CN110414197A - The bank-user auth method and device of Behavior-based control feature - Google Patents

The bank-user auth method and device of Behavior-based control feature Download PDF

Info

Publication number
CN110414197A
CN110414197A CN201910720676.0A CN201910720676A CN110414197A CN 110414197 A CN110414197 A CN 110414197A CN 201910720676 A CN201910720676 A CN 201910720676A CN 110414197 A CN110414197 A CN 110414197A
Authority
CN
China
Prior art keywords
bank
user
data
authentication
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910720676.0A
Other languages
Chinese (zh)
Other versions
CN110414197B (en
Inventor
吴龙常
陈静国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910720676.0A priority Critical patent/CN110414197B/en
Publication of CN110414197A publication Critical patent/CN110414197A/en
Application granted granted Critical
Publication of CN110414197B publication Critical patent/CN110414197B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Social Psychology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention provides a kind of bank-user auth method of Behavior-based control feature and device, the bank-user auth method of Behavior-based control feature includes: the authentication request for obtaining the bank-user, and the authentication request carries identity;Authentication is carried out to the bank-user according to the identity and preset behavioural characteristic matching database.The bank-user auth method of Behavior-based control feature provided by the invention makes full use of User Identity to handle the behavioural characteristic of all kinds of business in bank, and carries out labeling to behavioural characteristic, so that it is guaranteed that user identity is credible, safety.

Description

The bank-user auth method and device of Behavior-based control feature
Technical field
The present invention relates to artificial intelligence field technical fields, and in particular to the big data excavation applications of financial industry, especially It is to be related to the bank-user auth method and device of a kind of Behavior-based control feature.
Background technique
With the development of mobile internet, quick payment has become most one of the means of payment of people's routine use, Popularity rate at home is more than 86%.Quick payment only needs user to provide the information such as bank card number, name in an account book, phone number, After bank validation Client handset number correctness, Third-party payment sends mobile phone dynamic password to subscriber phone number, and user is defeated Enter correct mobile phone dynamic password, payment or payment signing can be completed.If user completes quick payment signing, third party's branch The information such as card number, phone number can be saved by paying mechanism, and when user pays next time, the payment that need to only input Third-party payment mechanism is close Payment can be completed in code or mobile phone dynamic verification code.During quick payment, phone number verifying, which uniquely can determine that, is The key of no client itself operation, accurate, the safety of phone number have a significant impact to the safety of quick payment, have become An important factor for determining quick payment safety.When reducing phone number validation criteria, it will lead to quick payment and steal brush, influence Clients fund safety causes quick payment success rate to decline, influences customer experience when improving phone number validation criteria.
Summary of the invention
For the problems of the prior art, the bank-user auth method of Behavior-based control feature provided by the invention, It makes full use of User Identity to handle the behavioural characteristic of all kinds of business in bank, and labeling is carried out to behavioural characteristic, thus It is credible, safe to ensure user identity, and the user experience is improved.
In order to solve the above technical problems, the present invention the following technical schemes are provided:
In a first aspect, the present invention provides a kind of bank-user auth method of Behavior-based control feature, comprising:
The authentication request of the bank-user is obtained, the authentication request carries identity;
Authentication is carried out to the bank-user according to the identity and preset behavioural characteristic matching database.
Preferably, the identity is phone number, ID card No. and the social security number of the bank-user.
It is preferably based on the bank-user auth method of behavioural characteristic further include:
Collect artificial on-site verification data, U-shield authentication data, the electronic cipher device data, bank card of the bank-user Data test ciphertext data, the phone number carrier data and biological characteristic authentication data;
According to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, bank card data, test close number The behavioural characteristic matching database is established according to, the phone number carrier data and biological characteristic authentication data.
Preferably, it is described according to the identity and preset behavioural characteristic matching database to the bank-user into Row authentication, comprising:
The identities match result of the corresponding user of identity described in the behavioural characteristic matched data library inquiry;
Second aspect, the present invention provide a kind of bank-user authentication means of Behavior-based control feature, which includes:
Request unit, for obtaining the authentication request of the bank-user, the authentication request is carried There is identity;
Identity authenticating unit is used for according to the identity and preset behavioural characteristic matching database to the bank User carries out authentication.
Preferably, the identity is phone number, ID card No. and the social security number of the bank-user.
It is preferably based on the bank-user authentication means of behavioural characteristic further include:
Data collection module, for collecting artificial on-site verification data, the U-shield authentication data, electronics of the bank-user Scrambler data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data;
Database unit, for according to the artificial on-site verification data, U-shield authentication data, electronic cipher device number According to, bank card data, testing ciphertext data, the phone number carrier data and biological characteristic authentication data, to establish the behavior special Levy matching database.
Preferably, the identity authenticating unit includes:
Enquiry module, the identity for the corresponding user of identity described in the behavioural characteristic matched data library inquiry Matching result;
Authentication module carries out identity to the bank-user according to matching result for utilizing data digging method Verifying.
The third aspect, the present invention provides a kind of electronic equipment, including memory, processor and storage are on a memory and can The computer program run on a processor, processor realize the bank-user authentication of Behavior-based control feature when executing program The step of method.
Fourth aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating The step of bank-user auth method of Behavior-based control feature is realized when machine program is executed by processor.
As can be seen from the above description, the bank-user auth method and device of Behavior-based control feature provided by the invention, By obtaining the authentication request of the bank-user, the authentication request carries identity;And it first passes through in advance The behavioural characteristic of bank-user establishes database, then, matches in the database to the identity of the bank-user, from And authentication is carried out to the bank-user.This method has fully considered that user handles all kinds of industry in bank using phone number The behavioural characteristic of business, and labeling is carried out to behavioural characteristic, for client present in quick payment phone number verification process Experience and safety challenge, have taken into account customer experience and safety, provide new approaches for phone number verifying, both improve hand Machine authenticates percent of pass, in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is the bank-user auth method flow diagram one of Behavior-based control feature in the embodiment of the present invention;
Fig. 2 is the bank-user auth method flow diagram two of Behavior-based control feature in the embodiment of the present invention;
Fig. 3 is the process of the bank-user auth method step 200 of Behavior-based control feature in the embodiment of the present invention Schematic diagram;
Fig. 4 is the bank-user auth method process signal of Behavior-based control feature in specific application example of the invention Figure;
Fig. 5 is that the bank-user auth method stream thinking of Behavior-based control feature in specific application example of the invention is led Figure;
Fig. 6 is that bank opens quick payment flow diagram in specific application example of the invention;
Fig. 7 is that behavioural characteristic matching database generates schematic diagram in specific application example of the invention;
Fig. 8 is that the structure of the bank-user authentication means of Behavior-based control feature in specific application example of the invention is shown It is intended to one;
Fig. 9 is that the structure of the bank-user authentication means of Behavior-based control feature in specific application example of the invention is shown It is intended to two;
Figure 10 is identity authenticating unit structural schematic diagram in specific application example of the invention;
Figure 11 is the structural schematic diagram of the electronic equipment in the embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of specific embodiment party of the bank-user auth method of Behavior-based control feature Formula, referring to Fig. 1 this method10Specifically include following content:
Step 100: obtaining the authentication request of the bank-user, the authentication request carries identity mark Know.
It is understood that identity in step 100 can for the phone number of bank-user, ID card No. and Social security number etc..
Step 200: the bank-user being carried out according to the identity and preset behavioural characteristic matching database Authentication.
It is understood that the behavioural characteristic in step 200 includes: whether the bank-user carried out artificial scene and recognize Whether whether card carried out being authenticated using U-shield, carried out being authenticated using electronic cipher device, whether carry out Guo Shua bank card media With test close certification, whether close certification tested by account, whether pass through whether biological characteristic authentication, the user mobile phone pass through operator Whether certification carried out short message verification code certification and whether by the verifying system authentication of third party's phone number.
As can be seen from the above description, the bank-user auth method and device of Behavior-based control feature provided by the invention, Current cash neck by obtaining bank outlets pays the weather forecast of the transaction data, geographical location and the geographical location in period Data;And week is paid according to the cash dosage prediction model prediction bank outlets' target cash neck generated by bank outlets' historical data Cash dosage in phase.The data such as site history cash dosage, site business feature, external environmental factor are processed And model training, apply for that the work such as people's row cash tune plan of paying, essence are formulated in cash transfers and cash centre for bank outlets site Standard provides site following one day, one week and one month cash dosage estimation results, effectively promotes bank outlets' cash buret The precision and working efficiency of reason promote site cash service to reduce bank outlets' cash on hand total amount and O&M cost Coverage ratio.
In one embodiment, referring to fig. 2, the bank-user auth method of Behavior-based control feature further include:
Step 300: collecting artificial on-site verification data, the U-shield authentication data, electronic cipher device number of the bank-user According to, bank card data, test ciphertext data, the phone number carrier data and biological characteristic authentication data.
Step 400: according to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, bank card number According to, test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavioural characteristic matched data Library.
Step 400 implement when, specifically: according to client identity identify transacting business when authentication mode, record client The historical behavior feature of identity.And behavioural characteristic coupling number historical behavior characteristic storage got up in forming step 400 According to library.
In one embodiment, referring to Fig. 3, step 200 includes:
Step 201: the identities match of the corresponding user of identity described in the behavioural characteristic matched data library inquiry As a result.
Step 202: utilizing data digging method, authentication is carried out to the bank-user according to matching result.
Specifically, the data mining for the historical behavior feature for meeting client identity mark is gone out according to Association Rules Technology Come, and be labeled as the historical behavior feature of client, is configured, passes through then according to confidence levels of the behavioural characteristic to the user The mode of parametrization adjusts the confidence levels at any time.
As can be seen from the above description, the bank-user auth method of Behavior-based control feature provided by the invention, by obtaining The authentication request of the bank-user is taken, the authentication request carries identity;And bank's use is first passed through in advance The behavioural characteristic at family establishes database, then, matches in the database to the identity of the bank-user, thus to institute It states bank-user and carries out authentication.This method has fully considered that user handles the row of all kinds of business using phone number in bank Be characterized, and labeling carried out to behavioural characteristic, for customer experience present in quick payment phone number verification process and Safety challenge has taken into account customer experience and safety, provides new approaches for phone number verifying, has both improved mobile phone certification Percent of pass in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
To further explain this programme, the present invention provides Behavior-based control feature by taking the phone number of bank-user as an example The specific application example of bank-user auth method, the specific application example specifically include following content20, referring to fig. 4 and Fig. 5.
S0: the mobile phone checking request of bank-user is obtained.
It is understood that the mobile phone checking request in step S0 includes the phone number of the bank-user.
Many business scenario needs use phone number in banking system, and phone number, which can be used for client identity, to be recognized Card, system account/user management contacts/notify client etc., and main business relevant to phone number is shown in Table 1:
The relevant banking of 1 phone number of table
Business serial number Business Name
1 Issuing bank's card
2 It customizes remaining sum and changes prompting
3 Register Mobile banking
4 Handle loan
5 Open quick payment
6 Modify client reservation cellphone information
7 Client logs in Mobile banking using phone number
8 Client makes a phone call bank using phone number
9 Customize short message bill
10 Notifying messages are sent to client
11 Other and phone number related service
Fig. 6 is the business process map that bank-user opens quick payment, first user need bank interface input name, Passport NO., bank's card number and phone number, then whether the bank validation phone number is the preparatory indwelling of the user in silver Capable phone number, if it is not, then authentication failed, user opens quick payment service fail.If phone number is the user The phone number of preparatory indwelling, then send identifying code to user mobile phone, then, identifying code is input to bank interface by user, such as Fruit identifying code is accurate, then user successfully opens quick payment business, and after can completing operation (such as setting password and Close guarantor etc.).
By the application background technique it is found that in current technology, in quick payment, phone number verifying uniquely can be really It is fixed whether the key of client itself operation.Therefore need to further increase phone number validation criteria.
S1: artificial on-site verification data, U-shield authentication data, the electronic cipher device data, bank of the bank-user are collected Card data test ciphertext data, the phone number carrier data and biological characteristic authentication data.
It is understood that using up to tens of kinds of phone number business scenario in banking system, and every kind of business opponent Machine number requires and authentication mode is not quite similar, such as: issuing bank's card needs artificial on-site verification, handles loan in e-bank Money needs U-shield or scrambler to authenticate, customization remaining sum changes to remind and needs short-message verification certification etc., mobile phone when according to transacting business Number authentication mode is classified, and referring to table 2, behavioural characteristic can be divided into following a few classes:
It should be noted that the bank-user in step S1 refers to all users of the bank, with refering in particular in step S0 Bank-user it is different.
2 phone number related service behavioural characteristic of table
Behavioural characteristic serial number Phone number related service behavioural characteristic
1 Whether artificial on-site verification
2 Whether authenticated using U-shield
3 Whether authenticated using electronic cipher device
4 Whether brush bank's card media and tests close certification
5 Whether carrier authorization is passed through
6 Whether close certification tested by account
7 Whether short-message verification code authentication
8 Whether the verifying system authentication of third party's phone number is passed through
9 Whether biological characteristic authentication is passed through
10 Certification was not done
11 Whether authenticated by other modes
S2: according to the artificial on-site verification data of bank-user, U-shield authentication data, electronic cipher device data, bank card number According to, test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavioural characteristic matched data Library.
Authentication mode when specifically, according to bank client phone number transacting business, record Client handset number are gone through History behavioural characteristic.Record phone number history is carried out by phone number behavioural characteristic maintenance interface and data mining two ways Behavioural characteristic, thus the behavioural characteristic matching database in forming step S2.
It additionally needs and behavioural characteristic confidence levels is divided, such as is (U-shield, close by artificial on-site verification and medium Code device) certification confidence levels it is high, the confidence levels for testing close certification by account are general, pass through the credible of short-message verification code authentication Rank is low, does not do the insincere of certification.Referring to table 3, act of authentication feature confidence levels are as follows:
The 3 credible grade of act of authentication feature of table
It is understood that needing the confidence levels to mobile phone act of authentication feature to carry out parametrization management, to facilitate root Factually border safe effect adjusts confidence levels at any time.
S3: the identities match result of the corresponding user of phone number described in the behavioural characteristic matched data library inquiry.
S4: utilizing data digging method, carries out authentication to the bank-user according to matching result.
In step S3 and step S4, referring to Fig. 7, meet Client handset number historical behavior using Association Rules Technology handle The data mining of feature comes out, and marks the historical behavior feature of Client handset number.Use mobile phone history act of authentication feature When verifying mobile phone, client identity is first identified, re-inspection client uses the history act of authentication feature of the mobile phone, and and high credible grade Other act of authentication characteristic matching, if matching any one high-grade credible behavioural characteristic, step S4 is verified.
S5: transmission short message verification code to bank-user, and the identifying code sended over user compares.
It is understood that (standard can repair when the behavioural characteristic confidence levels of bank-user are high when in step S4 Change), then just carry out step S5.
S6: authentication is carried out to bank-user according to identifying code comparing result.
When the identifying code that bank-user is sent is identical as the identifying code that bank is sent to the bank-user, then the bank Subscriber authentication is by (mobile phone is verified), conversely, authentication failed.
As can be seen from the above description, the bank-user auth method of Behavior-based control feature provided by the invention, by obtaining The authentication request of the bank-user is taken, the authentication request carries identity;And bank's use is first passed through in advance The behavioural characteristic at family establishes database, then, matches in the database to the identity of the bank-user, thus to institute It states bank-user and carries out authentication.This method has fully considered that user handles the row of all kinds of business using phone number in bank Be characterized, and labeling carried out to behavioural characteristic, for customer experience present in quick payment phone number verification process and Safety challenge has taken into account customer experience and safety, provides new approaches for phone number verifying, has both improved mobile phone certification Percent of pass in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
Based on the same inventive concept, the embodiment of the present application also provides the bank-user authentication of Behavior-based control feature dresses It sets, can be used to implement method described in above-described embodiment, such as the following examples.Since the bank of Behavior-based control feature uses The principle that family authentication means solve the problems, such as is similar to the bank-user auth method of Behavior-based control feature, therefore is based on The implementation of the bank-user authentication means of behavioural characteristic may refer to the bank-user authentication side of Behavior-based control feature Method is implemented, and overlaps will not be repeated.Used below, the soft of predetermined function may be implemented in term " unit " or " module " The combination of part and/or hardware.Although system described in following embodiment is preferably realized with software, hardware, or The realization of the combination of software and hardware is also that may and be contemplated.
The embodiment of the present invention provides a kind of base of bank-user auth method that can be realized Behavior-based control feature In the specific embodiment of the bank-user authentication means of behavioural characteristic, referring to Fig. 8, the bank-user of Behavior-based control feature Authentication means specifically include following content:
Request unit 10, for obtaining the authentication request of the bank-user, the authentication request is taken With identity.
Identity authenticating unit 20 is used for according to the identity and preset behavioural characteristic matching database to the silver Row user carries out authentication.
Referring to Fig. 9, it is preferable that the bank-user authentication means of Behavior-based control feature further include:
Data collection module 30, for collecting artificial on-site verification data, the U-shield authentication data, electricity of the bank-user Sub- scrambler data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data.
Database unit 40, for according to the artificial on-site verification data, U-shield authentication data, electronic cipher device Data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavior Characteristic matching database.
Referring to Figure 10, it is preferable that the identity authenticating unit 20 includes:
Enquiry module 201, for the corresponding user of identity described in the behavioural characteristic matched data library inquiry Identities match result
Authentication module 202 carries out body to the bank-user according to matching result for utilizing data digging method Part verifying.
As can be seen from the above description, the bank-user authentication means of Behavior-based control feature provided by the invention, by obtaining The authentication request of the bank-user is taken, the authentication request carries identity;And bank's use is first passed through in advance The behavioural characteristic at family establishes database, then, matches in the database to the identity of the bank-user, thus to institute It states bank-user and carries out authentication.This method has fully considered that user handles the row of all kinds of business using phone number in bank Be characterized, and labeling carried out to behavioural characteristic, for customer experience present in quick payment phone number verification process and Safety challenge has taken into account customer experience and safety, provides new approaches for phone number verifying, has both improved mobile phone certification Percent of pass in turn, ensures that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
Embodiments herein also provides the bank-user identity that can be realized the feature of the Behavior-based control in above-described embodiment The specific embodiment of a kind of electronic equipment of Overall Steps in verification method, referring to Figure 11, electronic equipment specifically includes as follows Content:
Processor (processor) 1201, memory (memory) 1202, communication interface (Communications Interface) 1203 and bus 1204;
Wherein, processor 1201, memory 1202, communication interface 1203 complete mutual communication by bus 1204; Communication interface 1203 passes for realizing the information between the relevant devices such as server-side devices, recording equipment and ustomer premises access equipment It is defeated.
Processor 1201 is used to call the computer program in memory 1202, and processor is realized when executing computer program Overall Steps in the bank-user auth method of Behavior-based control feature in above-described embodiment, for example, processor executes Following step is realized when computer program:
Step 100: obtaining the authentication request of the bank-user, the authentication request carries identity mark Know.
Step 200: the bank-user being carried out according to the identity and preset behavioural characteristic matching database Authentication.
As can be seen from the above description, the electronic equipment in the embodiment of the present application, the identity by obtaining the bank-user is tested Card request, the authentication request carry identity;And the behavioural characteristic for first passing through bank-user in advance establishes database, Then, the identity of the bank-user is matched in the database, to carry out authentication to the bank-user. This method has fully considered that user handles the behavioural characteristic of all kinds of business using phone number in bank, and carries out to behavioural characteristic Labeling has taken into account client's body for customer experience present in quick payment phone number verification process and safety challenge It tests and safety, provides new approaches for phone number verifying, both improved mobile phone certification percent of pass, in turn, ensured that mobile phone can Letter, safety, promote user experience, improve quick payment safety.
Embodiments herein also provides the bank-user identity that can be realized the feature of the Behavior-based control in above-described embodiment A kind of computer readable storage medium of Overall Steps in verification method is stored with computer journey on computer readable storage medium Sequence, the computer program realize the bank-user authentication of the Behavior-based control feature in above-described embodiment when being executed by processor The Overall Steps of method, for example, processor realizes following step when executing computer program:
Step 100: obtaining the authentication request of the bank-user, the authentication request carries identity mark Know.
Step 200: the bank-user being carried out according to the identity and preset behavioural characteristic matching database Authentication.
As can be seen from the above description, the computer readable storage medium in the embodiment of the present application, is used by obtaining the bank The authentication request at family, the authentication request carry identity;And the behavioural characteristic of bank-user is first passed through in advance Establish database, then, the identity of the bank-user matched in the database, thus to the bank-user into Row authentication.This method has fully considered that user handles the behavioural characteristic of all kinds of business using phone number in bank, and right Behavioural characteristic carries out labeling, for customer experience present in quick payment phone number verification process and safety challenge, Customer experience and safety have been taken into account, has provided new approaches for phone number verifying, has not only improved mobile phone certification percent of pass, but also can Ensure that mobile phone is credible, safe, promotes user experience, improve quick payment safety.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for hardware+ For program class embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to side The part of method embodiment illustrates.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
Although this application provides the method operating procedure of such as embodiment or flow chart, based on routine or without creativeness Labour may include more or less operating procedure.The step of enumerating in embodiment sequence is only that numerous steps execute One of sequence mode, does not represent and unique executes sequence.It, can be by when device in practice or client production execute It is executed according to embodiment or method shown in the drawings sequence or parallel executes (such as parallel processor or multiple threads Environment).
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Specific embodiment is applied in the present invention, and principle and implementation of the present invention are described, above embodiments Explanation be merely used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, According to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion in this specification Appearance should not be construed as limiting the invention.

Claims (10)

1. a kind of bank-user auth method of Behavior-based control feature characterized by comprising
The authentication request of the bank-user is obtained, the authentication request carries identity;
Authentication is carried out to the bank-user according to the identity and preset behavioural characteristic matching database.
2. bank-user auth method according to claim 1 characterized by comprising the identity is Phone number, ID card No. and the social security number of the bank-user.
3. bank-user auth method according to claim 2, which is characterized in that further include:
Collect the artificial on-site verification data of the bank-user, U-shield authentication data, electronic cipher device data, bank card data, Test ciphertext data, the phone number carrier data and biological characteristic authentication data;
According to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, bank card data, test ciphertext data, The phone number carrier data and biological characteristic authentication data establish the behavioural characteristic matching database.
4. bank-user auth method according to claim 1, which is characterized in that described according to the identity And preset behavioural characteristic matching database carries out authentication to the bank-user, comprising:
The identities match result of the corresponding user of identity described in the behavioural characteristic matched data library inquiry;
Using data digging method, authentication is carried out to the bank-user according to matching result.
5. a kind of bank-user authentication means of Behavior-based control feature characterized by comprising
Request unit, for obtaining the authentication request of the bank-user, the authentication request carries body Part mark;
Identity authenticating unit is used for according to the identity and preset behavioural characteristic matching database to the bank-user Carry out authentication.
6. bank-user authentication means according to claim 5, which is characterized in that the identity is the silver Phone number, ID card No. and the social security number of row user.
7. bank-user authentication means according to claim 6, which is characterized in that further include:
Data collection module, for collecting artificial on-site verification data, the U-shield authentication data, electronic cipher of the bank-user Device data, bank card data test ciphertext data, the phone number carrier data and biological characteristic authentication data;
Database unit, for according to the artificial on-site verification data, U-shield authentication data, electronic cipher device data, silver Row card data test ciphertext data, the phone number carrier data and biological characteristic authentication data and establish the behavioural characteristic With database.
8. bank-user authentication means according to claim 5, which is characterized in that the identity authenticating unit packet It includes:
Enquiry module, the identities match for the corresponding user of identity described in the behavioural characteristic matched data library inquiry As a result;
Authentication module carries out authentication to the bank-user according to matching result for utilizing data digging method.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes any one of Claims 1-4 Behavior-based control when executing described program The step of bank-user auth method of feature.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of any one of the Claims 1-4 bank-user auth method of the Behavior-based control feature is realized when processor executes Suddenly.
CN201910720676.0A 2019-08-06 2019-08-06 Bank user identity verification method and device based on behavior characteristics Active CN110414197B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910720676.0A CN110414197B (en) 2019-08-06 2019-08-06 Bank user identity verification method and device based on behavior characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910720676.0A CN110414197B (en) 2019-08-06 2019-08-06 Bank user identity verification method and device based on behavior characteristics

Publications (2)

Publication Number Publication Date
CN110414197A true CN110414197A (en) 2019-11-05
CN110414197B CN110414197B (en) 2021-06-29

Family

ID=68366056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910720676.0A Active CN110414197B (en) 2019-08-06 2019-08-06 Bank user identity verification method and device based on behavior characteristics

Country Status (1)

Country Link
CN (1) CN110414197B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368334A (en) * 2020-03-31 2020-07-03 福建中信网安信息科技有限公司 Safety maintenance system based on data asset data in database
CN111951019A (en) * 2020-08-28 2020-11-17 浪潮软件股份有限公司 Identity verification method and device
CN112632004A (en) * 2021-03-09 2021-04-09 南京云联数科科技有限公司 User identity recognition method and device based on behavior data acquisition

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783039A (en) * 2009-12-29 2010-07-21 广州广电运通金融电子股份有限公司 Method and terminal for controlling security of financial transactions
CN102376049A (en) * 2010-08-27 2012-03-14 黄金富 Cell phone payment confirmation system based on security verification and corresponding method thereof
CN105407002A (en) * 2015-12-02 2016-03-16 中国联合网络通信集团有限公司 Account-opening and network-entering method, device and system of online business hall
CN107248073A (en) * 2017-05-31 2017-10-13 合肥视尔信息科技有限公司 A kind of Web bank's illegal guard system
CN207097051U (en) * 2017-04-18 2018-03-13 北京中矿赛力贝特科技有限公司 A kind of bank client authentication system
CN108876596A (en) * 2018-06-20 2018-11-23 李子盈 The Private Banking's account working method and terminal and system of identity-based card number
CN109065038A (en) * 2018-07-10 2018-12-21 广东九联科技股份有限公司 A kind of sound control method and system of crime scene investigation device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101783039A (en) * 2009-12-29 2010-07-21 广州广电运通金融电子股份有限公司 Method and terminal for controlling security of financial transactions
CN102376049A (en) * 2010-08-27 2012-03-14 黄金富 Cell phone payment confirmation system based on security verification and corresponding method thereof
CN105407002A (en) * 2015-12-02 2016-03-16 中国联合网络通信集团有限公司 Account-opening and network-entering method, device and system of online business hall
CN207097051U (en) * 2017-04-18 2018-03-13 北京中矿赛力贝特科技有限公司 A kind of bank client authentication system
CN107248073A (en) * 2017-05-31 2017-10-13 合肥视尔信息科技有限公司 A kind of Web bank's illegal guard system
CN108876596A (en) * 2018-06-20 2018-11-23 李子盈 The Private Banking's account working method and terminal and system of identity-based card number
CN109065038A (en) * 2018-07-10 2018-12-21 广东九联科技股份有限公司 A kind of sound control method and system of crime scene investigation device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368334A (en) * 2020-03-31 2020-07-03 福建中信网安信息科技有限公司 Safety maintenance system based on data asset data in database
CN111951019A (en) * 2020-08-28 2020-11-17 浪潮软件股份有限公司 Identity verification method and device
CN112632004A (en) * 2021-03-09 2021-04-09 南京云联数科科技有限公司 User identity recognition method and device based on behavior data acquisition

Also Published As

Publication number Publication date
CN110414197B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN103338188B (en) A kind of dynamic authentication method of client side being applicable to mobile cloud
US11095633B2 (en) Non-repeatable challenge-response authentication
CN106161372B (en) A kind of Risk Identification Method and device based on address matching
RU2635275C1 (en) System and method of identifying user's suspicious activity in user's interaction with various banking services
CN103443813B (en) System and method by mobile device authenticating transactions
US9614847B2 (en) User authentication
CN106161359A (en) The method and device of certification user, the method and device of registration wearable device
WO2017196609A1 (en) User authentication and access control using identity services
US11785010B2 (en) Method and system for authentication via location monitoring
CN108171486B (en) A kind of terminal with E-seal function
CN105931051A (en) Safety payment method and apparatus
CN110414197A (en) The bank-user auth method and device of Behavior-based control feature
CN104756142A (en) Method for phone authentication in e-business transactions and computer-readable recording medium having program for phone authentication in e-business transactions recorded thereon
CN104933565A (en) IC card transaction method and IC card transaction system
CN108734471A (en) Identity identifying method, device, system and storage medium in mobile-payment system
CN105100029A (en) Method and device for user identity verification
CN104168117A (en) Voice digital signature method
US20230050176A1 (en) Method of processing a transaction request
CN108961034A (en) System and method, storage medium based on user behavior certification
WO2020061434A1 (en) Systems and methods for conducting account tokenized transactions
CN109547554A (en) No card interactive system and simulation card apparatus
CN115099799B (en) Transaction processing method and system for digital RMB
CN105354740A (en) Method and apparatus for establishing personal credit information database
CN105279414A (en) Verification device based on fingerprint application and verification method based on fingerprint application
CN105225153A (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant