based on the same inventive concept, the embodiment of the present application also provides the bank-user authentication of Behavior-based control feature dresses
It sets, can be used to implement method described in above-described embodiment, such as the following examples.Since the bank of Behavior-based control feature uses
The principle that family authentication means solve the problems, such as is similar to the bank-user auth method of Behavior-based control feature, therefore is based on
The implementation of the bank-user authentication means of behavioural characteristic may refer to the bank-user authentication side of Behavior-based control feature
Method is implemented, and overlaps will not be repeated.Used below, the soft of predetermined function may be implemented in term " unit " or " module "
The combination of part and/or hardware.Although system described in following embodiment is preferably realized with software, hardware, or
The realization of the combination of software and hardware is also that may and be contemplated.
The embodiment of the present invention provides a kind of base of bank-user auth method that can be realized Behavior-based control feature
In the specific embodiment of the bank-user authentication means of behavioural characteristic, referring to Fig. 8, the bank-user of Behavior-based control feature
Authentication means specifically include following content:
Request unit 10, for obtaining the authentication request of the bank-user, the authentication request is taken
With identity.
Identity authenticating unit 20 is used for according to the identity and preset behavioural characteristic matching database to the silver
Row user carries out authentication.
Referring to Fig. 9, it is preferable that the bank-user authentication means of Behavior-based control feature further include:
Data collection module 30, for collecting artificial on-site verification data, the U-shield authentication data, electricity of the bank-user
Sub- scrambler data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data.
Database unit 40, for according to the artificial on-site verification data, U-shield authentication data, electronic cipher device
Data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavior
Characteristic matching database.
Referring to Figure 10, it is preferable that the identity authenticating unit 20 includes:
Enquiry module 201, for the corresponding user of identity described in the behavioural characteristic matched data library inquiry
Identities match result
Authentication module 202 carries out body to the bank-user according to matching result for utilizing data digging method
Part verifying.
As can be seen from the above description, the bank-user authentication means of Behavior-based control feature provided by the invention, by obtaining
The authentication request of the bank-user is taken, the authentication request carries identity;And bank's use is first passed through in advance
The behavioural characteristic at family establishes database, then, matches in the database to the identity of the bank-user, thus to institute
It states bank-user and carries out authentication.This method has fully considered that user handles the row of all kinds of business using phone number in bank
Be characterized, and labeling carried out to behavioural characteristic, for customer experience present in quick payment phone number verification process and
Safety challenge has taken into account customer experience and safety, provides new approaches for phone number verifying, has both improved mobile phone certification
Percent of pass in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
Embodiments herein also provides the bank-user identity that can be realized the feature of the Behavior-based control in above-described embodiment
The specific embodiment of a kind of electronic equipment of Overall Steps in verification method, referring to Figure 11, electronic equipment specifically includes as follows
Content:
Processor (processor) 1201, memory (memory) 1202, communication interface (Communications
Interface) 1203 and bus 1204;
Wherein, processor 1201, memory 1202, communication interface 1203 complete mutual communication by bus 1204;
Communication interface 1203 passes for realizing the information between the relevant devices such as server-side devices, recording equipment and ustomer premises access equipment
It is defeated.
Processor 1201 is used to call the computer program in memory 1202, and processor is realized when executing computer program
Overall Steps in the bank-user auth method of Behavior-based control feature in above-described embodiment, for example, processor executes
Following step is realized when computer program:
Step 100: obtaining the authentication request of the bank-user, the authentication request carries identity mark
Know.
Step 200: the bank-user being carried out according to the identity and preset behavioural characteristic matching database
Authentication.
As can be seen from the above description, the electronic equipment in the embodiment of the present application, the identity by obtaining the bank-user is tested
Card request, the authentication request carry identity;And the behavioural characteristic for first passing through bank-user in advance establishes database,
Then, the identity of the bank-user is matched in the database, to carry out authentication to the bank-user.
This method has fully considered that user handles the behavioural characteristic of all kinds of business using phone number in bank, and carries out to behavioural characteristic
Labeling has taken into account client's body for customer experience present in quick payment phone number verification process and safety challenge
It tests and safety, provides new approaches for phone number verifying, both improved mobile phone certification percent of pass, in turn, ensured that mobile phone can
Letter, safety, promote user experience, improve quick payment safety.
Embodiments herein also provides the bank-user identity that can be realized the feature of the Behavior-based control in above-described embodiment
A kind of computer readable storage medium of Overall Steps in verification method is stored with computer journey on computer readable storage medium
Sequence, the computer program realize the bank-user authentication of the Behavior-based control feature in above-described embodiment when being executed by processor
The Overall Steps of method, for example, processor realizes following step when executing computer program:
Step 100: obtaining the authentication request of the bank-user, the authentication request carries identity mark
Know.
Step 200: the bank-user being carried out according to the identity and preset behavioural characteristic matching database
Authentication.
As can be seen from the above description, the computer readable storage medium in the embodiment of the present application, is used by obtaining the bank
The authentication request at family, the authentication request carry identity;And the behavioural characteristic of bank-user is first passed through in advance
Establish database, then, the identity of the bank-user matched in the database, thus to the bank-user into
Row authentication.This method has fully considered that user handles the behavioural characteristic of all kinds of business using phone number in bank, and right
Behavioural characteristic carries out labeling, for customer experience present in quick payment phone number verification process and safety challenge,
Customer experience and safety have been taken into account, has provided new approaches for phone number verifying, has not only improved mobile phone certification percent of pass, but also can
Ensure that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for hardware+
For program class embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to side
The part of method embodiment illustrates.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
Although this application provides the method operating procedure of such as embodiment or flow chart, based on routine or without creativeness
Labour may include more or less operating procedure.The step of enumerating in embodiment sequence is only that numerous steps execute
One of sequence mode, does not represent and unique executes sequence.It, can be by when device in practice or client production execute
It is executed according to embodiment or method shown in the drawings sequence or parallel executes (such as parallel processor or multiple threads
Environment).
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Specific embodiment is applied in the present invention, and principle and implementation of the present invention are described, above embodiments
Explanation be merely used to help understand method and its core concept of the invention;At the same time, for those skilled in the art,
According to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion in this specification
Appearance should not be construed as limiting the invention.
Claims (10)
1. a kind of bank-user auth method of Behavior-based control feature characterized by comprising
The authentication request of the bank-user is obtained, the authentication request carries identity;
Authentication is carried out to the bank-user according to the identity and preset behavioural characteristic matching database.
2. bank-user auth method according to claim 1 characterized by comprising the identity is
Phone number, ID card No. and the social security number of the bank-user.
3. bank-user auth method according to claim 2, which is characterized in that further include:
Collect the artificial on-site verification data of the bank-user, U-shield authentication data, electronic cipher device data, bank card data,
Test ciphertext data, the phone number carrier data and biological characteristic authentication data;
According to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, bank card data, test ciphertext data,
The phone number carrier data and biological characteristic authentication data establish the behavioural characteristic matching database.
4. bank-user auth method according to claim 1, which is characterized in that described according to the identity
And preset behavioural characteristic matching database carries out authentication to the bank-user, comprising:
The identities match result of the corresponding user of identity described in the behavioural characteristic matched data library inquiry;
Using data digging method, authentication is carried out to the bank-user according to matching result.
5. a kind of bank-user authentication means of Behavior-based control feature characterized by comprising
Request unit, for obtaining the authentication request of the bank-user, the authentication request carries body
Part mark;
Identity authenticating unit is used for according to the identity and preset behavioural characteristic matching database to the bank-user
Carry out authentication.
6. bank-user authentication means according to claim 5, which is characterized in that the identity is the silver
Phone number, ID card No. and the social security number of row user.
7. bank-user authentication means according to claim 6, which is characterized in that further include:
Data collection module, for collecting artificial on-site verification data, the U-shield authentication data, electronic cipher of the bank-user
Device data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data;
Database unit, for according to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, silver
Row card data test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavioural characteristic
With database.
8. bank-user authentication means according to claim 5, which is characterized in that the identity authenticating unit packet
It includes:
Enquiry module, the identities match for the corresponding user of identity described in the behavioural characteristic matched data library inquiry
As a result;
Authentication module carries out authentication to the bank-user according to matching result for utilizing data digging method.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor realizes any one of Claims 1-4 Behavior-based control when executing described program
The step of bank-user auth method of feature.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of any one of the Claims 1-4 bank-user auth method of the Behavior-based control feature is realized when processor executes
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910720676.0A CN110414197B (en) | 2019-08-06 | 2019-08-06 | Bank user identity verification method and device based on behavior characteristics |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910720676.0A CN110414197B (en) | 2019-08-06 | 2019-08-06 | Bank user identity verification method and device based on behavior characteristics |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110414197A true CN110414197A (en) | 2019-11-05 |
CN110414197B CN110414197B (en) | 2021-06-29 |
Family
ID=68366056
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910720676.0A Active CN110414197B (en) | 2019-08-06 | 2019-08-06 | Bank user identity verification method and device based on behavior characteristics |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110414197B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368334A (en) * | 2020-03-31 | 2020-07-03 | 福建中信网安信息科技有限公司 | Safety maintenance system based on data asset data in database |
CN111951019A (en) * | 2020-08-28 | 2020-11-17 | 浪潮软件股份有限公司 | Identity verification method and device |
CN112632004A (en) * | 2021-03-09 | 2021-04-09 | 南京云联数科科技有限公司 | User identity recognition method and device based on behavior data acquisition |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783039A (en) * | 2009-12-29 | 2010-07-21 | 广州广电运通金融电子股份有限公司 | Method and terminal for controlling security of financial transactions |
CN102376049A (en) * | 2010-08-27 | 2012-03-14 | 黄金富 | Cell phone payment confirmation system based on security verification and corresponding method thereof |
CN105407002A (en) * | 2015-12-02 | 2016-03-16 | 中国联合网络通信集团有限公司 | Account-opening and network-entering method, device and system of online business hall |
CN107248073A (en) * | 2017-05-31 | 2017-10-13 | 合肥视尔信息科技有限公司 | A kind of Web bank's illegal guard system |
CN207097051U (en) * | 2017-04-18 | 2018-03-13 | 北京中矿赛力贝特科技有限公司 | A kind of bank client authentication system |
CN108876596A (en) * | 2018-06-20 | 2018-11-23 | 李子盈 | The Private Banking's account working method and terminal and system of identity-based card number |
CN109065038A (en) * | 2018-07-10 | 2018-12-21 | 广东九联科技股份有限公司 | A kind of sound control method and system of crime scene investigation device |
-
2019
- 2019-08-06 CN CN201910720676.0A patent/CN110414197B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783039A (en) * | 2009-12-29 | 2010-07-21 | 广州广电运通金融电子股份有限公司 | Method and terminal for controlling security of financial transactions |
CN102376049A (en) * | 2010-08-27 | 2012-03-14 | 黄金富 | Cell phone payment confirmation system based on security verification and corresponding method thereof |
CN105407002A (en) * | 2015-12-02 | 2016-03-16 | 中国联合网络通信集团有限公司 | Account-opening and network-entering method, device and system of online business hall |
CN207097051U (en) * | 2017-04-18 | 2018-03-13 | 北京中矿赛力贝特科技有限公司 | A kind of bank client authentication system |
CN107248073A (en) * | 2017-05-31 | 2017-10-13 | 合肥视尔信息科技有限公司 | A kind of Web bank's illegal guard system |
CN108876596A (en) * | 2018-06-20 | 2018-11-23 | 李子盈 | The Private Banking's account working method and terminal and system of identity-based card number |
CN109065038A (en) * | 2018-07-10 | 2018-12-21 | 广东九联科技股份有限公司 | A kind of sound control method and system of crime scene investigation device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368334A (en) * | 2020-03-31 | 2020-07-03 | 福建中信网安信息科技有限公司 | Safety maintenance system based on data asset data in database |
CN111951019A (en) * | 2020-08-28 | 2020-11-17 | 浪潮软件股份有限公司 | Identity verification method and device |
CN112632004A (en) * | 2021-03-09 | 2021-04-09 | 南京云联数科科技有限公司 | User identity recognition method and device based on behavior data acquisition |
Also Published As
Publication number | Publication date |
---|---|
CN110414197B (en) | 2021-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103338188B (en) | A kind of dynamic authentication method of client side being applicable to mobile cloud | |
US11095633B2 (en) | Non-repeatable challenge-response authentication | |
CN106161372B (en) | A kind of Risk Identification Method and device based on address matching | |
RU2635275C1 (en) | System and method of identifying user's suspicious activity in user's interaction with various banking services | |
CN103443813B (en) | System and method by mobile device authenticating transactions | |
US9614847B2 (en) | User authentication | |
CN106161359A (en) | The method and device of certification user, the method and device of registration wearable device | |
WO2017196609A1 (en) | User authentication and access control using identity services | |
US11785010B2 (en) | Method and system for authentication via location monitoring | |
CN108171486B (en) | A kind of terminal with E-seal function | |
CN105931051A (en) | Safety payment method and apparatus | |
CN110414197A (en) | The bank-user auth method and device of Behavior-based control feature | |
CN104756142A (en) | Method for phone authentication in e-business transactions and computer-readable recording medium having program for phone authentication in e-business transactions recorded thereon | |
CN104933565A (en) | IC card transaction method and IC card transaction system | |
CN108734471A (en) | Identity identifying method, device, system and storage medium in mobile-payment system | |
CN105100029A (en) | Method and device for user identity verification | |
CN104168117A (en) | Voice digital signature method | |
US20230050176A1 (en) | Method of processing a transaction request | |
CN108961034A (en) | System and method, storage medium based on user behavior certification | |
WO2020061434A1 (en) | Systems and methods for conducting account tokenized transactions | |
CN109547554A (en) | No card interactive system and simulation card apparatus | |
CN115099799B (en) | Transaction processing method and system for digital RMB | |
CN105354740A (en) | Method and apparatus for establishing personal credit information database | |
CN105279414A (en) | Verification device based on fingerprint application and verification method based on fingerprint application | |
CN105225153A (en) | Data processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |