CN111754232B - Control method for verifying key fields before non-financial transaction - Google Patents
Control method for verifying key fields before non-financial transaction Download PDFInfo
- Publication number
- CN111754232B CN111754232B CN202010603049.1A CN202010603049A CN111754232B CN 111754232 B CN111754232 B CN 111754232B CN 202010603049 A CN202010603049 A CN 202010603049A CN 111754232 B CN111754232 B CN 111754232B
- Authority
- CN
- China
- Prior art keywords
- financial
- control constraint
- transaction
- financial control
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 95
- 238000012795 verification Methods 0.000 claims abstract description 11
- 230000004913 activation Effects 0.000 claims description 2
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000001994 activation Methods 0.000 description 2
- 238000013524 data verification Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Abstract
The invention relates to a control method for verifying key fields before non-financial transaction, which comprises the following steps: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error; and judging the non-financial control constraint in the non-financial control constraint method to the card number, the operation code and the password error type in sequence respectively so as to screen transactions entering the core system. According to the invention, the account information of the transaction client is verified by adopting a non-financial control constraint method, and the transaction which does not accord with the rule is directly refused and returned, so that the transaction pressure of the core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.
Description
Technical Field
The invention relates to the technical field of data verification, in particular to a control method for verifying key fields before non-financial transaction.
Background
According to different banking businesses, financial transactions and non-financial transactions are generally classified, and for non-financial transactions, different banking businesses have different requirements, and different control is required for the same or different non-financial transactions.
Currently, in the non-financial transaction process, code modification is required for each non-financial transaction, so that the existing modules are required to be repackaged and deployed, the transaction pressure of a core system is increased, and the transaction efficiency of the non-financial transaction is reduced.
Therefore, it is necessary to provide a control method for verifying the key fields before the non-financial transaction, so as to effectively reduce the transaction pressure of the core system, improve the efficiency of the non-financial transaction, and enable the business to be more free.
Disclosure of Invention
The invention aims to provide a control method for verifying key fields before non-financial transaction, so that the transaction pressure of a core system is effectively reduced, the efficiency of the non-financial transaction can be improved, and the business can be more free.
In order to solve the problems in the prior art, the invention provides a control method for verifying key fields before non-financial transaction, which comprises the following steps:
s1: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error;
s2: judging whether the card number is empty or not, if so, judging that the card number is free of non-financial control constraint, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to be passed, the step S3 is carried out, otherwise, the step S5 is carried out;
s3: judging whether the operation code is empty or not, if so, not considering the non-financial control constraint of the operation code, and performing step S4, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to pass, the step S4 is carried out, otherwise, the step S5 is carried out;
s4: judging whether the password error type is null or not, if so, not considering the non-financial control constraint of the password error type, if not, calling a non-financial control constraint method, if so, checking successfully, and entering a core system for transaction; otherwise, step S5 is carried out;
s5: and judging that the transaction corresponding to the transaction code does not accord with the rule, and directly rejecting the transaction.
Optionally, in the control method for verifying the key field before the non-financial transaction,
if the operation code is empty, the step S2 and the step S4 judge that the operation code passes through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code enters a core system for transaction;
if the password error type is null, judging in the step S2 and the step S3 that the password error type passes through the non-financial control constraint in the non-financial control constraint method, checking successfully, and entering a core system for transaction;
if the operation code and the password error type are both null, in step S2, it is determined that the operation code and the password error type pass through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code and the password error type enter the core system to conduct the transaction.
Optionally, in the control method for verifying the key field before the non-financial transaction, the non-financial control constraint method includes the following steps:
acquiring a non-financial control constraint set, wherein the non-financial control constraint set comprises control constraint details;
when the non-financial control constraint set and/or the control constraint detail are/is empty, judging that the non-financial control constraint in the non-financial control constraint method is passed;
and when the non-financial control constraint set and the control constraint detail are not empty, judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail.
Optionally, in the control method for verifying the key field before the non-financial transaction, a judging manner of judging whether to pass the non-financial control constraint in the non-financial control constraint method according to the control constraint detail is as follows:
when the control constraint detail is the locking code control, if the locking code does not exist in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is passed, and if the locking code exists in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is not passed;
when the control constraint detail is custom processing, if the custom processing condition is met, judging that the control constraint passes through the non-financial control constraint in the non-financial control constraint method, and if the custom processing condition is not met, judging that the control constraint does not pass through the non-financial control constraint in the non-financial control constraint method.
Optionally, in the control method for verifying the key field before the non-financial transaction, the custom processing condition includes activation processing and/or expiration processing;
if not, the self-defined processing condition is not satisfied, and if activated, the self-defined processing condition is satisfied;
if the user-defined processing condition is out of date, the user-defined processing condition is not met, and if the user-defined processing condition is not out of date, the user-defined processing condition is met.
Optionally, in the control method for verifying the key field before the non-financial transaction, the acquiring the non-financial control constraint set includes the following steps:
for step S2, acquiring a non-financial control constraint set according to the card number and the transaction code;
for step S3, the character string is spliced with the transaction code and the operation code to obtain a first value, and a non-financial control constraint set is obtained according to the card number and the first value;
and S4, the character string is spliced with the transaction code and the password error type code to obtain a value II, and a non-financial control constraint set is obtained according to the card number and the value II.
Optionally, in the control method for verifying the key field before the non-financial transaction, before obtaining the key field according to the transaction code, the method further includes the following steps:
the method comprises the steps that a front-end device receives a non-financial transaction request, wherein the non-financial transaction request comprises a transaction code;
the transaction routing system obtains a transaction code in the non-financial transaction request in the head-end equipment.
Optionally, in the control method for verifying the key field before the non-financial transaction,
the card number, the operation code and the type of the password error are in a request message of the non-financial transaction request.
In the control method for verifying the key field before the non-financial transaction, which is provided by the invention, the account information of the transaction client is verified by adopting the non-financial control constraint method, and the transaction which does not accord with the rule is directly refused and returned, so that the transaction pressure of a core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.
Drawings
FIG. 1 is a flowchart of a method for controlling verification according to an embodiment of the present invention;
fig. 2 is a flowchart of a non-financial control constraint method according to an embodiment of the present invention.
Detailed Description
Specific embodiments of the present invention will be described in more detail below with reference to the drawings. The advantages and features of the present invention will become more apparent from the following description. It should be noted that the drawings are in a very simplified form and are all to a non-precise scale, merely for convenience and clarity in aiding in the description of embodiments of the invention.
In the following, the terms "a" and "an" and the like are used to distinguish between similar elements and are not necessarily used to describe a particular order or chronological order. It is to be understood that such terms so used are interchangeable under appropriate circumstances. Similarly, if a method described herein comprises a series of steps, and the order of the steps presented herein is not necessarily the only order in which the steps may be performed, and some of the described steps may be omitted and/or some other steps not described herein may be added to the method.
Currently, in the non-financial transaction process, code modification is required for each non-financial transaction, so that the existing modules are required to be repackaged and deployed, the transaction pressure of a core system is increased, and the transaction efficiency of the non-financial transaction is reduced.
Therefore, it is necessary to provide a control method for verifying key fields before non-financial transaction, as shown in fig. 1, fig. 1 is a flowchart of a control method for verification provided in an embodiment of the present invention, where the control method includes the following steps:
s1: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error;
s2: judging whether the card number is empty or not, if so, judging that the card number is free of non-financial control constraint, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to be passed, the step S3 is carried out, otherwise, the step S5 is carried out;
s3: judging whether the operation code is empty or not, if so, not considering the non-financial control constraint of the operation code, and performing step S4, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to pass, the step S4 is carried out, otherwise, the step S5 is carried out;
s4: judging whether the password error type is null or not, if so, not considering the non-financial control constraint of the password error type, if not, calling a non-financial control constraint method, if so, checking successfully, and entering a core system for transaction; otherwise, step S5 is carried out;
s5: and judging that the transaction corresponding to the transaction code does not accord with the rule, and directly rejecting the transaction.
According to the invention, the account information of the transaction client is verified by adopting a non-financial control constraint method, and the transaction is directly refused and returned for the transaction which does not accord with the rule, so that the transaction pressure of the core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.
Preferably, in the control method for verifying the key field before the non-financial transaction, the method further includes the following situations:
if the operation code is empty, the step S2 and the step S4 judge that the operation code passes through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code enters a core system for transaction;
if the password error type is null, judging in the step S2 and the step S3 that the password error type passes through the non-financial control constraint in the non-financial control constraint method, checking successfully, and entering a core system for transaction;
if the operation code and the password error type are empty, in the step S2, the operation code and the password error type are judged to pass through the non-financial control constraint in the non-financial control constraint method, and the operation code and the password error type are checked successfully and enter a core system to conduct transaction;
when the non-financial control constraint judgment is carried out on the key fields, if any key field is not empty and can not pass the non-financial control constraint in the non-financial control constraint method, the transaction corresponding to the transaction code is judged to be out of compliance with the rule, and the transaction is directly refused.
Further, as shown in fig. 2, fig. 2 is a flowchart of a non-financial control constraint method provided by an embodiment of the present invention, where the non-financial control constraint method includes the following steps:
acquiring a non-financial control constraint set, wherein the non-financial control constraint set comprises control constraint details;
when the non-financial control constraint set and/or the control constraint detail are/is empty, judging that the non-financial control constraint in the non-financial control constraint method is passed;
and when the non-financial control constraint set and the control constraint detail are not empty, judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail.
Wherein obtaining the non-financial control constraint set comprises the steps of:
for step S2, acquiring a non-financial control constraint set according to the card number and the transaction code;
for step S3, the character string is spliced with the transaction code and the operation code to obtain a first value, and a non-financial control constraint set is obtained according to the card number and the first value;
and S4, the character string is spliced with the transaction code and the password error type code to obtain a value II, and a non-financial control constraint set is obtained according to the card number and the value II.
Preferably, a judging mode for judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail is as follows:
when the control constraint detail is the locking code control, if the locking code does not exist in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method passes, and if the locking code exists in the condition of the non-financial control constraint and comprises the condition existing in at least one condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method does not pass;
when the control constraint detail is custom processing, if the custom processing condition is met, judging that the control constraint passes through the non-financial control constraint in the non-financial control constraint method, and if the custom processing condition is not met, judging that the control constraint does not pass through the non-financial control constraint in the non-financial control constraint method.
Preferably, the custom processing condition comprises an activation process and/or an expiration process;
if not, the self-defined processing condition is not satisfied, and if activated, the self-defined processing condition is satisfied;
if the user-defined processing condition is out of date, the user-defined processing condition is not met, and if the user-defined processing condition is not out of date, the user-defined processing condition is met.
Typically, the method further comprises the following steps before acquiring the key field according to the transaction code: the method comprises the steps that a front-end device receives a non-financial transaction request, wherein the non-financial transaction request comprises a transaction code; the transaction routing system obtains a transaction code in the non-financial transaction request in the head-end equipment.
Optionally, in the control method for verifying the key field before the non-financial transaction,
the card number, the operation code and the type of the password error are in a request message of the non-financial transaction request.
In summary, in the control method for verifying the key field before the non-financial transaction, the account information of the transaction client is verified by adopting the non-financial control constraint method, and the transaction is directly refused and returned for the transaction which does not accord with the rule, so that the transaction pressure of the core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.
Furthermore, the invention does not need to modify codes for multiple times, ensures the stability of project processes, and achieves the aim of providing different business requirements for different banks through different parameter configurations.
The foregoing is merely a preferred embodiment of the present invention and is not intended to limit the present invention in any way. Any person skilled in the art will make any equivalent substitution or modification to the technical solution and technical content disclosed in the invention without departing from the scope of the technical solution of the invention, and the technical solution of the invention is not departing from the scope of the invention.
Claims (5)
1. A control method for verifying key fields prior to a non-financial transaction, comprising the steps of:
s1: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error;
s2: judging whether the card number is empty or not, if so, judging that the card number is free of non-financial control constraint, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to be passed, the step S3 is carried out, otherwise, the step S5 is carried out;
s3: judging whether the operation code is empty or not, if so, not considering the non-financial control constraint of the operation code, and performing step S4, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to pass, the step S4 is carried out, otherwise, the step S5 is carried out;
s4: judging whether the password error type is null or not, if so, not considering the non-financial control constraint of the password error type, if not, calling a non-financial control constraint method, if so, checking successfully, and entering a core system for transaction; otherwise, step S5 is carried out;
s5: determining that the transaction corresponding to the transaction code does not accord with the rule, and directly rejecting the transaction;
the non-financial control constraint method comprises the following steps:
acquiring a non-financial control constraint set, wherein the non-financial control constraint set comprises control constraint details;
when the non-financial control constraint set and/or the control constraint detail are/is empty, judging that the non-financial control constraint in the non-financial control constraint method is passed;
when the non-financial control constraint set and the control constraint detail are not empty, judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail;
the judging mode for judging whether the non-financial control constraint in the non-financial control constraint method is passed or not according to the control constraint detail is as follows:
when the control constraint detail is the locking code control, if the locking code does not exist in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is passed, and if the locking code exists in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is not passed;
when the control constraint details are custom processing, if the custom processing conditions are met, judging that the control constraint passes through the non-financial control constraint in the non-financial control constraint method, and if the custom processing conditions are not met, judging that the control constraint does not pass through the non-financial control constraint in the non-financial control constraint method;
the custom processing conditions comprise activation processing and expiration processing; if not, the self-defined processing condition is not satisfied, and if activated, the self-defined processing condition is satisfied; if the user-defined processing condition is out of date, the user-defined processing condition is not met, and if the user-defined processing condition is not out of date, the user-defined processing condition is met.
2. The method of claim 1, wherein the key fields are verified prior to the non-financial transaction,
if the operation code is empty, the step S2 and the step S4 judge that the operation code passes through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code enters a core system for transaction;
if the password error type is null, judging in the step S2 and the step S3 that the password error type passes through the non-financial control constraint in the non-financial control constraint method, checking successfully, and entering a core system for transaction;
if the operation code and the password error type are both null, in step S2, it is determined that the operation code and the password error type pass through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code and the password error type enter the core system to conduct the transaction.
3. The method of claim 1, wherein the step of obtaining the set of non-financial control constraints comprises the steps of:
for step S2, acquiring a non-financial control constraint set according to the card number and the transaction code;
for step S3, the character string is spliced with the transaction code and the operation code to obtain a first value, and a non-financial control constraint set is obtained according to the card number and the first value;
and S4, the character string is spliced with the transaction code and the password error type code to obtain a value II, and a non-financial control constraint set is obtained according to the card number and the value II.
4. The method of claim 1, further comprising the step of, prior to the step of obtaining the key field based on the transaction code:
the method comprises the steps that a front-end device receives a non-financial transaction request, wherein the non-financial transaction request comprises a transaction code;
the transaction routing system obtains a transaction code in the non-financial transaction request in the head-end equipment.
5. The method of claim 4, wherein the key fields are verified prior to the non-financial transaction,
the card number, the operation code and the type of the password error are in a request message of the non-financial transaction request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010603049.1A CN111754232B (en) | 2020-06-29 | 2020-06-29 | Control method for verifying key fields before non-financial transaction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010603049.1A CN111754232B (en) | 2020-06-29 | 2020-06-29 | Control method for verifying key fields before non-financial transaction |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111754232A CN111754232A (en) | 2020-10-09 |
CN111754232B true CN111754232B (en) | 2023-11-28 |
Family
ID=72677946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010603049.1A Active CN111754232B (en) | 2020-06-29 | 2020-06-29 | Control method for verifying key fields before non-financial transaction |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111754232B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4417136A (en) * | 1981-08-05 | 1983-11-22 | Ncr Canada Ltd - Ncr Canada Ltee | Method and apparatus for improving bank operation productivity |
JPH04315347A (en) * | 1991-04-15 | 1992-11-06 | Fujitsu Ltd | Method for detecting illegal use in telephone service using card |
JPH096864A (en) * | 1995-06-14 | 1997-01-10 | Nec Corp | Immediate membership system telephone betting system |
US5828053A (en) * | 1995-05-17 | 1998-10-27 | Kabushiki Kaisha Toshiba | Portable storage medium and portable storage medium issuing system |
CN1417702A (en) * | 2001-10-31 | 2003-05-14 | 梁钢 | Bank safety alarm system and method |
JP2007080007A (en) * | 2005-09-15 | 2007-03-29 | Dainippon Printing Co Ltd | Ic card, atm and identity authentication system |
CN101523427A (en) * | 2006-09-29 | 2009-09-02 | 丹·斯卡梅尔 | A system and method for verifying a user's identity in electronic transactions |
CN101968872A (en) * | 2010-09-03 | 2011-02-09 | 中国农业银行股份有限公司深圳市分行 | Financial secure transaction method |
CN102368338A (en) * | 2011-04-09 | 2012-03-07 | 冯林 | Method and system for verifying trader identity on ATM (Automatic Teller Machine) |
KR20130095548A (en) * | 2012-02-20 | 2013-08-28 | 주식회사 한국프라임테크놀로지 | Financial fraud warning system using banking transaction pattern analysis and a method thereof |
CN104580255A (en) * | 2015-02-02 | 2015-04-29 | 陈梅池 | Terminal equipment authentication method and terminal equipment authentication system based on identification equipment capable of identifying code streams |
WO2017127879A1 (en) * | 2016-01-29 | 2017-08-03 | Xard Group Pty Ltd | Indirect security system and method |
CN107833053A (en) * | 2017-10-18 | 2018-03-23 | 中国银行股份有限公司 | The Information Authentication method and device of core banking system |
CN109117235A (en) * | 2018-08-24 | 2019-01-01 | 腾讯科技(深圳)有限公司 | A kind of business data processing method, device and relevant device |
CN110287383A (en) * | 2019-06-28 | 2019-09-27 | 深圳前海微众银行股份有限公司 | A kind of field information method of inspection and device |
-
2020
- 2020-06-29 CN CN202010603049.1A patent/CN111754232B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4417136A (en) * | 1981-08-05 | 1983-11-22 | Ncr Canada Ltd - Ncr Canada Ltee | Method and apparatus for improving bank operation productivity |
JPH04315347A (en) * | 1991-04-15 | 1992-11-06 | Fujitsu Ltd | Method for detecting illegal use in telephone service using card |
US5828053A (en) * | 1995-05-17 | 1998-10-27 | Kabushiki Kaisha Toshiba | Portable storage medium and portable storage medium issuing system |
JPH096864A (en) * | 1995-06-14 | 1997-01-10 | Nec Corp | Immediate membership system telephone betting system |
CN1417702A (en) * | 2001-10-31 | 2003-05-14 | 梁钢 | Bank safety alarm system and method |
JP2007080007A (en) * | 2005-09-15 | 2007-03-29 | Dainippon Printing Co Ltd | Ic card, atm and identity authentication system |
CN101523427A (en) * | 2006-09-29 | 2009-09-02 | 丹·斯卡梅尔 | A system and method for verifying a user's identity in electronic transactions |
CN101968872A (en) * | 2010-09-03 | 2011-02-09 | 中国农业银行股份有限公司深圳市分行 | Financial secure transaction method |
CN102368338A (en) * | 2011-04-09 | 2012-03-07 | 冯林 | Method and system for verifying trader identity on ATM (Automatic Teller Machine) |
KR20130095548A (en) * | 2012-02-20 | 2013-08-28 | 주식회사 한국프라임테크놀로지 | Financial fraud warning system using banking transaction pattern analysis and a method thereof |
CN104580255A (en) * | 2015-02-02 | 2015-04-29 | 陈梅池 | Terminal equipment authentication method and terminal equipment authentication system based on identification equipment capable of identifying code streams |
WO2017127879A1 (en) * | 2016-01-29 | 2017-08-03 | Xard Group Pty Ltd | Indirect security system and method |
CN107833053A (en) * | 2017-10-18 | 2018-03-23 | 中国银行股份有限公司 | The Information Authentication method and device of core banking system |
CN109117235A (en) * | 2018-08-24 | 2019-01-01 | 腾讯科技(深圳)有限公司 | A kind of business data processing method, device and relevant device |
CN110287383A (en) * | 2019-06-28 | 2019-09-27 | 深圳前海微众银行股份有限公司 | A kind of field information method of inspection and device |
Non-Patent Citations (4)
Title |
---|
Consumer acceptance of biometrics for identity verification in financial transactions;Vahid Assadi et al.,;European Conference on Information Systems;第1-14页 * |
基于IC卡的密钥管理系统;程云;金融电子化;55(04);第74-75页 * |
金融交易密码多模态化方法;戴永等;计算机应用;第33卷(第01期);第135-137页 * |
银行客服系统模块设计与实现;高敏等;软件导刊;16(02);第109-112页 * |
Also Published As
Publication number | Publication date |
---|---|
CN111754232A (en) | 2020-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101952498B1 (en) | Loan service providing method using black chain and system performing the same | |
CN111819589B (en) | System and method for establishing common request processing | |
CN103714625B (en) | A kind of charging intelligent card method and system | |
CN110599174B (en) | Block chain information processing method and related equipment | |
CN109993651B (en) | Data accounting service instruction set checking method, device, computer equipment and medium | |
KR101260698B1 (en) | Method and system for call authentication using terminal information | |
CN112348326A (en) | Bank business processing method and system | |
CN111552942B (en) | Identity authentication method, system, device and computer storage medium | |
CN113076410A (en) | Abnormal information processing method, device, equipment and storage medium | |
US20150026770A1 (en) | Safety information transfer system, device and method based on extended parameter set | |
CN111754232B (en) | Control method for verifying key fields before non-financial transaction | |
CN113938481A (en) | Receipt processing method, processing device, electronic equipment and readable storage medium | |
CN107040497A (en) | Network account theft preventing method and device | |
CN110675247B (en) | Unknown transaction processing method and system, peripheral system and core bank system | |
CN112116306A (en) | Medical reconciliation method based on T +0/N combination | |
CN111105224A (en) | Payment feedback information processing method and device, electronic equipment and storage medium | |
CN111400187A (en) | Parameter dynamic verification system and method based on customized data source | |
WO2022116587A1 (en) | Web end data signature method and apparatus, and computer device | |
CN114255134A (en) | Account number disassembling method and device and storage medium | |
CN111930535B (en) | Application function calling method and device, computer equipment and storage medium | |
CN111614642B (en) | Method, device and system for registration authentication | |
CN114579341A (en) | Card making method, device and equipment of all-in-one union pay card and readable storage medium | |
CN107909370B (en) | Multiple safety control method and system for electronic payment platform | |
US20200042965A1 (en) | Linking events with lineage rules | |
CN115713330B (en) | Multi-payment-item split payment method, system, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |