CN111754232B - Control method for verifying key fields before non-financial transaction - Google Patents

Control method for verifying key fields before non-financial transaction Download PDF

Info

Publication number
CN111754232B
CN111754232B CN202010603049.1A CN202010603049A CN111754232B CN 111754232 B CN111754232 B CN 111754232B CN 202010603049 A CN202010603049 A CN 202010603049A CN 111754232 B CN111754232 B CN 111754232B
Authority
CN
China
Prior art keywords
financial
control constraint
transaction
financial control
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010603049.1A
Other languages
Chinese (zh)
Other versions
CN111754232A (en
Inventor
陈皓杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Tonglian Financial Services Co Ltd
Original Assignee
Shanghai Tonglian Financial Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Tonglian Financial Services Co Ltd filed Critical Shanghai Tonglian Financial Services Co Ltd
Priority to CN202010603049.1A priority Critical patent/CN111754232B/en
Publication of CN111754232A publication Critical patent/CN111754232A/en
Application granted granted Critical
Publication of CN111754232B publication Critical patent/CN111754232B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Abstract

The invention relates to a control method for verifying key fields before non-financial transaction, which comprises the following steps: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error; and judging the non-financial control constraint in the non-financial control constraint method to the card number, the operation code and the password error type in sequence respectively so as to screen transactions entering the core system. According to the invention, the account information of the transaction client is verified by adopting a non-financial control constraint method, and the transaction which does not accord with the rule is directly refused and returned, so that the transaction pressure of the core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.

Description

Control method for verifying key fields before non-financial transaction
Technical Field
The invention relates to the technical field of data verification, in particular to a control method for verifying key fields before non-financial transaction.
Background
According to different banking businesses, financial transactions and non-financial transactions are generally classified, and for non-financial transactions, different banking businesses have different requirements, and different control is required for the same or different non-financial transactions.
Currently, in the non-financial transaction process, code modification is required for each non-financial transaction, so that the existing modules are required to be repackaged and deployed, the transaction pressure of a core system is increased, and the transaction efficiency of the non-financial transaction is reduced.
Therefore, it is necessary to provide a control method for verifying the key fields before the non-financial transaction, so as to effectively reduce the transaction pressure of the core system, improve the efficiency of the non-financial transaction, and enable the business to be more free.
Disclosure of Invention
The invention aims to provide a control method for verifying key fields before non-financial transaction, so that the transaction pressure of a core system is effectively reduced, the efficiency of the non-financial transaction can be improved, and the business can be more free.
In order to solve the problems in the prior art, the invention provides a control method for verifying key fields before non-financial transaction, which comprises the following steps:
s1: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error;
s2: judging whether the card number is empty or not, if so, judging that the card number is free of non-financial control constraint, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to be passed, the step S3 is carried out, otherwise, the step S5 is carried out;
s3: judging whether the operation code is empty or not, if so, not considering the non-financial control constraint of the operation code, and performing step S4, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to pass, the step S4 is carried out, otherwise, the step S5 is carried out;
s4: judging whether the password error type is null or not, if so, not considering the non-financial control constraint of the password error type, if not, calling a non-financial control constraint method, if so, checking successfully, and entering a core system for transaction; otherwise, step S5 is carried out;
s5: and judging that the transaction corresponding to the transaction code does not accord with the rule, and directly rejecting the transaction.
Optionally, in the control method for verifying the key field before the non-financial transaction,
if the operation code is empty, the step S2 and the step S4 judge that the operation code passes through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code enters a core system for transaction;
if the password error type is null, judging in the step S2 and the step S3 that the password error type passes through the non-financial control constraint in the non-financial control constraint method, checking successfully, and entering a core system for transaction;
if the operation code and the password error type are both null, in step S2, it is determined that the operation code and the password error type pass through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code and the password error type enter the core system to conduct the transaction.
Optionally, in the control method for verifying the key field before the non-financial transaction, the non-financial control constraint method includes the following steps:
acquiring a non-financial control constraint set, wherein the non-financial control constraint set comprises control constraint details;
when the non-financial control constraint set and/or the control constraint detail are/is empty, judging that the non-financial control constraint in the non-financial control constraint method is passed;
and when the non-financial control constraint set and the control constraint detail are not empty, judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail.
Optionally, in the control method for verifying the key field before the non-financial transaction, a judging manner of judging whether to pass the non-financial control constraint in the non-financial control constraint method according to the control constraint detail is as follows:
when the control constraint detail is the locking code control, if the locking code does not exist in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is passed, and if the locking code exists in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is not passed;
when the control constraint detail is custom processing, if the custom processing condition is met, judging that the control constraint passes through the non-financial control constraint in the non-financial control constraint method, and if the custom processing condition is not met, judging that the control constraint does not pass through the non-financial control constraint in the non-financial control constraint method.
Optionally, in the control method for verifying the key field before the non-financial transaction, the custom processing condition includes activation processing and/or expiration processing;
if not, the self-defined processing condition is not satisfied, and if activated, the self-defined processing condition is satisfied;
if the user-defined processing condition is out of date, the user-defined processing condition is not met, and if the user-defined processing condition is not out of date, the user-defined processing condition is met.
Optionally, in the control method for verifying the key field before the non-financial transaction, the acquiring the non-financial control constraint set includes the following steps:
for step S2, acquiring a non-financial control constraint set according to the card number and the transaction code;
for step S3, the character string is spliced with the transaction code and the operation code to obtain a first value, and a non-financial control constraint set is obtained according to the card number and the first value;
and S4, the character string is spliced with the transaction code and the password error type code to obtain a value II, and a non-financial control constraint set is obtained according to the card number and the value II.
Optionally, in the control method for verifying the key field before the non-financial transaction, before obtaining the key field according to the transaction code, the method further includes the following steps:
the method comprises the steps that a front-end device receives a non-financial transaction request, wherein the non-financial transaction request comprises a transaction code;
the transaction routing system obtains a transaction code in the non-financial transaction request in the head-end equipment.
Optionally, in the control method for verifying the key field before the non-financial transaction,
the card number, the operation code and the type of the password error are in a request message of the non-financial transaction request.
In the control method for verifying the key field before the non-financial transaction, which is provided by the invention, the account information of the transaction client is verified by adopting the non-financial control constraint method, and the transaction which does not accord with the rule is directly refused and returned, so that the transaction pressure of a core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.
Drawings
FIG. 1 is a flowchart of a method for controlling verification according to an embodiment of the present invention;
fig. 2 is a flowchart of a non-financial control constraint method according to an embodiment of the present invention.
Detailed Description
Specific embodiments of the present invention will be described in more detail below with reference to the drawings. The advantages and features of the present invention will become more apparent from the following description. It should be noted that the drawings are in a very simplified form and are all to a non-precise scale, merely for convenience and clarity in aiding in the description of embodiments of the invention.
In the following, the terms "a" and "an" and the like are used to distinguish between similar elements and are not necessarily used to describe a particular order or chronological order. It is to be understood that such terms so used are interchangeable under appropriate circumstances. Similarly, if a method described herein comprises a series of steps, and the order of the steps presented herein is not necessarily the only order in which the steps may be performed, and some of the described steps may be omitted and/or some other steps not described herein may be added to the method.
Currently, in the non-financial transaction process, code modification is required for each non-financial transaction, so that the existing modules are required to be repackaged and deployed, the transaction pressure of a core system is increased, and the transaction efficiency of the non-financial transaction is reduced.
Therefore, it is necessary to provide a control method for verifying key fields before non-financial transaction, as shown in fig. 1, fig. 1 is a flowchart of a control method for verification provided in an embodiment of the present invention, where the control method includes the following steps:
s1: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error;
s2: judging whether the card number is empty or not, if so, judging that the card number is free of non-financial control constraint, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to be passed, the step S3 is carried out, otherwise, the step S5 is carried out;
s3: judging whether the operation code is empty or not, if so, not considering the non-financial control constraint of the operation code, and performing step S4, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to pass, the step S4 is carried out, otherwise, the step S5 is carried out;
s4: judging whether the password error type is null or not, if so, not considering the non-financial control constraint of the password error type, if not, calling a non-financial control constraint method, if so, checking successfully, and entering a core system for transaction; otherwise, step S5 is carried out;
s5: and judging that the transaction corresponding to the transaction code does not accord with the rule, and directly rejecting the transaction.
According to the invention, the account information of the transaction client is verified by adopting a non-financial control constraint method, and the transaction is directly refused and returned for the transaction which does not accord with the rule, so that the transaction pressure of the core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.
Preferably, in the control method for verifying the key field before the non-financial transaction, the method further includes the following situations:
if the operation code is empty, the step S2 and the step S4 judge that the operation code passes through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code enters a core system for transaction;
if the password error type is null, judging in the step S2 and the step S3 that the password error type passes through the non-financial control constraint in the non-financial control constraint method, checking successfully, and entering a core system for transaction;
if the operation code and the password error type are empty, in the step S2, the operation code and the password error type are judged to pass through the non-financial control constraint in the non-financial control constraint method, and the operation code and the password error type are checked successfully and enter a core system to conduct transaction;
when the non-financial control constraint judgment is carried out on the key fields, if any key field is not empty and can not pass the non-financial control constraint in the non-financial control constraint method, the transaction corresponding to the transaction code is judged to be out of compliance with the rule, and the transaction is directly refused.
Further, as shown in fig. 2, fig. 2 is a flowchart of a non-financial control constraint method provided by an embodiment of the present invention, where the non-financial control constraint method includes the following steps:
acquiring a non-financial control constraint set, wherein the non-financial control constraint set comprises control constraint details;
when the non-financial control constraint set and/or the control constraint detail are/is empty, judging that the non-financial control constraint in the non-financial control constraint method is passed;
and when the non-financial control constraint set and the control constraint detail are not empty, judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail.
Wherein obtaining the non-financial control constraint set comprises the steps of:
for step S2, acquiring a non-financial control constraint set according to the card number and the transaction code;
for step S3, the character string is spliced with the transaction code and the operation code to obtain a first value, and a non-financial control constraint set is obtained according to the card number and the first value;
and S4, the character string is spliced with the transaction code and the password error type code to obtain a value II, and a non-financial control constraint set is obtained according to the card number and the value II.
Preferably, a judging mode for judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail is as follows:
when the control constraint detail is the locking code control, if the locking code does not exist in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method passes, and if the locking code exists in the condition of the non-financial control constraint and comprises the condition existing in at least one condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method does not pass;
when the control constraint detail is custom processing, if the custom processing condition is met, judging that the control constraint passes through the non-financial control constraint in the non-financial control constraint method, and if the custom processing condition is not met, judging that the control constraint does not pass through the non-financial control constraint in the non-financial control constraint method.
Preferably, the custom processing condition comprises an activation process and/or an expiration process;
if not, the self-defined processing condition is not satisfied, and if activated, the self-defined processing condition is satisfied;
if the user-defined processing condition is out of date, the user-defined processing condition is not met, and if the user-defined processing condition is not out of date, the user-defined processing condition is met.
Typically, the method further comprises the following steps before acquiring the key field according to the transaction code: the method comprises the steps that a front-end device receives a non-financial transaction request, wherein the non-financial transaction request comprises a transaction code; the transaction routing system obtains a transaction code in the non-financial transaction request in the head-end equipment.
Optionally, in the control method for verifying the key field before the non-financial transaction,
the card number, the operation code and the type of the password error are in a request message of the non-financial transaction request.
In summary, in the control method for verifying the key field before the non-financial transaction, the account information of the transaction client is verified by adopting the non-financial control constraint method, and the transaction is directly refused and returned for the transaction which does not accord with the rule, so that the transaction pressure of the core system is effectively reduced. And for different non-financial transactions, or the same non-financial transaction with different operation types and different control constraints is configured, the non-financial transaction verification customization is adopted, so that the transaction efficiency is improved and the business is free.
Furthermore, the invention does not need to modify codes for multiple times, ensures the stability of project processes, and achieves the aim of providing different business requirements for different banks through different parameter configurations.
The foregoing is merely a preferred embodiment of the present invention and is not intended to limit the present invention in any way. Any person skilled in the art will make any equivalent substitution or modification to the technical solution and technical content disclosed in the invention without departing from the scope of the technical solution of the invention, and the technical solution of the invention is not departing from the scope of the invention.

Claims (5)

1. A control method for verifying key fields prior to a non-financial transaction, comprising the steps of:
s1: acquiring key fields according to the transaction code, wherein the key fields comprise: card number, opcode, and type of password error;
s2: judging whether the card number is empty or not, if so, judging that the card number is free of non-financial control constraint, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to be passed, the step S3 is carried out, otherwise, the step S5 is carried out;
s3: judging whether the operation code is empty or not, if so, not considering the non-financial control constraint of the operation code, and performing step S4, and if not, calling a non-financial control constraint method; if the non-financial control constraint in the non-financial control constraint method is judged to pass, the step S4 is carried out, otherwise, the step S5 is carried out;
s4: judging whether the password error type is null or not, if so, not considering the non-financial control constraint of the password error type, if not, calling a non-financial control constraint method, if so, checking successfully, and entering a core system for transaction; otherwise, step S5 is carried out;
s5: determining that the transaction corresponding to the transaction code does not accord with the rule, and directly rejecting the transaction;
the non-financial control constraint method comprises the following steps:
acquiring a non-financial control constraint set, wherein the non-financial control constraint set comprises control constraint details;
when the non-financial control constraint set and/or the control constraint detail are/is empty, judging that the non-financial control constraint in the non-financial control constraint method is passed;
when the non-financial control constraint set and the control constraint detail are not empty, judging whether the non-financial control constraint in the non-financial control constraint method passes or not according to the control constraint detail;
the judging mode for judging whether the non-financial control constraint in the non-financial control constraint method is passed or not according to the control constraint detail is as follows:
when the control constraint detail is the locking code control, if the locking code does not exist in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is passed, and if the locking code exists in the condition of the non-financial control constraint, judging that the non-financial control constraint in the non-financial control constraint method is not passed;
when the control constraint details are custom processing, if the custom processing conditions are met, judging that the control constraint passes through the non-financial control constraint in the non-financial control constraint method, and if the custom processing conditions are not met, judging that the control constraint does not pass through the non-financial control constraint in the non-financial control constraint method;
the custom processing conditions comprise activation processing and expiration processing; if not, the self-defined processing condition is not satisfied, and if activated, the self-defined processing condition is satisfied; if the user-defined processing condition is out of date, the user-defined processing condition is not met, and if the user-defined processing condition is not out of date, the user-defined processing condition is met.
2. The method of claim 1, wherein the key fields are verified prior to the non-financial transaction,
if the operation code is empty, the step S2 and the step S4 judge that the operation code passes through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code enters a core system for transaction;
if the password error type is null, judging in the step S2 and the step S3 that the password error type passes through the non-financial control constraint in the non-financial control constraint method, checking successfully, and entering a core system for transaction;
if the operation code and the password error type are both null, in step S2, it is determined that the operation code and the password error type pass through the non-financial control constraint in the non-financial control constraint method, the verification is successful, and the operation code and the password error type enter the core system to conduct the transaction.
3. The method of claim 1, wherein the step of obtaining the set of non-financial control constraints comprises the steps of:
for step S2, acquiring a non-financial control constraint set according to the card number and the transaction code;
for step S3, the character string is spliced with the transaction code and the operation code to obtain a first value, and a non-financial control constraint set is obtained according to the card number and the first value;
and S4, the character string is spliced with the transaction code and the password error type code to obtain a value II, and a non-financial control constraint set is obtained according to the card number and the value II.
4. The method of claim 1, further comprising the step of, prior to the step of obtaining the key field based on the transaction code:
the method comprises the steps that a front-end device receives a non-financial transaction request, wherein the non-financial transaction request comprises a transaction code;
the transaction routing system obtains a transaction code in the non-financial transaction request in the head-end equipment.
5. The method of claim 4, wherein the key fields are verified prior to the non-financial transaction,
the card number, the operation code and the type of the password error are in a request message of the non-financial transaction request.
CN202010603049.1A 2020-06-29 2020-06-29 Control method for verifying key fields before non-financial transaction Active CN111754232B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010603049.1A CN111754232B (en) 2020-06-29 2020-06-29 Control method for verifying key fields before non-financial transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010603049.1A CN111754232B (en) 2020-06-29 2020-06-29 Control method for verifying key fields before non-financial transaction

Publications (2)

Publication Number Publication Date
CN111754232A CN111754232A (en) 2020-10-09
CN111754232B true CN111754232B (en) 2023-11-28

Family

ID=72677946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010603049.1A Active CN111754232B (en) 2020-06-29 2020-06-29 Control method for verifying key fields before non-financial transaction

Country Status (1)

Country Link
CN (1) CN111754232B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4417136A (en) * 1981-08-05 1983-11-22 Ncr Canada Ltd - Ncr Canada Ltee Method and apparatus for improving bank operation productivity
JPH04315347A (en) * 1991-04-15 1992-11-06 Fujitsu Ltd Method for detecting illegal use in telephone service using card
JPH096864A (en) * 1995-06-14 1997-01-10 Nec Corp Immediate membership system telephone betting system
US5828053A (en) * 1995-05-17 1998-10-27 Kabushiki Kaisha Toshiba Portable storage medium and portable storage medium issuing system
CN1417702A (en) * 2001-10-31 2003-05-14 梁钢 Bank safety alarm system and method
JP2007080007A (en) * 2005-09-15 2007-03-29 Dainippon Printing Co Ltd Ic card, atm and identity authentication system
CN101523427A (en) * 2006-09-29 2009-09-02 丹·斯卡梅尔 A system and method for verifying a user's identity in electronic transactions
CN101968872A (en) * 2010-09-03 2011-02-09 中国农业银行股份有限公司深圳市分行 Financial secure transaction method
CN102368338A (en) * 2011-04-09 2012-03-07 冯林 Method and system for verifying trader identity on ATM (Automatic Teller Machine)
KR20130095548A (en) * 2012-02-20 2013-08-28 주식회사 한국프라임테크놀로지 Financial fraud warning system using banking transaction pattern analysis and a method thereof
CN104580255A (en) * 2015-02-02 2015-04-29 陈梅池 Terminal equipment authentication method and terminal equipment authentication system based on identification equipment capable of identifying code streams
WO2017127879A1 (en) * 2016-01-29 2017-08-03 Xard Group Pty Ltd Indirect security system and method
CN107833053A (en) * 2017-10-18 2018-03-23 中国银行股份有限公司 The Information Authentication method and device of core banking system
CN109117235A (en) * 2018-08-24 2019-01-01 腾讯科技(深圳)有限公司 A kind of business data processing method, device and relevant device
CN110287383A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of field information method of inspection and device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4417136A (en) * 1981-08-05 1983-11-22 Ncr Canada Ltd - Ncr Canada Ltee Method and apparatus for improving bank operation productivity
JPH04315347A (en) * 1991-04-15 1992-11-06 Fujitsu Ltd Method for detecting illegal use in telephone service using card
US5828053A (en) * 1995-05-17 1998-10-27 Kabushiki Kaisha Toshiba Portable storage medium and portable storage medium issuing system
JPH096864A (en) * 1995-06-14 1997-01-10 Nec Corp Immediate membership system telephone betting system
CN1417702A (en) * 2001-10-31 2003-05-14 梁钢 Bank safety alarm system and method
JP2007080007A (en) * 2005-09-15 2007-03-29 Dainippon Printing Co Ltd Ic card, atm and identity authentication system
CN101523427A (en) * 2006-09-29 2009-09-02 丹·斯卡梅尔 A system and method for verifying a user's identity in electronic transactions
CN101968872A (en) * 2010-09-03 2011-02-09 中国农业银行股份有限公司深圳市分行 Financial secure transaction method
CN102368338A (en) * 2011-04-09 2012-03-07 冯林 Method and system for verifying trader identity on ATM (Automatic Teller Machine)
KR20130095548A (en) * 2012-02-20 2013-08-28 주식회사 한국프라임테크놀로지 Financial fraud warning system using banking transaction pattern analysis and a method thereof
CN104580255A (en) * 2015-02-02 2015-04-29 陈梅池 Terminal equipment authentication method and terminal equipment authentication system based on identification equipment capable of identifying code streams
WO2017127879A1 (en) * 2016-01-29 2017-08-03 Xard Group Pty Ltd Indirect security system and method
CN107833053A (en) * 2017-10-18 2018-03-23 中国银行股份有限公司 The Information Authentication method and device of core banking system
CN109117235A (en) * 2018-08-24 2019-01-01 腾讯科技(深圳)有限公司 A kind of business data processing method, device and relevant device
CN110287383A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of field information method of inspection and device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Consumer acceptance of biometrics for identity verification in financial transactions;Vahid Assadi et al.,;European Conference on Information Systems;第1-14页 *
基于IC卡的密钥管理系统;程云;金融电子化;55(04);第74-75页 *
金融交易密码多模态化方法;戴永等;计算机应用;第33卷(第01期);第135-137页 *
银行客服系统模块设计与实现;高敏等;软件导刊;16(02);第109-112页 *

Also Published As

Publication number Publication date
CN111754232A (en) 2020-10-09

Similar Documents

Publication Publication Date Title
KR101952498B1 (en) Loan service providing method using black chain and system performing the same
CN111819589B (en) System and method for establishing common request processing
CN103714625B (en) A kind of charging intelligent card method and system
CN110599174B (en) Block chain information processing method and related equipment
CN109993651B (en) Data accounting service instruction set checking method, device, computer equipment and medium
KR101260698B1 (en) Method and system for call authentication using terminal information
CN112348326A (en) Bank business processing method and system
CN111552942B (en) Identity authentication method, system, device and computer storage medium
CN113076410A (en) Abnormal information processing method, device, equipment and storage medium
US20150026770A1 (en) Safety information transfer system, device and method based on extended parameter set
CN111754232B (en) Control method for verifying key fields before non-financial transaction
CN113938481A (en) Receipt processing method, processing device, electronic equipment and readable storage medium
CN107040497A (en) Network account theft preventing method and device
CN110675247B (en) Unknown transaction processing method and system, peripheral system and core bank system
CN112116306A (en) Medical reconciliation method based on T +0/N combination
CN111105224A (en) Payment feedback information processing method and device, electronic equipment and storage medium
CN111400187A (en) Parameter dynamic verification system and method based on customized data source
WO2022116587A1 (en) Web end data signature method and apparatus, and computer device
CN114255134A (en) Account number disassembling method and device and storage medium
CN111930535B (en) Application function calling method and device, computer equipment and storage medium
CN111614642B (en) Method, device and system for registration authentication
CN114579341A (en) Card making method, device and equipment of all-in-one union pay card and readable storage medium
CN107909370B (en) Multiple safety control method and system for electronic payment platform
US20200042965A1 (en) Linking events with lineage rules
CN115713330B (en) Multi-payment-item split payment method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant