CN111709803A - Method and system for preventing unauthorized business handling - Google Patents

Method and system for preventing unauthorized business handling Download PDF

Info

Publication number
CN111709803A
CN111709803A CN202010536534.1A CN202010536534A CN111709803A CN 111709803 A CN111709803 A CN 111709803A CN 202010536534 A CN202010536534 A CN 202010536534A CN 111709803 A CN111709803 A CN 111709803A
Authority
CN
China
Prior art keywords
information
override
service
checking
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010536534.1A
Other languages
Chinese (zh)
Other versions
CN111709803B (en
Inventor
赵东伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Si Tech Information Technology Co Ltd
Original Assignee
Beijing Si Tech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Si Tech Information Technology Co Ltd filed Critical Beijing Si Tech Information Technology Co Ltd
Priority to CN202010536534.1A priority Critical patent/CN111709803B/en
Publication of CN111709803A publication Critical patent/CN111709803A/en
Application granted granted Critical
Publication of CN111709803B publication Critical patent/CN111709803B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • G06Q50/60

Abstract

The invention relates to a method and a system for preventing unauthorized business handling, which comprises a client side, a server side and a server side, wherein the client side sends business handling information and business handling ID (identity) corresponding to a processed business order to the server side; the server side determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, stores the override verification information into an override verification table, and then sends the override verification information to the client side; when the client submits the service order, inquiring the override checking table according to the override checking information to obtain first checking information and a service acceptance ID, and sending the first checking information and the service acceptance ID to the server; and the server side inquires the override checking table according to the service acceptance ID to obtain second checking information, and determines whether the service order passes the override-proof checking according to a comparison result of the first checking information and the second checking information. The invention provides a method for preventing unauthorized attack, which can prevent unauthorized attack without depending on encryption and decryption.

Description

Method and system for preventing unauthorized business handling
Technical Field
The invention relates to the technical field of telecommunication services, in particular to a method and a system for preventing unauthorized service handling.
Background
The CRM system in the telecommunication industry is a relatively complex IT support system in China and has characteristics and requirements in the aspect of safety protection.
In the current telecommunication CRM system, the background of a traditional worker acceptance page and an order center is in an enterprise private network of the telecommunication system, and the data transmission of the foreground and the background does not adopt technical means such as message encryption and the like. Some agent partners are also connected to the private corporate network for telecommunications via a VPN, and business acceptance pages are also made available to the agent's staff. Under the specific background, once a malicious technician intercepts an order creating message of an order center, the purpose of illegally handling business can be achieved by calling order creating service of the order center through a malicious program through a technical means of parameter modification.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method and a system for preventing unauthorized business handling aiming at the defects of the prior art.
The technical scheme for solving the technical problems is as follows:
a method of preventing unauthorized transaction of a transaction, the method comprising:
the client side sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server side;
the server side determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, stores the override verification information into an override verification table, and then sends the override verification information to the client side;
when the client submits the service order, inquiring the override checking table according to the override checking information to obtain first checking information and the service acceptance ID, and sending the first checking information and the service acceptance ID to a server;
and the server side inquires the override checking table according to the service acceptance ID to obtain second checking information, and determines whether the service order passes the override-proof checking according to the comparison result of the first checking information and the second checking information.
The invention has the beneficial effects that: the method for preventing the unauthorized transaction of the service comprises the steps that a client sends service acceptance information and a service acceptance ID corresponding to a processed service order to a server, the server determines unauthorized verification information according to the service acceptance information, the service acceptance ID and an unauthorized verification rule base, stores the unauthorized verification information into an unauthorized verification table and then sends the unauthorized verification information to the client; when the client submits the service order, inquiring the override checking table according to the override checking information to obtain first checking information and a service acceptance ID, and sending the first checking information and the service acceptance ID to the server; and the server side inquires the override checking table according to the service acceptance ID to obtain second checking information, and determines whether the service order passes the override-proof checking according to a comparison result of the first checking information and the second checking information. The invention provides a method for preventing unauthorized attack, which can prevent unauthorized attack without depending on encryption and decryption.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, the server determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and specifically includes:
inquiring the override verification rule base according to the service acceptance information to determine an override verification rule;
screening out pre-override checking information from the service acceptance information according to the override checking rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
The beneficial effect of adopting the further scheme is that: according to the service acceptance information, the override verification information is determined, the override verification information can be flexibly customized, and the capability of preventing override attack is improved.
Further, the server determines whether the service order passes the anti-unauthorized verification according to a comparison result between the first verification information and the second verification information, and specifically includes:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the anti-unauthorized check;
otherwise, the business order fails the anti-unauthorized verification.
Further, before the client sends the service acceptance information and the service acceptance ID to the server, the method further includes:
the client side obtains the business acceptance information corresponding to the business order and generates a business acceptance ID according to the business acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
Another technical solution of the present invention for solving the above technical problems is as follows:
a system for preventing unauthorized transaction of business comprises a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client;
the client is used for inquiring the override checking table according to the override checking information when the service order is submitted to obtain first checking information and the service acceptance ID, and sending the first checking information and the service acceptance ID to the server;
the service end is used for inquiring the override checking table according to the service acceptance ID to obtain second checking information, and determining whether the service order passes the override-proof checking according to the comparison result of the first checking information and the second checking information.
The invention has the beneficial effects that: the system comprises a client, a server and a client, wherein the client is used for sending service acceptance information and a service acceptance ID corresponding to a processed service order to the server, the server determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and the override verification information is stored in an override verification table and then is sent to the client; when the client submits the service order, inquiring the override checking table according to the override checking information to obtain first checking information and a service acceptance ID, and sending the first checking information and the service acceptance ID to the server; and the server side inquires the override checking table according to the service acceptance ID to obtain second checking information, and determines whether the service order passes the override-proof checking according to a comparison result of the first checking information and the second checking information. The invention provides a system for preventing unauthorized attack, which can prevent unauthorized attack without depending on encryption and decryption.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, the server is specifically configured to query the override verification rule base according to the service acceptance information, and determine an override verification rule;
screening out pre-override checking information from the service acceptance information according to the override checking rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server is specifically configured to compare the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the anti-unauthorized check;
otherwise, the business order fails the anti-unauthorized verification.
Further, the customer order is further configured to obtain service acceptance information corresponding to the service order, and generate a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
Advantages of additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention or in the description of the prior art will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method for preventing unauthorized transaction of a service according to an embodiment of the present invention;
fig. 2 is an architecture diagram of a system for preventing unauthorized transaction according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, shall fall within the scope of protection of the present invention.
As shown in fig. 1, a flow chart of a method for preventing unauthorized transaction according to an embodiment of the present invention is schematically shown, and the method for preventing unauthorized transaction includes the following steps:
110. and the client side sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server side.
120. And the server side determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, stores the override verification information into the override verification table and then sends the override verification information to the client side.
130. When the client submits the service order, the override checking table is inquired according to the override checking information to obtain first checking information and a service acceptance ID, and the first checking information and the service acceptance ID are sent to the server.
140. And the server side inquires the override checking table according to the service acceptance ID to obtain second checking information, and determines whether the service order passes the override-proof checking according to a comparison result of the first checking information and the second checking information.
It should be understood that the client may be a terminal of a staff member in a business hall or other device, and the server may be a server configured with an order center, wherein the unauthorized check list may be stored in a database, may be a separate database server or a database in the order center server.
The method for preventing the unauthorized transaction of the service is provided based on the embodiment, and comprises the steps that a client sends service acceptance information and a service acceptance ID corresponding to a processed service order to a server, the server determines unauthorized check information according to the service acceptance information, the service acceptance ID and an unauthorized check rule base, and the unauthorized check information is stored in an unauthorized check table and then is sent to the client; when the client submits the service order, inquiring the override checking table according to the override checking information to obtain first checking information and a service acceptance ID, and sending the first checking information and the service acceptance ID to the server; and the server side inquires the override checking table according to the service acceptance ID to obtain second checking information, and determines whether the service order passes the override-proof checking according to a comparison result of the first checking information and the second checking information. The invention provides a method for preventing unauthorized attack, which can prevent unauthorized attack without depending on encryption and decryption.
Further, the server determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and specifically includes:
inquiring the override verification rule base according to the service acceptance information to determine an override verification rule;
screening out pre-override checking information from the service acceptance information according to the override checking rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server determines whether the service order passes the anti-unauthorized verification according to a comparison result between the first verification information and the second verification information, and specifically includes:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the anti-unauthorized check;
otherwise, the business order fails the anti-unauthorized verification.
Further, before the client sends the service acceptance information and the service acceptance ID to the server, the method further includes:
the client side obtains the business acceptance information corresponding to the business order and generates a business acceptance ID according to the business acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
It should be understood that, for example, when a customer needs to handle a service, a worker logs in a telecom CRM acceptance page, inputs a mobile phone number of the service to be handled, acquires service acceptance information, and generates a service acceptance ID according to the service acceptance information, the service acceptance ID being a unique identifier of the service order, and transmits the service acceptance information to an order center. The service acceptance information includes basic information of a worker and user information for performing service acceptance. The order center reads the override verification rule from the database, and selects part of information from the service acceptance ID and the service acceptance information according to the override verification rule to record so as to form the override verification information, wherein the selection of the part of information of the service acceptance information depends on the override verification rule, and the information selected by different rules is different.
When the staff finishes filling information required by the transaction service and submits the order, inquiring the override checking table according to the override checking information to obtain first checking information and a service acceptance ID, and sending the first checking information, the service acceptance ID and the service order information to an order center.
The order center analyzes the first check information and the service acceptance ID, then the first check information and the second check information are inquired in the override check table through the service acceptance ID to obtain second check information, the first check information and the second check information are compared, if the data are consistent, the override-proof check is passed, the order can be generated for service acceptance, if the data are inconsistent or the data cannot be inquired from the table, the override-proof check is failed, and order creation is not performed. The override checking rule table may be stored in an order center or other storage device, and includes fields including "service acceptance ID", "service code", and "rule detail". The granularity of the anti-unauthorized check can be controlled through the 'service code' field, and the validation and invalidation rules of the anti-unauthorized check can be controlled through the 'switch'.
As shown in fig. 2, which is an architecture diagram of a system for preventing unauthorized transaction according to an embodiment of the present invention, a system for preventing unauthorized transaction includes a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client;
the client is used for inquiring the override checking table according to the override checking information when the service order is submitted to obtain first checking information and the service acceptance ID, and sending the first checking information and the service acceptance ID to the server;
the service end is used for inquiring the override checking table according to the service acceptance ID to obtain second checking information, and determining whether the service order passes the override-proof checking according to the comparison result of the first checking information and the second checking information.
Further, the server is specifically configured to query the override verification rule base according to the service acceptance information, and determine an override verification rule;
screening out pre-override checking information from the service acceptance information according to the override checking rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server is specifically configured to compare the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the anti-unauthorized check;
otherwise, the business order fails the anti-unauthorized verification.
Further, the customer order is further configured to obtain service acceptance information corresponding to the service order, and generate a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for preventing unauthorized transaction of a transaction, the method comprising:
the client side sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server side;
the server side determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, stores the override verification information into an override verification table, and then sends the override verification information to the client side;
when the client submits the service order, inquiring the override checking table according to the override checking information to obtain first checking information and the service acceptance ID, and sending the first checking information and the service acceptance ID to a server;
and the server side inquires the override checking table according to the service acceptance ID to obtain second checking information, and determines whether the service order passes the override-proof checking according to the comparison result of the first checking information and the second checking information.
2. The method for preventing unauthorized transaction of service according to claim 1, wherein the server determines unauthorized verification information according to the service acceptance information, the service acceptance ID and an unauthorized verification rule base, and specifically comprises:
inquiring the override verification rule base according to the service acceptance information to determine an override verification rule;
screening out pre-override checking information from the service acceptance information according to the override checking rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
3. The method for preventing unauthorized transaction of business as claimed in claim 1, wherein the step of the server determining whether the business order passes the unauthorized verification according to the comparison result between the first verification information and the second verification information comprises:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the anti-unauthorized check;
otherwise, the business order fails the anti-unauthorized verification.
4. The method for preventing unauthorized transaction of service according to claim 1, wherein before the client sends the service acceptance information and the service acceptance ID to the server, the method further comprises:
the client side obtains the business acceptance information corresponding to the business order and generates a business acceptance ID according to the business acceptance information.
5. A method for preventing unauthorized transaction according to any of claims 1-4, wherein the service acceptance information includes staff information for transaction of the service order, customer information and information of the service order.
6. A system for preventing unauthorized transaction of business is characterized in that the system comprises a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client;
the client is used for inquiring the override checking table according to the override checking information when the service order is submitted to obtain first checking information and the service acceptance ID, and sending the first checking information and the service acceptance ID to the server;
the service end is used for inquiring the override checking table according to the service acceptance ID to obtain second checking information, and determining whether the service order passes the override-proof checking according to the comparison result of the first checking information and the second checking information.
7. The system for preventing unauthorized transaction of services according to claim 6, wherein:
the server is specifically used for inquiring the override verification rule base according to the service acceptance information and determining the override verification rule;
screening out pre-override checking information from the service acceptance information according to the override checking rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
8. The system for preventing unauthorized transaction of services according to claim 6, wherein:
the server is specifically configured to compare the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the anti-unauthorized check;
otherwise, the business order fails the anti-unauthorized verification.
9. The system for preventing unauthorized transaction of services according to claim 6,
the customer order is also used for acquiring the service acceptance information corresponding to the service order and generating the service acceptance ID according to the service acceptance information.
10. A system for preventing unauthorized transaction according to any of claims 6-9, wherein the service acceptance information includes staff information for transaction of the service order, customer information and information of the service order.
CN202010536534.1A 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling Active CN111709803B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010536534.1A CN111709803B (en) 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010536534.1A CN111709803B (en) 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling

Publications (2)

Publication Number Publication Date
CN111709803A true CN111709803A (en) 2020-09-25
CN111709803B CN111709803B (en) 2023-09-05

Family

ID=72540251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010536534.1A Active CN111709803B (en) 2020-06-12 2020-06-12 Method and system for preventing unauthorized business handling

Country Status (1)

Country Link
CN (1) CN111709803B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445824A (en) * 2020-11-11 2021-03-05 北京思特奇信息技术股份有限公司 Abnormal order user information sharing system and method based on block chain

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030061172A1 (en) * 2001-09-21 2003-03-27 Timothy Robinson System and method for biometric authorization for financial transactions
US20060074986A1 (en) * 2004-08-20 2006-04-06 Viisage Technology, Inc. Method and system to authenticate an object
CN102932332A (en) * 2012-09-28 2013-02-13 用友软件股份有限公司 Data verifying system and data verifying method
CN107360187A (en) * 2017-08-21 2017-11-17 网宿科技股份有限公司 A kind of processing method of network abduction, apparatus and system
CN107395659A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of method and device of service handling and common recognition
CN107426169A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of method for processing business and device based on authority
CN108616360A (en) * 2018-03-22 2018-10-02 阿里巴巴集团控股有限公司 User identity verification, register method and device
CN108650214A (en) * 2018-03-16 2018-10-12 交通银行股份有限公司 The anti-method and device of going beyond one's commission of dynamic page encryption
CN109034816A (en) * 2018-06-08 2018-12-18 平安科技(深圳)有限公司 User information verification method, device, computer equipment and storage medium
CN109600377A (en) * 2018-12-13 2019-04-09 平安科技(深圳)有限公司 Anti- go beyond one's commission method, apparatus, computer equipment and storage medium
CN110111188A (en) * 2019-05-23 2019-08-09 中国联合网络通信集团有限公司 Business handling method and apparatus
CN110381060A (en) * 2019-07-19 2019-10-25 百度(中国)有限公司 Data processing method, device, system and storage medium
CN110597837A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Service data processing method, device, storage medium and computer equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030061172A1 (en) * 2001-09-21 2003-03-27 Timothy Robinson System and method for biometric authorization for financial transactions
US20060074986A1 (en) * 2004-08-20 2006-04-06 Viisage Technology, Inc. Method and system to authenticate an object
CN102932332A (en) * 2012-09-28 2013-02-13 用友软件股份有限公司 Data verifying system and data verifying method
CN107395659A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of method and device of service handling and common recognition
CN107426169A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of method for processing business and device based on authority
CN107360187A (en) * 2017-08-21 2017-11-17 网宿科技股份有限公司 A kind of processing method of network abduction, apparatus and system
CN108650214A (en) * 2018-03-16 2018-10-12 交通银行股份有限公司 The anti-method and device of going beyond one's commission of dynamic page encryption
CN108616360A (en) * 2018-03-22 2018-10-02 阿里巴巴集团控股有限公司 User identity verification, register method and device
CN109034816A (en) * 2018-06-08 2018-12-18 平安科技(深圳)有限公司 User information verification method, device, computer equipment and storage medium
CN109600377A (en) * 2018-12-13 2019-04-09 平安科技(深圳)有限公司 Anti- go beyond one's commission method, apparatus, computer equipment and storage medium
CN110111188A (en) * 2019-05-23 2019-08-09 中国联合网络通信集团有限公司 Business handling method and apparatus
CN110381060A (en) * 2019-07-19 2019-10-25 百度(中国)有限公司 Data processing method, device, system and storage medium
CN110597837A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Service data processing method, device, storage medium and computer equipment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
刘松山;胡玉玺;: "掌上业务受理系统的设计与实现" *
刘松山;胡玉玺;: "掌上业务受理系统的设计与实现", 有线电视技术, no. 10 *
戴云, 范平志: "实现安全数据库的一种方法――数据库安全通信服务", 计算机工程与应用, no. 22 *
戴云,范平志: "实现安全数据库的一种方法――数据库安全通信服务" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445824A (en) * 2020-11-11 2021-03-05 北京思特奇信息技术股份有限公司 Abnormal order user information sharing system and method based on block chain
CN112445824B (en) * 2020-11-11 2024-02-02 北京思特奇信息技术股份有限公司 Abnormal order user information sharing system and method based on block chain

Also Published As

Publication number Publication date
CN111709803B (en) 2023-09-05

Similar Documents

Publication Publication Date Title
CN109840591B (en) Model training system, method and storage medium
US10117098B1 (en) User authentication verification service
CN109787991A (en) Exempt from close login method, device, equipment and storage medium based on mobile terminal
CN108307333B (en) Method and device for transmitting intermediate number for mobile communication equipment and storage medium
CN111030812A (en) Token verification method, device, storage medium and server
CN110795174B (en) Application program interface calling method, device, equipment and readable storage medium
CN108737975A (en) Communication control method
CN107483477B (en) Account management method and account management system
CN113098758B (en) Enterprise message pushing security gateway system based on enterprise WeChat
CN111709803B (en) Method and system for preventing unauthorized business handling
CN111526143B (en) Method and device for realizing anti-unauthorized access of CRM system and storage medium
RU2689441C1 (en) System and method of monitoring communication, and/or detecting scammers, and/or authenticating statements/allegations of belonging to any organization
CN107026814B (en) Login verification method and device of sub-service application program
CN108540374B (en) Information processing method, device, equipment and storage medium based on instant messaging
CN113810535B (en) Information processing method and electronic device
CN112004228B (en) Real person authentication method and system
CN114006984A (en) Recipient privacy protection method and device, computer equipment and storage medium
CN109088854B (en) Access method and device of shared application and readable storage medium
CN107820222B (en) Method and device for managing multiple tenants
CN110807181A (en) Method, device and system for logging in and verifying database in enterprise
CN113821284B (en) Interface display method and electronic equipment
CN110636494B (en) Network connection method and device of virtual SIM card and computer readable storage medium
CN104348839B (en) Network communication method, device and system
CN114548904A (en) CRM (customer relationship management) business handling method and system under user's knowledge
CN116846585A (en) Digital identity and account authentication method and device thereof and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant