CN111861491A - Information verification method, device and equipment - Google Patents

Information verification method, device and equipment Download PDF

Info

Publication number
CN111861491A
CN111861491A CN202010722679.0A CN202010722679A CN111861491A CN 111861491 A CN111861491 A CN 111861491A CN 202010722679 A CN202010722679 A CN 202010722679A CN 111861491 A CN111861491 A CN 111861491A
Authority
CN
China
Prior art keywords
authentication
information verification
information
party
authentication mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010722679.0A
Other languages
Chinese (zh)
Other versions
CN111861491B (en
Inventor
段正
郑荣廷
刘桢
张子键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010722679.0A priority Critical patent/CN111861491B/en
Publication of CN111861491A publication Critical patent/CN111861491A/en
Application granted granted Critical
Publication of CN111861491B publication Critical patent/CN111861491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules

Abstract

The embodiment of the specification discloses an information verification method, an information verification device and information verification equipment, wherein the method comprises the following steps: the third-party server sends an information verification request to the authentication server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server. The authentication server receives the information verification request and determines an authentication mode corresponding to the information verification request according to the third party identification; the authentication mode corresponding to the third-party server comprises one or more types. And the authentication server performs information verification on the user information by using the determined authentication mode and feeds back an information verification result to the third-party server. By utilizing the embodiments of the specification, the success rate of information verification can be further improved.

Description

Information verification method, device and equipment
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an information verification method, an information verification apparatus, and a device.
Background
With the rapid development of the internet technology, rapid payment is increasingly applied to different payment scenes. Although the convenience of user experience is greatly improved by using the quick payment, the occurrence of the quick payment also puts higher requirements on information verification of the bank side user.
Because the information collected by the bank when the user opens an account or transacts a card has strong safety and credibility, the bank mostly uses the information reserved by the user when the user opens an account or transacts a card in the bank terminal equipment at present when verifying the user information. However, with the continuous development of the technology, in order to further improve the convenience of the user, the payment scenes adopted by the third-party organization are more and more complex and changeable, and when the bank only uses the information collected during the user account opening or card transaction to verify the user information, the information verification failure occurs more and more frequently. The failure of information verification causes serious waste of operating resources of the bank system. Meanwhile, the prompt of the information verification failure also brings poor use experience to the user, and the subscription success rate of a third-party mechanism is indirectly reduced. Therefore, there is a need for an information verification method that can further improve the success rate of information verification.
Disclosure of Invention
An object of the embodiments of the present specification is to provide an information verification method, apparatus, and device, which can further improve a success rate of user information verification.
The specification provides an information verification method, an information verification device and information verification equipment, which are realized in the following modes:
an information verification method is applied to an authentication system, the authentication system comprises a third-party server and an authentication server, and the method comprises the following steps: the third-party server sends an information verification request to the authentication server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server. The authentication server receives the information verification request and determines an authentication mode corresponding to the information verification request according to the third party identification; the authentication mode corresponding to the third-party server comprises one or more types. And the authentication server performs information verification on the user information by using the determined authentication mode and feeds back an information verification result to the third-party server.
On the other hand, an embodiment of the present specification further provides an information verification method, which is applied to an authentication server, and the method includes: receiving an information verification request sent by a third-party server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server. Determining an authentication mode corresponding to the information verification request according to the third party identifier; the authentication mode corresponding to the third-party server comprises one or more types. And performing information verification on the user information by using the determined authentication mode.
In other embodiments of the method provided in this specification, in a case that it is determined that the authentication manner corresponding to the third party identifier is multiple, the performing information verification on the user information by using the determined authentication manner includes: performing information matching on the user information based on a pre-configured authentication mode matching sequence; and the matching sequence of the authentication modes is configured based on the safety factors of the authentication modes. And when the information matching is successful, performing information verification on the user information by using the matched authentication mode to obtain an information verification result.
In other embodiments of the method provided in this specification, when matching of information of a plurality of authentication methods corresponding to the third party identifier fails, an information verification result indicating that information verification fails is output.
In other embodiments of the method provided in this specification, the authentication mode at least includes one of a counter authentication mode, a full channel authentication mode, a release authentication mode, a no authentication mode, a joint authentication mode, and an operator authentication mode.
In other embodiments of the method provided in this specification, when the determined authentication mode is an operator authentication mode, the performing information verification on the user information by using the determined authentication mode includes: sending the user information to an operator server so that the operator server performs initial information verification on the user information based on a preset authentication rule; and the preset authentication rule is sent to the operator server by the authentication server in advance. And receiving an initial information verification result fed back by the operator server. And under the condition that the initial information verification result is successful, performing information verification on the user information according to the initial information verification result. And under the condition that the initial information verification result fails, outputting an information verification result of which the information verification fails.
In other embodiments of the method provided herein, the method further comprises: and storing the information verification result corresponding to the information verification request, the third party identification and the determined authentication mode in a correlation manner.
In other embodiments of the method provided herein, the method further comprises: acquiring information verification results of the information verification data set in a specified time interval or in a specified quantity as authentication configuration data; the information verification data set comprises information verification results stored in a correlated mode, corresponding third party identifications and authentication modes, the authentication configuration data are analyzed based on a preset analysis algorithm, and the authentication modes corresponding to the third party identifications are configured according to the analysis results. And feeding back the configured authentication mode to the third-party server so that the third-party server sets the authentication mode for user information verification according to the configured authentication mode. And receiving the authentication mode for user information verification fed back by the third-party server, and performing associated storage with the third-party identifier.
On the other hand, an embodiment of the present specification further provides an information verification apparatus, which is applied to an authentication server, and the apparatus includes: the request receiving module is used for receiving an information verification request sent by a third-party server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server. The authentication mode determining module is used for determining the authentication mode corresponding to the information verification request according to the third party identification; the authentication mode corresponding to the third-party server comprises one or more types. And the authentication module is used for carrying out information verification on the user information by utilizing the determined authentication mode.
On the other hand, the embodiments of the present specification further provide an information verification apparatus applied to the information verification terminal, where the apparatus includes a processor and a memory for storing processor-executable instructions, and the instructions, when executed by the processor, implement steps of a method including one or more of the above embodiments.
According to the information verification method, the information verification device and the information verification equipment provided by one or more embodiments of the specification, one or more authentication modes corresponding to a third-party organization can be configured in advance according to the payment scene requirements of the third-party organization, and user information can be verified based on the one or more authentication modes configured in advance during information verification, so that the flexibility of information verification is further improved, and the success rate of information verification is improved. Meanwhile, the running resources of the bank system can be saved, the use experience of the user is improved, and the business transaction success rate of a third-party organization is improved.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort. In the drawings:
FIG. 1 is a schematic flow chart diagram illustrating an embodiment of an information verification method provided herein;
FIG. 2 is a schematic diagram of an information verification process in one embodiment provided herein;
fig. 3 is a schematic block diagram of an information verification apparatus provided in this specification;
FIG. 4 is a block diagram of an information verification device in one embodiment provided in the present specification;
FIG. 5 is a block diagram of a management module in one embodiment provided by the present specification;
FIG. 6 is a block diagram of a multi-level authentication module in one embodiment provided in the present specification;
FIG. 7 is a block diagram of a dynamic analysis module in one embodiment provided in the present specification;
fig. 8 is a schematic block diagram of a memory module in one embodiment provided in the present specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in one or more embodiments of the present specification will be clearly and completely described below with reference to the drawings in one or more embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the specification, and not all embodiments. All other embodiments obtained by a person skilled in the art based on one or more embodiments of the present specification without making any creative effort shall fall within the protection scope of the embodiments of the present specification.
In one scenario example provided by the embodiment of the present specification, the information verification method may be applied to an authentication system. The authentication system may include a third party server and an authentication server. The third-party server may be a server corresponding to a third-party organization that performs business processing such as quick payment signing. The authentication server may refer to a server for performing user information verification at a bank side. The server may refer to a single server, or may refer to a server cluster formed by a plurality of servers.
In the process of executing the service processing such as the quick payment signing, and the like, when the user information corresponding to the current service processing needs to be verified, the third-party server can generate an information verification request based on the user information corresponding to the service processing, and send the information verification request to the authentication server at the bank side. The information verification request may include a third party identification and user information. The third party identifier may be used to identify the third party server. The user information may include information of the user collected by the third-party server during the service processing. Such as the user's mobile phone number, name, bank card number, identity card information, biometric information, and the like.
The authentication server may be pre-configured with one or more authentication modes corresponding to the third-party server. The authentication server can process the information verification request sent by the third-party server by using the authentication mode corresponding to the third-party server so as to adapt to the information verification under one or more payment scenes corresponding to the third-party server and improve the success rate of the information verification.
The authentication method is characterized in that one or more authentication methods corresponding to the third-party organization are configured in advance according to the needs of the third-party organization, and the user information is verified based on the authentication methods configured in advance in the actual service processing process, so that the flexibility of information verification can be further improved, and the success rate of information verification is improved. Meanwhile, the running resources of the bank system can be saved, the use experience of the user is improved, and the business transaction success rate of a third-party organization is improved.
Fig. 1 is a schematic flow chart of an embodiment of the information verification method provided in this specification. Although the present specification provides the method steps or apparatus structures as shown in the following examples or figures, more or less steps or modules may be included in the method or apparatus structures based on conventional or non-inventive efforts. In the case of steps or structures which do not logically have the necessary cause and effect relationship, the execution order of the steps or the block structure of the apparatus is not limited to the execution order or the block structure shown in the embodiments or the drawings of the present specification. When the described method or module structure is applied to a device, a server or an end product in practice, the method or module structure according to the embodiment or the figures may be executed sequentially or in parallel (for example, in a parallel processor or multi-thread processing environment, or even in an implementation environment including distributed processing and server clustering). In a specific embodiment of the information verification method provided in this specification, as shown in fig. 1, the method may be applied to the information verification system, and the method may include the following steps:
s00: the third-party server sends an information verification request to the authentication server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server.
The third party server may send an information verification request to the authentication server. The information verification request may include a third party identification and user information.
The third party identification may be used to identify the third party server. The third party identifier may be, for example, an IP address of a third party server or identification information of a third party organization corresponding to the third party server.
The user information may include information of the user collected by the third-party server during the service processing. Such as the user's mobile phone number, name, bank card number, identity card information, biometric information, and the like.
For example, in a scenario of a fast payment signing application, a user may initiate a fast payment signing request through a third-party service application in an intelligent terminal, and then may input information such as a mobile phone number, a name, a certificate number, a bank card number to be bound, and the like in an information acquisition page displayed by the third-party service application. In the process, the third-party service application can also acquire user information such as identity document images, biological characteristic information and the like of the user. And responding to the submission triggering operation of the user, and the intelligent terminal can send the acquired user information to the third-party server.
S02: the authentication server receives the information verification request and determines an authentication mode corresponding to the information verification request according to the third party identification; the authentication mode corresponding to the third-party server comprises one or more types.
The authentication server may be pre-configured with one or more authentication modes corresponding to the third-party organization. The authentication mode may refer to a data processing mode in which the authentication server verifies the user information. For different authentication modes, the authentication server can execute different data processing modes to verify the user information so as to adapt to the payment scene of the current third-party institution. The authentication mode may include authentication based on user information retained by the user when opening an account or opening a card, and authentication modes such as authentication-free, authentication-forbidden, joint authentication and the like.
The authentication mode corresponding to the third-party mechanism can be set by the third-party mechanism according to the self requirement and then sent to the authentication server for configuration. Or the authentication server can be used for configuring various authentication modes in advance, recommending all or part of the authentication modes to the third-party server corresponding to the third-party mechanism according to the payment scene of the third-party mechanism, and feeding back the authentication modes to the authentication server for configuration after the authentication modes are selected by the third-party mechanism. The authentication mode corresponding to the third-party mechanism is configured in advance according to the requirements of the third-party mechanism, and the information verification processing is carried out by utilizing the authentication mode corresponding to the third-party mechanism, so that the flexibility of information verification can be further improved, and the success rate of information verification is further improved.
The authentication mode corresponding to the third party organization can be stored in association with the third party identification. After the authentication server extracts the information verification request, the authentication server may extract the third party identifier and the user information from the information verification request. Then, the third party identifier may be used to determine one or more authentication manners corresponding to the third party organization as the authentication manner corresponding to the information verification request.
S04: and the authentication server performs information verification on the user information by using the determined authentication mode and feeds back an information verification result to the third-party server.
The authentication server can perform information verification on the user information by using the determined authentication mode. After determining the authentication mode corresponding to the information verification request according to the third party identifier, the authentication server may perform information verification by using the user information and the remaining user information in the determined authentication mode. The reserved user information may refer to user information reserved in a banking system or a business system of a joint authentication mechanism in advance. For example, the retained user information may include information of the user collected by the service system at the time of service transaction, such as opening an account and opening a card. The reserved user information may also include service data of the user in the service system, such as account status and the like.
For example, the authentication server may verify the user information by using information such as a mobile PHONE number (PHONE), a certificate type (IDTP), an account number (CARDNO), a certificate number (IDNO), an account name (card id), and an account status retained in the bank system. When the basic user information is compared and consistent and the account state is normal, an information verification result of successful information verification can be output; otherwise, an information verification result of successful information verification may be output. Or, if the authentication mode is authentication-free, the information of the user to be authenticated can be matched with whether the information is in an authentication-free list, and if the information is in the authentication-free list, the information can be directly output to be successfully authenticated. If not, the information verification failure can be output.
Accordingly, the information verification result may include a result of success or failure of information verification. The authentication server may feed back an information verification result to the third-party server, so that the third-party server performs subsequent service processing based on the information verification result.
By pre-configuring the authentication modes corresponding to the third-party mechanisms, after receiving the information verification request, the authentication server can verify the information by using one or more authentication modes pre-configured by the third-party mechanisms, and the verification of the user information can still be realized under the condition that the user information is not kept by opening an account or transacting a card through a bank, so that the success rate of the verification is improved. Meanwhile, the running resources of the bank system can be saved, the use experience of the user is improved, and the business transaction success rate of a third-party organization is improved.
In some embodiments, after determining the authentication mode corresponding to the information verification request according to the third party identifier, the authentication server may match the user information with the retained user information in the determined authentication mode, and determine whether the retained user information corresponding to the user information exists in the authentication mode.
If the mobile phone number in the user information can be used for information matching, whether the mobile phone number in the user information exists in the authentication mode is determined, and if the mobile phone number does not exist in the user information, the output information verification fails; or if other authentication modes exist, the information matching can be continuously carried out on the other authentication modes. If the matching result is present, the user information is compared with the matched user information, and if the comparison result is consistent and the account state is normal, the information verification can be output successfully. If the account status is either a sale or a freeze, a message authentication failure may be output. Correspondingly, the information verification result may further include reasons of information verification failure, such as information matching failure, inconsistency of comparison result, abnormal account status, and the like.
For example, in a case where it is determined that the authentication method corresponding to the third party identifier is only one, the authentication server may directly perform information verification processing using the determined authentication method. If the mobile phone number in the user information can be used for matching with the reserved user information in the determined authentication mode, if the mobile phone number is matched with the reserved user information in the determined authentication mode, the information verification processing step in the determined authentication mode can be executed by using the matched reserved user information. If the information verification fails, the result of the information verification failure can be output; if the information verification is successful, the result of the information verification success can also be output. If the user information is not matched with the reserved user information, the result of information verification failure can be output.
And under the condition that multiple authentication modes corresponding to the third party identification are determined, the authentication server can randomly utilize the determined multiple authentication modes to carry out information verification processing. If the authentication server can randomly select an authentication mode, firstly, the mobile phone number in the user information is used for information matching, and whether the reserved user information corresponding to the mobile phone number exists in the authentication mode is determined. If not, another authentication mode is randomly selected, and matching is continued until corresponding reserved user information is matched. And executing the information verification processing step under the currently matched authentication mode by using the matched retained user information, and outputting an information verification result. And if the multiple authentication modes corresponding to the third party identification are not successfully matched, outputting a result of information verification failure.
In some embodiments, when it is determined that the authentication manners corresponding to the third party identifiers are multiple, information matching may be performed on the user information based on a pre-configured authentication manner matching sequence. And the matching sequence of the authentication modes is configured based on the safety factors of the authentication modes. And when the information matching is successful, the matched authentication mode can be utilized to carry out information verification on the user information to obtain an information verification result. And under the condition that the information matching of the plurality of authentication modes corresponding to the third party identification fails, outputting an information verification result of information verification failure. The safety factor can be determined by the authentication server according to the information source of the reserved user information and/or the information verification data processing mode corresponding to each authentication mode.
And selecting an authentication mode according to the authentication mode matching sequence, performing information matching by using the mobile phone number in the user information, determining whether corresponding reserved user information exists in the authentication mode, if not, selecting the next authentication mode according to the sequence, and continuing matching until the corresponding reserved user information is matched. And executing the information verification processing step under the currently matched authentication mode by using the matched retained user information, and outputting an information verification result. And if the multiple authentication modes corresponding to the third party identification are not successfully matched, outputting a result of information verification failure.
The authentication mode matching sequence is set in advance based on the safety coefficient corresponding to the authentication mode, the authentication mode with higher safety is configured at the front position, the authentication mode with lower safety is configured at the rear position, and the authentication modes are matched in sequence, so that the information verification safety is ensured, and the success rate of the information verification is improved. Of course, in practical application, the authentication mode matching sequence may also be configured based on other factors as needed.
In some embodiments, multiple authentication modes may be preconfigured by the authentication server. The authentication mode can be at least one of a counter authentication mode, a full channel authentication mode, a release authentication mode, a forbid authentication mode, a combined authentication mode and an operator authentication mode. Wherein the content of the first and second substances,
the counter authentication mode may refer to a mode of performing information verification based on user information acquired by a counter information acquisition channel. The counter information acquisition channel can be a mode for acquiring user information when high-security business processing such as account opening, card opening and the like is performed by a banking business system.
The full channel authentication mode may refer to a mode of performing information verification based on user information collected by a designated collection channel. The designated collection channel may refer to a manner in which the banking system collects user information during high-security business processing, such as account opening and card opening, and other conventional business processing with relatively low security of the banking system.
The passing authentication mode may refer to a mode of performing information verification based on a verification-free list, where the verification-free list includes a verification-free service identifier and/or a verification-free user identifier.
The authentication prohibition mode may refer to a mode of performing information verification based on a prohibition passing through a verification list, where the prohibition passing through the verification list includes a prohibition of passing through the verified service identifier and/or a prohibition of passing through the verified user identifier.
The joint authentication mode may refer to a mode of performing information verification based on user information collected by an account joint name institution. The account affiliation institution may refer to an institution that performs one or more business processes in conjunction with a banking system.
The operator authentication mode may refer to a mode of performing information verification by using an operator server. The operator server may refer to a server of an organization providing mobile communication services such as mobile, telecommunication, etc.
And if the authentication mode corresponding to the third party identifier is determined to be a counter authentication mode. The authentication server can verify the user information by using information such as a mobile PHONE number (PHONE), a certificate type (IDTP), an account number (CARDNO), a certificate number (IDNO), an account name (card id) and the like stored in the bank system when the user handles the service by designating the service terminal. If the stored user information is not matched based on the authentication mode, or the situation that the information is inconsistent exists when the user information is compared, or the account state (STATUS) is 1-frozen or 2-logout, the output verification fails. If the information match is successful and the account STATUS is normal (STATUS) is 0-normal, the verification is successful. Or, based on that the authentication mode is not matched with the reserved user information, but it is determined that the third party identifier also corresponds to other authentication modes, information matching can be further performed on other authentication modes.
If the authentication mode corresponding to the third party identifier is determined to be a full-channel authentication mode, the authentication server can perform information verification by using information such as a mobile PHONE number (PHONE), a certificate type (IDTP), an account number (CARDNO), a certificate number (IDNO), an account name (card) and the like reserved by the user when the user specifies a collection channel to handle services. The appointed acquisition channel can be used for acquiring user information under conventional services such as account opening, card opening, financing, loan and the like. The collected user information may include the information of the user handling the service, or may include the user information of the associated user collected during service handling. Compared with a counter authentication mode, the full channel authentication mode has lower safety, but covers more conventional bank business types than the counter authentication mode, and can further improve the comprehensiveness of information involved in information verification. When the user information with relatively low security requirement is verified, the third-party organization can select the authentication mode to further improve the success rate of the information verification.
If the user information in the information verification request is correspondingly matched with the reserved user information in the full-channel authentication mode and the state (STATUS) is 0-normal, the output information verification is successful. Otherwise, the output information fails to be verified. Or, based on that the authentication mode is not matched with the reserved user information, but it is determined that the third party identifier also corresponds to other authentication modes, information matching can be further performed on other authentication modes.
If the authentication mode corresponding to the third party identifier is determined to be a release authentication mode, a verification-free list in the release authentication mode can be used for information verification. The non-verification list corresponding to the passing authentication mode may include a non-verification service identifier, and may also include a non-verification user identifier. If the verification-free list comprises the verification-free service identification, the user information in the information verification request can be matched with the user information reserved corresponding to the verification-free service identification. If the authentication-free list includes the authentication-free user identifier, the user information in the information authentication request may be matched with the authentication-free user identifier in the authentication-free list.
In an actual application scenario, a part of service types which are in trial operation or are on-line temporarily may exist, and the safety factor of the service type is high, and the service types can be configured into a verification-free list independently, so that the efficiency of information verification is further improved. Or, if the credit rating of some accounts is very high or the accounts belong to a bank-specified authentication-free user, the user identification information of the user can also be configured into an authentication-free list, so as to further improve the efficiency of information authentication.
If the corresponding reserved user information is matched based on the verification-free list and the account STATUS (STATUS) is 0-normal, the output information verification is successful. If no match is made or the account STATUS (STATUS) is 1-frozen or 2-logged out, the output verification fails. Or, based on that the authentication mode is not matched with the corresponding mobile phone number, but it is determined that the third party identifier corresponds to other authentication modes, information matching can be further performed on other authentication modes.
And if the authentication mode corresponding to the third party identifier is determined to be a forbidden authentication mode, information verification can be performed by using a forbidden passing verification list corresponding to the forbidden authentication mode. The authentication forbidden list may include service identification that is forbidden to pass authentication, and may also include user identification that is forbidden to pass authentication. And if the verification forbidden list comprises the verification forbidden service identification, matching the user information in the information verification request with the user information saved corresponding to the verification forbidden service identification. If the forbidden authentication list includes the forbidden authenticated user identification, the user information in the information authentication request can be matched with the forbidden authenticated user identification in the forbidden authentication list.
In an actual application scenario, a part of service types which are in trial operation or are on-line temporarily may exist, and the safety factor of the service types is low, and the service types can be configured to a forbidden verification list independently, so as to further improve the efficiency of information verification. Or, some accounts have a very low credit rating or belong to users who are prohibited from passing the verification and designated by the bank, the identification information of the users can be configured into a list which is prohibited from passing the verification, so as to further improve the efficiency of information verification.
And if the reserved user information in the forbidden verification list is matched, the output information verification fails. If the information of the reserved user in the forbidden passing verification list is not matched, but the third party identification is determined to correspond to other authentication modes, information matching can be further carried out on the other authentication modes. If the user information which is stored in the forbidden verification list is not matched and the third party identification is determined not to have other authentication modes, the information verification failure can be output.
If the authentication mode corresponding to the third party identifier is determined to be a combined authentication mode, the authentication server can use the information, such as the user mobile PHONE number (PHONE), the certificate type (IDTP), the account number (CARDNO), the certificate number (IDNO), the account name (card id), the account name combination authority (ISSID), and the like retained by the account combination authority to perform information verification.
In an actual application scenario, a situation exists in which a bank and other mechanisms jointly release a certain service, such as a joint name card. The business processing may not be completed by the banking system, but by the account affiliation mechanism, and correspondingly, the collection of the user information is also completed by the account affiliation mechanism during the business processing. The account affiliation mechanism can send the collected user information to the banking system for storage. The relative security of the retained user information is not controlled by the bank side, so that the security is lower than that of the bank side, and the retained user information can be independently configured into an authentication mode. For the information verification scene with lower requirement on safety, the authentication mode can be used for information verification processing, the comprehensiveness of user information which can be matched during information verification is further improved on the premise of ensuring the safety, and the success rate of information verification is improved. In practical applications, the account affiliation authority is usually a single authority with the third party authority. Of course, it is not excluded that the account affiliation institution is a different institution than the third party institution.
If the user information in the information verification request is correspondingly matched with the reserved user information in the joint authentication mode channel, and the Switch (SWI) of the account joint name mechanism is 0-open (the account joint name mechanism and the bank are still in a cooperative state), the user information is further compared with the reserved user information in the banking system, and if the information is successfully matched and the account state (STATUS) is 0-normal, the verification is successful. If the information fails successfully, or the account STATUS (STATUS) is 1-frozen or 2-logged off, the output verification fails. Or, based on that the authentication mode is not matched with the corresponding retained user information, but it is determined that the third party identifier corresponds to other authentication modes, information matching can be further performed on other authentication modes.
And if the authentication mode corresponding to the third party identifier is determined to be an operator authentication mode, the third party identifier and an operator server can be combined to carry out information verification.
The authentication server may send the user information to an operator server, so that the operator server performs information verification on the user information based on a preset authentication rule. Wherein the preset authentication rule may be sent to the operator server by the authentication server in advance.
The authentication server may receive an information verification result fed back by the operator server. If the operator server feeds back the information verification to be successful, the information verification can be output to be successful; if the operator server feeds back information verification failure, information verification failure can be output.
Or, in other embodiments, the information verification result fed back by the operator server may also be used as the initial information verification result. And after the initial information fed back by the operator server is successfully verified, the authentication server further verifies the user information according to the initial information verification result. For example, the authentication server may match the retained user information in the banking system with the user certificate information matched by the operator server, and implement information verification by combining one or more authentication methods. And under the condition that the initial information verification result is successful, the authentication server can directly output the information verification result of the information verification identification.
The information verification is carried out through the combined operator server, so that the authentication requirement can be realized under the condition that the mobile phone information is not reserved in a bank by a user, and the success rate of the information verification is further improved.
In still other embodiments, the method may further comprise: and storing the information verification result corresponding to the information verification request, the third party identification and the determined authentication mode in a correlation manner. By associating the stored information verification result, the authentication mode corresponding to each third-party organization can be optimized and adjusted conveniently based on the stored information verification result data.
In still other embodiments, the method may further comprise: and acquiring information verification results of the information verification data set in a specified time interval or a specified quantity as authentication configuration data. The information verification data set comprises information verification results stored in a correlated mode, corresponding third party identification and an authentication mode. And analyzing the authentication configuration data based on a preset analysis algorithm, and configuring an authentication mode corresponding to the third party identifier according to an analysis result. And feeding back the configured authentication mode to the third-party server so that the third-party server sets the authentication mode for user information verification according to the configured authentication mode. And receiving the authentication mode for user information verification fed back by the third-party server, and performing associated storage with the third-party identifier.
The preset analysis algorithm can be configured according to actual needs. For example, the verification success rate and the failure rate under each authentication mode corresponding to the third party identifier in the specified time interval may be analyzed, or the success rate and the failure rate of information matching may also be included. Then, an early warning value can be set, and when the failure rate exceeds the early warning value, the authentication mode of the current third-party organization can be optimized and configured based on the information verification results of other third-party organizations. Then, the authentication server can feed back the configured authentication mode to the third-party server, so that the third-party server sets the authentication mode for user information verification according to the configured authentication mode.
The third party server sets the required authentication mode and then sends the authentication mode to the authentication server. The authentication server may store the authentication mode set by the third-party server for user information verification in association with the third-party identifier, so as to perform subsequent information verification.
The authentication result distribution under each third-party mechanism and each authentication mode is statistically analyzed, and the authentication mode corresponding to each third-party mechanism is optimized and adjusted based on the distribution, so that the authentication mode can be dynamically adjusted along with the change of an application scene, and the success rate of information verification corresponding to the third-party mechanism is further improved.
As shown in fig. 2, based on the solution provided by the foregoing embodiment, the present specification further provides an information verification method applied to an authentication server, where the method may include:
s202: receiving an information verification request sent by a third-party server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server.
S204: determining an authentication mode corresponding to the information verification request according to the third party identifier; the authentication mode corresponding to the third-party server comprises one or more types.
S206: and performing information verification on the user information by using the determined authentication mode.
In other embodiments, when it is determined that the authentication manner corresponding to the third party identifier is multiple, the performing information verification on the user information by using the determined authentication manner may include: performing information matching on the user information based on a pre-configured authentication mode matching sequence; and the matching sequence of the authentication modes is configured based on the safety factors of the authentication modes. And when the information matching is successful, performing information verification on the user information by using the matched authentication mode to obtain an information verification result.
In other embodiments, when matching of the information of the plurality of authentication modes corresponding to the third party identifier fails, an information verification result of the information verification failure is output.
In other embodiments, the authentication mode may include at least one of a counter authentication mode, a full channel authentication mode, a release authentication mode, a forbid authentication mode, a combined authentication mode, and an operator authentication mode. Wherein the content of the first and second substances,
the counter authentication mode refers to a mode of performing information verification based on user information acquired by a counter information acquisition channel.
The full channel authentication mode refers to a mode of information verification based on user information collected by a specified collection channel.
The passing authentication mode refers to a mode of information verification based on a verification-free list, and the verification-free list comprises a verification-free service identifier and/or a verification-free user identifier.
The authentication forbidding mode refers to a mode of carrying out information verification based on a forbidden verification list, wherein the forbidden verification list comprises a forbidden verified service identifier and/or a forbidden verified user identifier.
The joint authentication mode refers to a mode of information verification based on user information collected by an account joint name mechanism.
The operator authentication mode refers to a mode of performing information verification by using an operator server.
In other embodiments, when the determined authentication manner is an operator authentication manner, the performing information verification on the user information by using the determined authentication manner may include: sending the user information to an operator server so that the operator server performs initial information verification on the user information based on a preset authentication rule; and the preset authentication rule is sent to the operator server by the authentication server in advance. And receiving an initial information verification result fed back by the operator server. And under the condition that the initial information verification result is successful, performing information verification on the user information according to the initial information verification result. And under the condition that the initial information verification result fails, outputting an information verification result of which the information verification fails.
In other embodiments, the method further comprises: and storing the information verification result corresponding to the information verification request, the third party identification and the determined authentication mode in a correlation manner.
In other embodiments, the method further comprises: and acquiring information verification results of the information verification data set in a specified time interval or a specified quantity as authentication configuration data. The information verification data set comprises information verification results stored in a correlated mode, corresponding third party identification and an authentication mode. And analyzing the authentication configuration data based on a preset analysis algorithm, and configuring an authentication mode corresponding to the third party identifier according to an analysis result. And feeding back the configured authentication mode to the third-party server so that the third-party server sets the authentication mode for user information verification according to the configured authentication mode. And receiving the authentication mode for user information verification fed back by the third-party server, and performing associated storage with the third-party identifier.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. For details, reference may be made to the description of the related embodiments of the related processing, and details are not repeated herein.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The information verification method provided in one or more embodiments of the present specification may configure one or more authentication manners corresponding to a third-party organization in advance according to a payment scenario requirement of the third-party organization, and may verify user information based on the one or more authentication manners configured in advance when verifying information, thereby further improving flexibility of information verification and improving success rate of information verification. Meanwhile, the running resources of the bank system can be saved, the use experience of the user is improved, and the business transaction success rate of a third-party organization is improved.
Based on the information verification method, one or more embodiments of the present specification further provide an information verification apparatus. The apparatus may include systems, software (applications), modules, components, servers, etc. that utilize the methods described in the embodiments of the present specification in conjunction with hardware implementations as necessary. Based on the same innovative conception, embodiments of the present specification provide an apparatus as described in the following embodiments. Since the implementation scheme of the apparatus for solving the problem is similar to that of the method, the specific implementation of the apparatus in the embodiment of the present specification may refer to the implementation of the foregoing method, and repeated details are not repeated. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated. Specifically, fig. 3 is a schematic block diagram of an embodiment of an information verification apparatus provided in the specification, and as shown in fig. 3, the apparatus is applied to an information verification terminal, and the apparatus may include:
a request receiving module 302, configured to receive an information verification request sent by a third-party server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server;
an authentication mode determining module 304, configured to determine an authentication mode corresponding to the information verification request according to the third party identifier; the authentication mode corresponding to the third-party server comprises one or more types;
the authentication module 306 may be configured to perform information verification on the user information by using the determined authentication manner.
It should be noted that the above-described apparatus may also include other embodiments according to the description of the method embodiment. The specific implementation manner may refer to the description of the related method embodiment, and is not described in detail herein.
The information verification device provided in one or more embodiments of the present specification may configure one or more authentication manners corresponding to a third-party organization in advance according to a payment scenario requirement of the third-party organization, and may verify user information based on the one or more authentication manners configured in advance when verifying information, thereby further improving flexibility of information verification and improving success rate of information verification. Meanwhile, the running resources of the bank system can be saved, the use experience of the user is improved, and the business transaction success rate of a third-party organization is improved.
The method or apparatus provided by the present specification and described in the foregoing embodiments may implement service logic through a computer program and record the service logic on a storage medium, where the storage medium may be read and executed by a computer, so as to implement the effect of the solution described in the embodiments of the present specification. Accordingly, the present specification also provides an information verification device comprising a processor and a memory storing processor-executable instructions which, when executed by the processor, implement steps comprising the method of any one of the above embodiments.
The storage medium may include a physical device for storing information, and typically, the information is digitized and then stored using an electrical, magnetic, or optical media. The storage medium may include: devices that store information using electrical energy, such as various types of memory, e.g., RAM, ROM, etc.; devices that store information using magnetic energy, such as hard disks, floppy disks, tapes, core memories, bubble memories, and usb disks; devices that store information optically, such as CDs or DVDs. Of course, there are other ways of storing media that can be read, such as quantum memory, graphene memory, and so forth.
It should be noted that the above description of the apparatus according to the method embodiment may also include other embodiments. The specific implementation manner may refer to the description of the related method embodiment, and is not described in detail herein.
Based on the above embodiments, this specification also provides a scenario example. As shown in fig. 4, in an example scenario described in this specification, a multi-stage dynamic information verification apparatus based on a third-party fast payment signed transaction is provided, and the information verification apparatus is applied to the authentication server on the bank side. The information verification apparatus may include a management module 1, a multi-level authentication module 2, a dynamic analysis module 3, and an information storage module 4. An initial authentication mode used in a quick payment signing transaction can be set for each third-party organization through the management module 1, when the third-party organization initiates a verification request to the information verification device on the bank side through the third-party server, the management module 1 can allocate a corresponding authentication unit under the multi-stage authentication module 2 for the third-party organization, and the authentication result is synchronously written into the information storage module 4. The dynamic analysis module 3 can preferably configure an authentication mode for the third-party organization by reading the information in the information storage module 4. Correspondingly, the management module 1 can dynamically adjust the authentication unit corresponding to the multi-level authentication module corresponding to the third-party organization.
Fig. 5 is a block diagram of a management module structure, and as shown in fig. 5, the management module 1 may include a management information receiving unit 11, a management information storage unit 12, and a management configuration unit 13. Wherein:
the management information receiving unit 11 may be configured to receive a fast payment subscriber information verification request from a third-party server, invoke the management information storage unit 12 to perform authentication unit matching, and invoke the corresponding authentication unit to perform authentication after matching to the corresponding authentication unit.
The management information storage unit 12 may be configured to receive the operation result of the storage information pushing unit 33 and the result of the operation performed by the management configuration unit 13.
The management configuration unit 13 may be configured to maintain an authentication mode corresponding to the third-party organization, and send a maintenance result to the management information storage unit 12.
Fig. 6 is a block diagram of a multi-level authentication module, and as shown in fig. 6, the multi-level authentication module 2 may include a counter authentication unit 21, a full channel authentication unit 22, a release authentication unit 23, a prohibition authentication unit 24, a joint authentication unit 25, and an operator authentication unit 26. Wherein:
the counter authentication unit 21 may be a unit for performing authentication by using the mobile phone number information in the user information collected by the counter.
The full channel authentication unit 22 may be a unit for verifying a user information collected in a plurality of designated collection channels of a bank by using the user information as a verification factor pair.
The permission authentication unit 23 is a unit that performs authentication by setting a verification-free list.
The authentication prohibition unit 24 is a unit that prohibits authentication by setting a verification list. And when the quick payment signing user information verification request of the third-party organization meets the verification list forbidding to pass, the verification fails.
The joint authentication unit 25 is a unit that performs authentication by setting an account joint authority.
The operator authentication unit 26 is a unit that verifies information by the joint operator server. The authentication processing is usually performed when a bank quick payment signing transaction is performed for the first time for a user who never makes a transaction at a bank and has no reserved information.
Fig. 7 is a block diagram of a dynamic analysis module, and as shown in fig. 7, the display dynamic analysis module 3 may include an information processing unit 31, an early warning unit 32, and an information pushing unit 33. Wherein the content of the first and second substances,
the information processing unit 31 can read the verification result storage data of the information storage unit 42, perform multidimensional statistics for a third-party organization, read the parameters of the early warning unit 32 for matching, and calculate and generate an optimal authentication mode to send to the information pushing unit 33 after the parameters exceed the parameters set by the early warning unit 32. The multiple dimensions include, but are not limited to, transaction volume and time interval.
The warning unit 32 may be a unit that sets information processing statistical dimension criteria and sets warning criteria. The information processing statistical dimension standard comprises but is not limited to transaction amount and time interval, and the early warning standard comprises but is not limited to authentication failure transaction amount.
The information pushing unit 33 may receive the processing result of the information processing unit 31 and send the information to the management information storage unit 12.
Fig. 8 is a block diagram of a memory module, and as shown in fig. 8, the display information storage module 4 may include an information receiving unit 41 and an information storage unit 42. Wherein the content of the first and second substances,
the information receiving unit 41 may be a unit for receiving execution results of the multi-level authentication module, where the execution results include, but are not limited to, verification failure and verification success.
The information storage unit 42 may be configured to receive and store the execution result of the multi-level authentication module sent by the information receiving unit 41.
It should be noted that the above-described apparatus may also include other embodiments according to the description of the method embodiment. The specific implementation manner may refer to the description of the related method embodiment, and is not described in detail herein.
It should be noted that the embodiments of the present disclosure are not limited to the cases where the data model/template is necessarily compliant with the standard data model/template or the description of the embodiments of the present disclosure. Certain industry standards, or implementations modified slightly from those described using custom modes or examples, may also achieve the same, equivalent, or similar, or other, contemplated implementations of the above-described examples. The embodiments using these modified or transformed data acquisition, storage, judgment, processing, etc. may still fall within the scope of the alternative embodiments of the present description.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. In the description of the specification, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the specification. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
The above description is only an example of the present specification, and is not intended to limit the present specification. Various modifications and alterations to this description will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present specification should be included in the scope of the claims of the present specification.

Claims (10)

1. An information verification method is applied to an authentication system, the authentication system comprises a third-party server and an authentication server, and the method comprises the following steps:
the third-party server sends an information verification request to the authentication server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server;
the authentication server receives the information verification request and determines an authentication mode corresponding to the information verification request according to the third party identification; the authentication mode corresponding to the third-party server comprises one or more types;
and the authentication server performs information verification on the user information by using the determined authentication mode and feeds back an information verification result to the third-party server.
2. An information verification method applied to an authentication server, the method comprising:
receiving an information verification request sent by a third-party server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server;
determining an authentication mode corresponding to the information verification request according to the third party identifier; the authentication mode corresponding to the third-party server comprises one or more types;
and performing information verification on the user information by using the determined authentication mode.
3. The method according to claim 2, wherein in a case that it is determined that the authentication manner corresponding to the third party identifier is multiple, the performing information verification on the user information by using the determined authentication manner includes:
performing information matching on the user information based on a pre-configured authentication mode matching sequence; the authentication mode matching sequence is based on the safety coefficient configuration of the authentication mode;
and when the information matching is successful, performing information verification on the user information by using the matched authentication mode to obtain an information verification result.
4. The method according to claim 3, wherein the information verification result of the information verification failure is output when the information matching of the plurality of authentication modes corresponding to the third party identifier fails.
5. The method according to claim 2 or 3, wherein the authentication mode at least comprises one of a counter authentication mode, a full channel authentication mode, a release authentication mode, a forbid authentication mode, a joint authentication mode and an operator authentication mode.
6. The method according to claim 2 or 3, wherein when the determined authentication mode is an operator authentication mode, the performing information verification on the user information by using the determined authentication mode includes:
sending the user information to an operator server so that the operator server performs initial information verification on the user information based on a preset authentication rule; the preset authentication rule is sent to the operator server by the authentication server in advance;
receiving an initial information verification result fed back by the operator server;
under the condition that the initial information verification result is successful, performing information verification on the user information according to the initial information verification result;
and under the condition that the initial information verification result fails, outputting an information verification result of which the information verification fails.
7. A method according to claim 2 or 3, characterized in that the method further comprises:
and storing the information verification result corresponding to the information verification request, the third party identification and the determined authentication mode in a correlation manner.
8. The method of claim 7, further comprising:
acquiring information verification results of the information verification data set in a specified time interval or in a specified quantity as authentication configuration data; the information verification data set comprises information verification results stored in a correlated mode, corresponding third party identification and an authentication mode;
analyzing the authentication configuration data based on a preset analysis algorithm, and configuring an authentication mode corresponding to the third party identifier according to an analysis result;
feeding back the configured authentication mode to the third-party server so that the third-party server sets the authentication mode for user information verification according to the configured authentication mode;
and receiving the authentication mode for user information verification fed back by the third-party server, and performing associated storage with the third-party identifier.
9. An information verification apparatus applied to an authentication server, the apparatus comprising:
the request receiving module is used for receiving an information verification request sent by a third-party server; the information verification request comprises a third party identifier and user information; the third party identifier is used for identifying the third party server;
the authentication mode determining module is used for determining the authentication mode corresponding to the information verification request according to the third party identification; the authentication mode corresponding to the third-party server comprises one or more types;
and the authentication module is used for carrying out information verification on the user information by utilizing the determined authentication mode.
10. An information verification device, for use in the information verification terminal, the device comprising a processor and a memory for storing processor-executable instructions, which when executed by the processor, implement steps comprising the method of any one of claims 2 to 8.
CN202010722679.0A 2020-07-24 2020-07-24 Information verification method, device and equipment Active CN111861491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010722679.0A CN111861491B (en) 2020-07-24 2020-07-24 Information verification method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010722679.0A CN111861491B (en) 2020-07-24 2020-07-24 Information verification method, device and equipment

Publications (2)

Publication Number Publication Date
CN111861491A true CN111861491A (en) 2020-10-30
CN111861491B CN111861491B (en) 2023-09-22

Family

ID=72950830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010722679.0A Active CN111861491B (en) 2020-07-24 2020-07-24 Information verification method, device and equipment

Country Status (1)

Country Link
CN (1) CN111861491B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112669042A (en) * 2021-03-15 2021-04-16 中国银联股份有限公司 Payment method, server, user terminal, system and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104616147A (en) * 2013-12-30 2015-05-13 腾讯科技(深圳)有限公司 Information configuration method, device, system, client and server
CN104852884A (en) * 2014-02-14 2015-08-19 中兴通讯股份有限公司 Registration method of third party payment platform, device, and system
CN106341234A (en) * 2015-07-17 2017-01-18 华为技术有限公司 Authorization method and device
WO2017088634A1 (en) * 2015-11-27 2017-06-01 中兴通讯股份有限公司 Third-party application authentication method, authentication server, terminal and management server
CN107733636A (en) * 2016-08-11 2018-02-23 中国电信股份有限公司 Authentication method and Verification System
CN108537520A (en) * 2017-03-03 2018-09-14 银联数据服务有限公司 A kind of method and apparatus of access Third-party payment transaction

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104616147A (en) * 2013-12-30 2015-05-13 腾讯科技(深圳)有限公司 Information configuration method, device, system, client and server
CN104852884A (en) * 2014-02-14 2015-08-19 中兴通讯股份有限公司 Registration method of third party payment platform, device, and system
CN106341234A (en) * 2015-07-17 2017-01-18 华为技术有限公司 Authorization method and device
WO2017088634A1 (en) * 2015-11-27 2017-06-01 中兴通讯股份有限公司 Third-party application authentication method, authentication server, terminal and management server
CN107733636A (en) * 2016-08-11 2018-02-23 中国电信股份有限公司 Authentication method and Verification System
CN108537520A (en) * 2017-03-03 2018-09-14 银联数据服务有限公司 A kind of method and apparatus of access Third-party payment transaction

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112669042A (en) * 2021-03-15 2021-04-16 中国银联股份有限公司 Payment method, server, user terminal, system and storage medium

Also Published As

Publication number Publication date
CN111861491B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
US11017406B2 (en) Multi factor authentication rule-based intelligent bank cards
CN107038579B (en) Electronic payment service processing method, electronic payment method and electronic payment device
CN101651675B (en) By the method and system that authentication code is verified client
CN112036890B (en) Customer identity authentication method and device
CN109448271A (en) A kind of no card withdrawal method, computer readable storage medium and server
CN108337251A (en) Bank card phone number changes implementation method, equipment, system and storage medium
CN111553312A (en) Business handling method and device
CN111343179A (en) Real-time consensus method and device for authenticity of data on link
CN110955677A (en) Identity verification method, device and system
DE60123380T2 (en) METHOD FOR AUTHORIZING A PORTABLE OBJECT, COMPRISING PURCHASED OBJECT AND DEVICE FOR CARRYING OUT THE METHOD
CN111861491A (en) Information verification method, device and equipment
CN106446667B (en) Password data processing method, device and equipment
CN114841698A (en) Transaction information processing method and device and computer readable storage medium
CN111179524B (en) ATM (automatic Teller machine) card retaining and retrieving method and device
US20080263346A1 (en) Method and device for securely sending bootstrap message in device management
CN111614642A (en) Method, device and system for registration authentication
CN110098931A (en) Data transmission method based on trusted " government and enterprises' connection connects " platform
CN214475130U (en) Fingerprint card system based on digital currency payment
CN115171271A (en) Bank card anti-theft swiping method and device, electronic equipment and storage medium
CN114240447A (en) Method, apparatus, computer device, storage medium and product for binding a card
CN116959185A (en) Method, apparatus, device, medium and program product for providing deposit and withdrawal service
CN113537996A (en) Method, device, equipment and storage medium for verifying electronic seal
CN115222368A (en) Data processing method and device, computer equipment and storage medium
CN115393084A (en) Transaction exception processing method and device and electronic equipment
CN117394975A (en) E-Token loss report supplementing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant