CN112308568A - Payment method, payment device, storage medium and computer equipment - Google Patents

Payment method, payment device, storage medium and computer equipment Download PDF

Info

Publication number
CN112308568A
CN112308568A CN202011299817.5A CN202011299817A CN112308568A CN 112308568 A CN112308568 A CN 112308568A CN 202011299817 A CN202011299817 A CN 202011299817A CN 112308568 A CN112308568 A CN 112308568A
Authority
CN
China
Prior art keywords
payment
user
security protection
module
merchant identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011299817.5A
Other languages
Chinese (zh)
Inventor
杨哲
杨一鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202011299817.5A priority Critical patent/CN112308568A/en
Publication of CN112308568A publication Critical patent/CN112308568A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
    • A63F13/792Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories for payment purposes, e.g. monthly subscriptions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the specification provides a payment method, a payment device, a storage medium and computer equipment. Receiving a payment request of current payment sent by a terminal device of a user, wherein the payment request comprises a merchant identifier; inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises a merchant identification; if the user sets a security protection strategy and the selected merchant identification includes the merchant identification, the identity information acquired from the terminal equipment is authenticated; and if the identity authentication is successful, allowing the current payment.

Description

Payment method, payment device, storage medium and computer equipment
[ technical field ] A method for producing a semiconductor device
The present disclosure relates to the field of computer technologies, and in particular, to a payment method, an apparatus, a storage medium, and a computer device.
[ background of the invention ]
The game industry and the digital entertainment industry are industries which develop rapidly in recent years, attract the attention of people through various rich activities and playing methods, and a plurality of users perform large consumption behaviors in the industries. Many minors use adult money to recharge large amounts in games or to enjoy large amounts in live broadcasts, and these payment activities seriously affect the physical and mental health of minors.
[ summary of the invention ]
In view of the above, the present specification provides a payment method, apparatus, storage medium and computer device to prevent over consumption of minors.
In one aspect, an embodiment of the present specification provides a payment method, including:
receiving a payment request of current payment sent by terminal equipment of a user, wherein the payment request comprises a merchant identifier;
inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises the merchant identification;
if the user is inquired to set a security protection strategy and the selected inquired merchant identification comprises the merchant identification, carrying out identity verification on the identity information acquired from the terminal equipment;
and if the identity authentication is successful, allowing the current payment.
Optionally, the security protection policy includes at least one security protection condition, and the payment request further includes at least one payment information;
the method further comprises the following steps:
if the user sets a security protection strategy and the selected merchant identification set by the user is inquired to include the merchant identification, judging whether the payment information meets the corresponding security protection condition;
if the payment information is judged to be not in accordance with the corresponding safety protection condition, the step of verifying the identity information acquired from the terminal equipment is continuously executed;
and if the payment information is judged to accord with the corresponding safety protection condition, allowing the current payment.
Optionally, the method further comprises:
if the user is inquired that the security protection strategy is not set by the user, or the selected merchant identification is inquired that the merchant identification is not included in the set selected merchant identification, or the user is inquired that the security protection strategy is not set by the user and the selected merchant identification is inquired that the merchant identification is not included in the set selected merchant identification, judging whether the current payment has risks;
and if the current payment is judged to have no risk, allowing the current payment.
Optionally, the method further comprises:
and if the current payment is judged to have risk, continuing to execute the step of verifying the identity information acquired from the terminal equipment.
Optionally, the method further comprises:
and if the identity authentication fails, rejecting the current payment.
Optionally, before the querying whether the user sets the security protection policy and querying whether the set selected merchant identifier includes the merchant identifier, the method further includes:
verifying the verification information acquired from the terminal equipment;
if the verification is successful, continuing to execute the steps that whether the inquiry user sets a security protection strategy and whether the set selected merchant identification comprises the merchant identification;
and if the verification fails, rejecting the current payment.
Optionally, the verification information includes a password or a face image input by the user.
Optionally, the identity information comprises a face image;
the authentication of the identity information obtained from the terminal device includes:
and comparing whether the face image is consistent with the image of the identity card information of the user in the identity card information database.
Optionally, the selected merchant identification comprises a merchant identification of a gaming merchant and/or a digital entertainment merchant.
Optionally, the payment information includes a payment time point, and the security protection condition corresponding to the payment information includes a protection period;
the determining whether the payment information meets the corresponding security protection condition includes:
and judging whether the payment time point is in a time period outside the protection period.
Optionally, the payment information includes a payment amount, and the security protection condition corresponding to the payment information includes a protection amount;
the determining whether the payment information meets the corresponding security protection condition includes:
determining whether the payment amount is less than or equal to the protection amount.
In another aspect, an embodiment of the present specification provides a payment apparatus, including:
the system comprises a receiving module, a payment processing module and a payment processing module, wherein the receiving module is used for receiving a payment request of current payment sent by terminal equipment of a user, and the payment request comprises a merchant identifier;
the inquiry module is used for inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises the merchant identification;
the identity authentication module is used for authenticating the identity information acquired from the terminal equipment if the inquiry module inquires that the user sets a security protection strategy and inquires that the set selected merchant identification comprises the merchant identification;
and the payment allowing module is used for allowing the current payment if the identity authentication of the identity authentication module is successful.
Optionally, the security protection policy includes at least one security protection condition, and the payment request further includes at least one payment information;
the device further comprises:
a first judging module, configured to, if the user-set security protection policy is found by the querying module and the set selected merchant identifier includes the merchant identifier, judge whether the payment information meets the corresponding security protection condition, and if the payment information does not meet the corresponding security protection condition, trigger the identity authentication module to continue to perform the step of authenticating the identity information acquired from the terminal device;
the payment allowing module is further configured to allow the current payment if the first determining module determines that the payment information meets the corresponding security protection condition.
Optionally, the method further comprises:
and the second judgment module is used for judging whether the current payment has risks or not if the inquiry module inquires that the user does not set a security protection strategy or inquires that the set selected merchant identifier does not comprise the merchant identifier or inquires that the user does not set a security protection strategy and inquires that the set selected merchant identifier does not comprise the merchant identifier, and triggering the payment allowing module to allow the current payment if the current payment has no risks.
Optionally, the second determining module is further configured to trigger the identity authentication module to continue to perform the step of authenticating the identity information acquired from the terminal device if it is determined that the current transaction is at risk.
Optionally, the method further comprises:
and the payment refusing module is used for refusing the current payment if the identity authentication of the identity authentication module fails.
Optionally, the method further comprises:
the verification module is used for verifying the verification information acquired from the terminal equipment, and if the verification is successful, the inquiry module is triggered to continuously execute the steps that whether the inquiry user sets a security protection strategy or not and whether the set selected merchant identification comprises the merchant identification or not;
and the payment refusing module is also used for refusing the current payment if the verification of the verification module fails.
In another aspect, an embodiment of the present specification provides a storage medium, including: the storage medium comprises a stored program, wherein when the program runs, the device where the storage medium is located is controlled to execute the payment method.
In another aspect, embodiments of the present specification provide a computer device, including a memory for storing information including program instructions and a processor for controlling execution of the program instructions, wherein the program instructions are loaded and executed by the processor to implement the steps of the above payment method.
In the technical scheme of the payment method provided by the embodiment of the present specification, a payment request of current payment sent by a terminal device of a user is received, where the payment request includes a merchant identifier; inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises a merchant identification; if the user sets a security protection strategy and the selected merchant identification includes the merchant identification, the identity information acquired from the terminal equipment is authenticated; and if the identity authentication is successful, allowing the current payment. According to the technical scheme of the embodiment of the specification, the identity verification in the payment process can be realized according to the set safety protection strategy, so that an adult can independently control the consumption process of minors, and the overconsumption of the minors is prevented.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without any creative effort.
Fig. 1 is a flowchart of a payment method provided in an embodiment of the present specification;
fig. 2 is an interface schematic diagram of a security protection policy provided in an embodiment of the present specification;
FIG. 3 is a flow chart of another payment method provided by embodiments of the present description;
fig. 4 is a schematic diagram of a payment method provided in an embodiment of the present specification;
FIG. 5 is an interface diagram of another security protection policy provided by an embodiment of the present specification;
fig. 6 is a schematic structural diagram of a payment device provided in an embodiment of the present disclosure;
fig. 7 is a schematic diagram of a computer device provided in an embodiment of the present specification.
[ detailed description ] embodiments
For better understanding of the technical solutions in the present specification, the following detailed description of the embodiments of the present specification is provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only a few embodiments of the present specification, and not all embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments in the present specification without any inventive step are within the scope of the present specification.
The terminology used in the embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the specification. As used in the specification examples and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of associative relationship that describes an associated object, meaning that three types of relationships may exist, e.g., A and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
In the related art, a payment Application (APP) is installed on a terminal device, and a user can pay for a game or a digital entertainment through the payment APP of the terminal device. For example, digital entertainment includes live or short videos. The game recharging becomes an important profit mode in the game industry, and the live broadcast appreciation also becomes a main profit mode in the digital entertainment industry. As minors lack self-control ability, concepts for network consumption are lacked, and value guide is not necessary, the game or digital entertainment is easy to be consumed irrationally. In fact, for some families that are not themselves very abundant, economic losses due to the massive live-play of minors, game recharge, etc. are not affordable. On the other hand, the popularity of web lessons has increased the "risk" of minor touch-to-the-net, for example, to top up game credits or play-through in the case of adult hides. Many adults, after using a payment APP to recharge games or live broadcast rewards by minors, complain and abuse the payment APP, which seriously affects the brand image of the payment institution to which the payment APP corresponds. In addition, national policies require that each gaming company limit the time and amount of money that minors play. There is therefore a need for a protection mechanism against overconsumption by minors, which can be autonomously controlled by adults, thus preventing overconsumption by minors.
In protecting minors, the gaming industry has attempted to present a "anti-addiction mode" solution that requires real-name authentication of the user, no restriction if the user is an adult, and restriction of 1.5 hours per day if the user is a minor, with a payment of no more than 100 dollars. However, in practical application, some minors can find the grandpa milk to obtain the identity card and deceive families to carry out real-name authentication. Some minors' parents are game users, minors (e.g., children) can play games directly with the account of an adult (e.g., parent), and the game company cannot determine whether the current user is a minor. Although countries require real-name authentication, some gaming industry merchants are not strictly implemented, resulting in the possibility of minors to be charged at will. The game industry is still not perfect in the real-name authentication link, lacks measures for effectively distinguishing the identity of the minor and cannot prevent the over consumption of the minor.
In order to solve the technical problems in the related art, the embodiments of the present specification provide a payment method. Fig. 1 is a flowchart of a payment method provided in an embodiment of the present specification, and as shown in fig. 1, the method includes:
step 102, receiving a payment request of current payment sent by a terminal device of a user, wherein the payment request comprises a merchant identifier.
In the embodiment of the present specification, each step is performed by a server.
In an embodiment of the present specification, the terminal device includes a mobile phone, a computer, a tablet computer, or a wearable device.
In this embodiment of the present specification, the merchant identifier includes a partner identity identifier number (pid for short). In an embodiment of the present specification, the merchant identifier is used to identify the payment object. For example, the merchant identification includes a merchant identification of a gaming merchant or a merchant identification of a digital entertainment merchant.
In the embodiment of the present specification, the user is an adult. For example, minors can use terminal devices of adults to pay for games, such as recharge or live views. In this step, when the minor needs to perform the current payment, the payment button displayed on the terminal device of the user may be clicked to input a payment request to the terminal device, and the terminal device sends the payment request to the server. For example: the current payment may include a game top-up or a live reward.
In the embodiment of the present specification, step 102 includes:
and step S1, receiving the opening strategy operation sent by the terminal equipment of the user.
Fig. 2 is a schematic interface diagram of a security policy provided in an embodiment of the present specification, and as shown in fig. 2, the interface of the security policy includes a personalized document display and an on state button. Personalized paperwork display includes "worry about spending money with children? The minor lock is set, and each game transaction is strictly defended.
In the embodiment of the present specification, the personalized literature shows a wish for improving the user to open a security protection policy. Alternatively, the server may classify the user as a high-security user or a child-interest user based on the user operation information stored in the database. For example: the user operation information comprises a login password which is modified for a plurality of times and/or an account login which is quitted for a plurality of times by the user within a set time period, and the user is determined to be a user with high security. Another example is: the user operation information comprises that the user purchases children products for a plurality of times within a set time period, and then the user is determined as a child concerned user. The personalized case show corresponding to the high-security-sense user comprises the steps of opening a minor lock to protect your fund security; the personalized file display corresponding to the child care type user comprises 'opening a minor lock to protect the physical and mental health of the child'.
In this step, when a payment APP is logged in on the terminal device using the payment account of an adult, the payment APP exhibits an on-state button. The user can click the opening state button to input the opening strategy operation to the terminal equipment, and the terminal equipment sends the opening strategy operation to the server.
And step S2, sending a verification request to the terminal equipment of the user.
The verification request comprises a face brushing request, and the terminal equipment displays a face brushing interface so that a user can brush faces through the terminal equipment.
And step S3, receiving the face image sent by the terminal equipment of the user.
As an alternative, the user scans his face through a face brushing interface on the terminal device to input a face image to the terminal device, and the terminal device sends the face image to the server.
As another alternative, the minor scans his face through a face brushing interface on the terminal device to input a face image to the terminal device, and the terminal device sends the face image to the server.
Step S4, judging whether the face image is consistent with the image of the identity card information of the user in the identity card information database, if so, executing step S6; if not, go to step S5.
In the embodiment of the present specification, an image of the identification card information used by the user to register the payment account is stored in the identification card information database. If the user performs the face brushing operation in step S3, it is determined that the face image is consistent with the image of the user' S identification card information in the identification card information database, which indicates that the person using the terminal device and the registered person of the payment account are the same person at this time, that is, the user performs the security protection policy opening operation in using the terminal device; if the minor performs the face brushing operation in step S3, it is determined that the face image is not consistent with the image of the user' S identification card information in the identification card information database, which indicates that the person using the terminal device is not the same person as the registered person of the payment account at this time, for example, the minor performs the security protection policy opening operation using the terminal device.
And step S5, refusing to open the security protection strategy, and ending the process.
In this step, the state of the on state button in fig. 2 remains unchanged, and is still in the off state.
And step S6, allowing the security protection strategy to be opened.
In this step, the state of the on state button in fig. 2 is changed to the on state. The on state of the on state button can be seen in fig. 5 below.
In the embodiment of the description, if the server refuses to open the security protection policy, it indicates that the user does not set the security protection policy; and if the server allows the security protection strategy to be opened, indicating that the user sets the security protection strategy.
104, inquiring whether a user sets a security protection strategy and inquiring whether a set selected merchant identifier comprises a merchant identifier, and if so, executing 106; if not, go to step 110.
In an embodiment of the present specification, the selected merchant identifier includes a merchant identifier of the game merchant and/or a merchant identifier of the digital entertainment merchant.
If the user setting security protection policy is found and the selected merchant identifier includes the merchant identifier, step 106 is executed.
If the user-set security protection policy is found and the merchant identifier is not included in the found selected merchant identifier, step 110 is executed.
If the user is not queried to set the security protection policy and the selected merchant identifier includes the merchant identifier, step 110 is executed.
If it is found that the user does not set the security protection policy and the selected merchant identifier does not include the merchant identifier, step 110 is executed.
Step 106, performing identity authentication on the identity information acquired from the terminal equipment, and if the identity authentication is successful, executing step 108; if the authentication fails, step 112 is performed.
Specifically, when the identity information includes a face image, comparing whether the face image is consistent with the image of the identity card information of the user in the identity card information database, if so, indicating that the identity authentication is successful, and if not, indicating that the identity authentication is failed.
In this step, the operator may perform a face brushing operation on the terminal device to input a face image to the terminal device, and the operator may include a user (adult) or a minor, for example. Specifically, the face of the user can be scanned through a face brushing interface of the terminal device so as to input the face image into the terminal device, and then the terminal device sends the face image to the server. For example, if the authentication is successful, it indicates that the user performs a face brushing operation on the terminal device to input a face image to the terminal device, that is, the user himself is currently performing the payment operation; if the identity authentication fails, the fact that the minor carries out face brushing operation on the terminal device to input the face image into the terminal device is shown, namely the minor does not currently carry out the payment operation, and the minor carries out the payment operation currently.
And step 108, allowing the current payment and ending the process.
In this step, the server completes the payment process of the current payment, indicating that the payment is successful.
Step 110, judging whether the current payment has risks, if so, executing step 106; if not, go to step 108.
In this embodiment of the present specification, whether a risk exists in current payment may be determined through historical behavior data of a user, for example: the historical behavior data includes payment amounts or payment time points.
As an alternative, if the previous payment amounts of the user are less than or equal to the set amount value and the current payment amount is greater than the set amount value, determining that the current payment is at risk, and continuing to execute step 106; if the amount of the current payment is less than or equal to the set amount, it is determined that there is no risk in the current payment, and the step 108 is continuously executed.
As another alternative, if the user has not paid for the specified time period before, and the current payment time point is within the specified time period, it is determined that there is a risk in the current payment, and step 106 is continuously executed; if the time point of the current payment is outside the designated time period, it is determined that there is no risk in the current payment, and the step 108 is continuously executed.
Step 112, current payment is denied.
In this step, the server rejects the payment process of the current payment, indicating that the payment failed.
In this embodiment, as an alternative, step 104 further includes:
step 1032, checking the checking information acquired from the terminal equipment, and if the checking is successful, executing step 104; if the verification fails, go to step 112.
The verification information includes a password or a face image.
When the verification information includes a password, step 1032 may specifically include: and the server compares the acquired password with the stored password, if the acquired password is consistent with the stored password, the verification is successful, and if the acquired password is inconsistent with the stored password, the verification is failed. Specifically, the user or the minor may input a password on the terminal device, and then the terminal device transmits the input password to the server.
When the verification information includes a face image, step 1032 may specifically include: the server judges whether the face image is consistent with the image of the identity card information of the user in the identity card information database, if so, the verification is successful, and if not, the verification is failed. Specifically, a user or a minor scans the face of the user or the minor through a face brushing interface of the terminal device to input a face image to the terminal device, and then the terminal device sends the face image to the server
In this embodiment, as another alternative, step 104 further includes:
1034, obtaining a verification result from the terminal equipment, and if the verification result includes successful verification, executing step 104; if the verification result includes a verification failure, step 112 is executed.
The verification information includes a fingerprint or a face image.
When the verification information comprises the fingerprint, the terminal equipment receives the fingerprint input by the user or the minor, inquires whether the stored fingerprint comprises the fingerprint matched with the fingerprint input by the user, and generates a verification result which is verified successfully if the stored fingerprint comprises the fingerprint matched with the fingerprint input by the user; if not, generating a verification result of verification failure. Then, the terminal device sends the verification result to the server. In this case, the fingerprint stored in the terminal device is the fingerprint of the user.
When the verification information comprises a face image, a user or a minor scans the face of the user or the minor through a face brushing interface on the terminal equipment to input the face image into the terminal equipment, then the terminal equipment inquires whether the stored face image comprises the face image matched with the input face image, and if so, a verification result of successful verification is generated; if not, generating a verification result of verification failure. In this case, the face image stored in the terminal device may be a face image of the user.
In this embodiment of this specification, the payment request further includes a payment account, and after step 102, the method further includes:
step 1031, judging whether the payment account number is the same as the stored minor account number, if not, executing step 1032; if yes, go to step 112. The minor account is a payment account registered by the minor.
In this step, if the payment account is judged to be different from the stored minor account, it can be shown that the minor uses the user account of the adult to pay, and the step 1032 is continuously executed; if the payment account is determined to be the same as the stored minor account, indicating that the minor uses its minor account to make payment, the process continues to step 112, and the minor is directly rejected from using its minor account to make current payment.
In the technical solution of the payment method provided in the embodiment of the present specification, a payment request of current payment sent by a terminal device of a user is received, where the payment request includes a merchant identifier; inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises a merchant identification; if the user sets a security protection strategy and the selected merchant identification includes the merchant identification, the identity information acquired from the terminal equipment is authenticated; and if the identity authentication is successful, allowing the current payment. According to the technical scheme of the embodiment of the specification, the identity verification in the payment process can be realized according to the set safety protection strategy, so that an adult can independently control consumption of minors, and the overconsumption of the minors is prevented.
The embodiment of the specification provides another payment method. Fig. 3 is a flowchart of another payment method provided in an embodiment of the present specification, and fig. 4 is a schematic diagram of a payment method provided in an embodiment of the present specification, as shown in fig. 3 and fig. 4, the method includes:
step 202, receiving a payment request of current payment sent by a terminal device of a user, wherein the payment request comprises a merchant identifier and at least one payment information.
In the embodiment of this specification, please refer to step 102 for a detailed description of step 202.
In this embodiment, step 202 includes:
and step S1, receiving the opening strategy operation sent by the terminal equipment of the user.
As shown in fig. 2, the interface to the security protection policy includes personalized document presentation and on status buttons. Personalized paperwork display includes "worry about spending money with children? The minor lock is set, and each game transaction is strictly defended.
In the embodiment of the present specification, the personalized literature shows a wish for improving the user to open a security protection policy. Alternatively, the server may classify the user as a high-security user or a child-interest user based on the user operation information stored in the database. For example: the user operation information comprises a login password which is modified for a plurality of times and/or an account login which is quitted for a plurality of times by the user within a set time period, and the user is determined to be a user with high security. Another example is: the user operation information comprises that the user purchases children products for a plurality of times within a set time period, and then the user is determined as a child concerned user. The personalized case show corresponding to the high-security-sense user comprises the steps of opening a minor lock to protect your fund security; the personalized file display corresponding to the child care type user comprises 'opening a minor lock to protect the physical and mental health of the child'.
In this step, when a payment APP is logged in on the terminal device using the payment account of an adult, the payment APP exhibits an on-state button. The user can click the opening state button to input the opening strategy operation to the terminal equipment, and the terminal equipment sends the opening strategy operation to the server.
And step S2, sending a verification request to the terminal equipment of the user.
The verification request comprises a face brushing request, and the terminal equipment displays a face brushing interface so that a user can brush faces through the terminal equipment.
And step S3, receiving the face image sent by the terminal equipment of the user.
As an alternative, the user scans his face through a face brushing interface on the terminal device to input a face image to the terminal device, and the terminal device sends the face image to the server. As another alternative, the minor scans his face through a face brushing interface on the terminal device to input a face image to the terminal device, and the terminal device sends the face image to the server.
Step S4, judging whether the face image is consistent with the image of the identity card information of the user in the identity card information database, if so, executing step S6; if not, go to step S5.
In the embodiment of the present specification, an image of the identification card information used by the user to register the payment account is stored in the identification card information database. If the user performs the face brushing operation in step S3, it is determined that the face image is consistent with the image of the user' S identification card information in the identification card information database, indicating that the person using the mobile phone and the registered person of the payment account are the same person at this time, that is, the user performs the security protection policy opening operation in the terminal device; if the minor performs the face brushing operation in step S3, it is determined that the face image is not consistent with the image of the user' S identification card information in the identification card information database, which indicates that the person using the terminal device is not the same person as the registered person of the payment account at this time, for example, the minor performs the security protection policy opening operation using the terminal device.
And step S5, refusing to open the security protection strategy, and ending the process.
In this step, the state of the on state button in fig. 2 remains unchanged, and is still in the off state.
And step S6, allowing the security protection strategy to be opened.
In this step, the state of the on state button in fig. 2 is changed to the on state. The on state of the on state button can be seen in fig. 5 below.
In the embodiment of the description, if the server refuses to open the security protection policy, it indicates that the user does not set the security protection policy; and if the server allows the security protection strategy to be opened, indicating that the user sets the security protection strategy.
And step S7, receiving at least one safety protection condition sent by the terminal equipment of the user.
Fig. 5 is a schematic interface diagram of another security policy provided in an embodiment of this specification, and as shown in fig. 5, the interface of the security policy includes a personalized document display, an on state button, and a security protection condition. Personalized paperwork display includes "worry about spending money with children? The minor lock is set, and each game transaction is strictly defended. The safety protection condition includes a time period outside the protection period or less than or equal to the protection amount. For example, the protected period includes 20:00 per day to 8:00 per day. As another example, the protection amount includes 500 dollars.
In this step, the user sets at least one security protection condition on the terminal device, and the terminal device sends the at least one security protection condition to the server. For example: the user inputs the protection period and/or the protection amount to the terminal device to set at least one security protection condition.
Step 204, inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises a merchant identification, if so, executing step 206; if not, go to step 212.
In the embodiment of this specification, please refer to step 104 for a detailed description of step 204.
Step 206, judging whether the payment information meets the corresponding safety protection condition, if so, executing step 210; if not, go to step 208.
In an embodiment of the present specification, the security protection policy includes at least one security protection condition.
As an alternative, the payment information includes a payment time point, and the security protection condition corresponding to the payment information includes a time period outside the protection period. Specifically, step 206 may include: judging whether the payment time point is in a time period outside the protection time period, and if the payment time point is judged to be in the time period outside the protection time period, indicating that the payment information can reach the safety protection condition; and if the payment time point is judged to be in the protection time period, the payment information is shown to be incapable of reaching the safety protection condition. The purpose of setting the protection period is that when the time period is outside the protection period, the authentication process in step 208 does not need to be executed, and frequent execution of the authentication process is avoided.
As another alternative, the payment information includes a payment amount, and the security protection condition for the payment information includes less than or equal to the protection amount. Specifically, step 206 may include: judging whether the payment amount is less than or equal to the protection amount, and if the payment amount is less than or equal to the protection amount, indicating that the payment information can reach the safety protection condition; and if the payment amount is judged to be larger than the protection amount, the payment information is indicated to be incapable of meeting the safety protection condition. The purpose of setting the protection amount is that when the payment amount is small, the authentication process in the step 208 does not need to be executed, the frequent execution of the authentication process is avoided on the premise of ensuring the fund safety, and the protection amount is set by the user, so that the user can realize the supervision of minors, and the user experience is improved when the user uses the terminal device to pay.
It should be noted that: when the payment request includes a plurality of payment information, step 206 may specifically include: judging whether the plurality of payment information all accord with the corresponding safety protection conditions, and executing the step 210 if the plurality of payment information all accord with the corresponding safety protection conditions; if it is determined that the at least one payment information does not comply with the corresponding security protection condition, step 208 is performed. For example: if the payment time point is judged to be in a time period outside the protection time period and the payment amount is less than or equal to the protection amount, the payment information can reach the safety protection condition; and if the payment time point is judged to be in the protection time period and/or the payment amount is judged to be larger than the protection amount, indicating that the payment information can not reach the safety protection condition.
Step 208, performing identity authentication on the identity information acquired from the terminal equipment, and if the identity authentication is successful, executing step 210; if the authentication fails, go to step 214.
In this embodiment, please refer to step 106 for a detailed description of step 208.
At step 210, the current payment is allowed and the process ends.
In the embodiment of the present disclosure, please refer to step 108 for a detailed description of step 210.
Step 212, judging whether the current payment has risks, if so, executing step 208; if not, go to step 210.
In this embodiment, please refer to step 110 for a detailed description of step 212.
Step 214, current payment is denied.
In the embodiment of the present disclosure, please refer to step 112 for a detailed description of step 214.
In this embodiment, as an alternative, step 204 further includes:
step 2032, verifying the verification information obtained from the terminal equipment, and if the verification is successful, executing step 204; if the verification fails, go to step 214.
In this embodiment, please refer to step 1032 for detailed description of step 2032.
In this embodiment, as another alternative, step 204 further includes:
step 2032, obtaining a verification result from the terminal device, and if the verification result includes a successful verification, executing step 204; if the verification result includes a verification failure, step 214 is executed.
In this embodiment, please refer to step 1032 for detailed description of step 2032.
In this embodiment of this specification, the payment request further includes a payment account, and after step 202, the method further includes:
step 2031, judging whether the payment account is the same as the stored minor account, if not, executing step 2032; if so, go to step 214. The minor account is a payment account registered by the minor.
In this step, if it is determined that the payment account is different from the stored minor account, it indicates that the minor uses the user account of the adult to make payment, and the step 2032 is continuously executed; if the payment account is determined to be the same as the stored minor account, indicating that the minor uses its minor account to make payment, the process continues to step 214, and the minor is directly rejected from using its minor account to make current payment.
The following describes the payment method of the embodiment of the present specification in detail by using a specific example. In this example, the user may be an adult, for example, an adult being a parent of a minor. The method comprises the steps that an adult opens a security protection strategy on terminal equipment, and a minor uses the terminal equipment of the adult which opens the security protection strategy to carry out current payment, wherein the current payment comprises game recharging payment operation or direct-playing reward payment operation.
When the minor needs to perform the current payment, a "pay" button displayed on the terminal device is clicked to transmit a payment request for the current payment to the server.
First, a check can be performed by the check information.
As an alternative, the verification information comprises a password of the user. If the adult does not inform the minor of the password of the user, the minor can request the adult to input the password of the user, and at the moment, the adult can input the password of the user on the terminal equipment to perform one-time verification. Or, if the adult informs the minor of the user's password, the minor may directly input the user's password on the terminal device for one-time verification. See step 1032 for a detailed description of the one-time check.
As another alternative, the verification information includes a face image. The minor can request the adult to brush the face, and the adult scans the face through a face brushing interface on the terminal device to input the face image to the terminal device, so that primary verification is performed. Or, the minor scans the face of the minor through a face brushing interface on the terminal device to input the face image to the terminal device, so as to perform primary verification. See step 1032 for a detailed description of the one-time check.
As another alternative, the verification information comprises a fingerprint. The minor may request the adult to enter a fingerprint and the adult may enter the fingerprint on the terminal device for a one-time verification. Alternatively, the minor may enter a fingerprint on the terminal device for a one-time verification. See step 1034 for a detailed description of the one-time check.
As another alternative, the verification information includes a face image. The minor can request the adult to brush the face, and then the adult scans the face of the minor through a face brushing interface on the terminal device to input a face image to the terminal device, so that primary verification is performed. Or, the minor scans the face of the minor through a face brushing interface on the terminal device to input a face image to the terminal device, so as to perform primary verification. See step 1034 for a detailed description of the one-time check.
Secondly, after the first verification is successful, the terminal device displays a face brushing interface so as to perform second verification. The minor can request the adult to brush face, the adult scans the face through a face brushing interface on the terminal device to input a face image to the terminal device, so that secondary verification is carried out, and if the secondary verification is successful, current payment is allowed. Or the minor scans the face of the minor through a face brushing interface on the terminal equipment to input a face image to the terminal equipment, so that secondary verification is carried out, and if the secondary verification fails, the current payment is refused. For a detailed description of the secondary verification, see step 106.
In the technical solution of the payment method provided in the embodiment of the present specification, a payment request of current payment sent by a terminal device of a user is received, where the payment request includes a merchant identifier; inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises a merchant identification; if the user sets a security protection strategy and the selected merchant identification includes the merchant identification, the identity information acquired from the terminal equipment is authenticated; and if the identity authentication is successful, allowing the current payment. According to the technical scheme of the embodiment of the specification, the identity verification in the payment process can be realized according to the set safety protection strategy, so that an adult can independently control the consumption process of minors, and the overconsumption of the minors is prevented.
In the embodiment of the specification, the first verification is performed after the payment request is received, and if the verification fails, the current payment is rejected, so that the follow-up authentication process according to the security protection strategy is avoided, and the decision time of the system is reduced.
In the technical scheme provided by the embodiment of the specification, the minors can be prevented from paying by using the terminal equipment of the adults under the condition that the adults do not know, so that a series of problems caused by the impulsion of consumption of the minors are prevented. This description embodiment can reduce adult's complaint, reduces the public opinion influence to the payment mechanism that payment APP corresponds, also can strengthen the user to the knowledge of the payment mechanism's that payment APP corresponds safety brand, helps promoting market share.
The embodiment of the specification provides a payment device. Fig. 6 is a schematic structural diagram of a payment apparatus provided in an embodiment of the present disclosure, and as shown in fig. 6, the apparatus includes: a receiving module 11, a query module 12, an authentication module 13 and a payment enabling module 14.
The receiving module 11 is configured to receive a payment request of a current payment sent by a terminal device of a user, where the payment request includes a merchant identifier.
The query module 12 is configured to query whether the user sets a security protection policy and query whether the set selected merchant identifier includes a merchant identifier.
The identity authentication module 13 is configured to authenticate the identity of the identity information obtained from the terminal device if the query module 12 queries that the user sets the security protection policy and queries that the set selected merchant identifier includes the merchant identifier.
The payment enabling module 14 is configured to enable the current payment if the authentication module 13 successfully authenticates.
In this embodiment of the present specification, the security protection policy includes at least one security protection condition, and the payment request further includes at least one payment information;
the device further comprises: a first judging module 15.
The first judging module 15 is configured to, if the querying module 12 queries that the user sets the security protection policy and queries that the set selected merchant identifier includes a merchant identifier, judge whether the payment information meets the corresponding security protection condition, and if the payment information does not meet the corresponding security protection condition, trigger the identity verifying module 13 to continue to perform the step of verifying the identity information acquired from the terminal device.
The payment allowing module 14 is further configured to allow the current payment if the first determining module 15 determines that the payment information meets the corresponding security protection condition.
In an embodiment of this specification, the apparatus further includes: a second decision block 16.
The second determining module 16 is configured to determine whether the current payment is risky if the querying module 12 queries that the user does not set the security protection policy, or queries that the set selected merchant identifier does not include the merchant identifier, or queries that the user does not set the security protection policy and queries that the set selected merchant identifier does not include the merchant identifier, and trigger the payment allowing module 14 to allow the current payment if the current payment is determined to be risky.
In this embodiment of the present specification, the second determining module 16 is further configured to trigger the identity verifying module 13 to continue to perform the step of verifying the identity information acquired from the terminal device if it is determined that the current transaction is at risk.
In an embodiment of this specification, the apparatus further includes: the payment module 17 is rejected.
The payment refusal module 17 is used for refusing the current payment if the authentication module 13 fails to authenticate.
In an embodiment of this specification, the apparatus further includes: a verification module 18.
The checking module 18 is configured to check the checking information obtained from the terminal device, and if the checking is successful, trigger the querying module 12 to continue to perform the steps of querying whether the user sets the security protection policy and querying whether the set selected merchant identifier includes the merchant identifier.
The payment refusal module 17 is also used for refusing the current payment if the verification by the verification module 18 fails.
In an embodiment of the present specification, the verification information includes a password or a face image input by a user.
In the embodiment of the present specification, the identity information includes a face image. The identity verification module 13 is specifically configured to compare whether the face image is consistent with the image of the identity card information of the user in the identity card information database.
In this embodiment of the present specification, as another alternative, the checking module 18 is configured to obtain a checking result from the terminal device, and if it is recognized that the checking result includes a successful checking result, trigger the querying module 12 to continue to perform the steps of querying whether the user sets the security protection policy and querying whether the set selected merchant identifier includes the merchant identifier. In this embodiment of the present specification, the payment refusal module 17 is further configured to refuse the current payment if the verification module 18 identifies that the verification result includes a verification failure.
In embodiments of the present description, the selected merchant identification includes a merchant identification of the gaming merchant and/or the digital entertainment merchant.
In the embodiment of the present specification, the payment information includes a payment time point, the security protection condition corresponding to the payment information includes a protection time period, and the first determining module 15 is specifically configured to determine whether the payment time point is located in a time period other than the protection time period.
In the embodiment of the present specification, the payment information includes a payment amount, the security protection condition corresponding to the payment information includes a protection amount, and the first determining module 15 is specifically configured to determine whether the payment amount is less than or equal to the protection amount.
The payment apparatus provided by the present embodiment may be used to implement the payment methods in fig. 1, fig. 3, and fig. 4, and specific descriptions may refer to the embodiments of the payment methods, and will not be described repeatedly here.
In the technical scheme of the payment method provided by the embodiment of the present specification, a payment request of current payment sent by a terminal device of a user is received, where the payment request includes a merchant identifier; inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises a merchant identification; if the user sets a security protection strategy and the selected merchant identification includes the merchant identification, the identity information acquired from the terminal equipment is authenticated; and if the identity authentication is successful, allowing the current payment. According to the technical scheme, the identity authentication in payment can be realized according to the set security policy, so that an adult can independently control the consumption process of minors, and the overconsumption of the minors is prevented.
Embodiments of the present specification provide a storage medium, where the storage medium includes a stored program, where, when the program runs, a device on which the storage medium is located is controlled to execute each step of the above-described embodiments of the payment method, and specific descriptions may refer to the above-described embodiments of the payment method.
Embodiments of the present description provide a computer device, including a memory for storing information including program instructions and a processor for controlling execution of the program instructions, where the program instructions are loaded and executed by the processor to implement the steps of the embodiments of the payment method described above, and specific descriptions may refer to the embodiments of the payment method described above.
Fig. 7 is a schematic diagram of a computer device provided in an embodiment of the present specification. As shown in fig. 7, the computer device 20 of this embodiment includes: a processor 21, a memory 22, and a computer program 23 stored in the memory 22 and capable of running on the processor 21, wherein the computer program 23 is implemented in the payment method in the embodiment when executed by the processor 21, and in order to avoid repetition, the detailed description is omitted here. Alternatively, the computer program is executed by the processor 21 to implement the functions of each model/unit applied to the payment apparatus in the embodiments, which are not described herein for avoiding redundancy.
The computer device 20 includes, but is not limited to, a processor 21, a memory 22. Those skilled in the art will appreciate that fig. 7 is merely an example of a computer device 20 and is not intended to limit the computer device 20 and that it may include more or less components than those shown, or some of the components may be combined, or different components may be included, for example, a network device may also include input output devices, network access devices, buses, etc.
The Processor 21 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 22 may be an internal storage unit of the computer device 20, such as a hard disk or a memory of the computer device 20. The memory 22 may also be an external storage device of the computer device 20, such as a plug-in hard disk provided on the computer device 20, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 22 may also include both internal storage units of the computer device 20 and external storage devices. The memory 22 is used to store computer programs and other programs and data required by the network device. The memory 22 may also be used to temporarily store data that has been output or is to be output.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present specification, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present description may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods described in the embodiments of the present disclosure. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (19)

1. A payment method, comprising:
receiving a payment request of current payment sent by terminal equipment of a user, wherein the payment request comprises a merchant identifier;
inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises the merchant identification;
if the user is inquired to set a security protection strategy and the selected inquired merchant identification comprises the merchant identification, carrying out identity verification on the identity information acquired from the terminal equipment;
and if the identity authentication is successful, allowing the current payment.
2. The method of claim 1, wherein the security protection policy includes at least one security protection condition, the payment request further includes at least one payment information;
the method further comprises the following steps:
if the user sets a security protection strategy and the selected merchant identification set by the user is inquired to include the merchant identification, judging whether the payment information meets the corresponding security protection condition;
if the payment information is judged to be not in accordance with the corresponding safety protection condition, the step of verifying the identity information acquired from the terminal equipment is continuously executed;
and if the payment information is judged to accord with the corresponding safety protection condition, allowing the current payment.
3. The method of claim 1, further comprising:
if the user is inquired that the security protection strategy is not set by the user, or the selected merchant identification is inquired that the merchant identification is not included in the set selected merchant identification, or the user is inquired that the security protection strategy is not set by the user and the selected merchant identification is inquired that the merchant identification is not included in the set selected merchant identification, judging whether the current payment has risks;
and if the current payment is judged to have no risk, allowing the current payment.
4. The method of claim 3, further comprising:
and if the current payment is judged to have risk, continuing to execute the step of verifying the identity information acquired from the terminal equipment.
5. The method of claim 1, further comprising:
and if the identity authentication fails, rejecting the current payment.
6. The method of claim 1, wherein the querying whether the user sets a security protection policy and querying whether the set selected merchant identifier includes the merchant identifier further comprises:
verifying the verification information acquired from the terminal equipment;
if the verification is successful, continuing to execute the steps that whether the inquiry user sets a security protection strategy and whether the set selected merchant identification comprises the merchant identification;
and if the verification fails, rejecting the current payment.
7. The method of claim 6, wherein the verification information comprises a password or a face image input by a user.
8. The method of any of claims 1 to 5, wherein the identity information comprises a face image;
the authentication of the identity information obtained from the terminal device includes:
and comparing whether the face image is consistent with the image of the identity card information of the user in the identity card information database.
9. The method of any of claims 1 to 7, wherein the selected merchant identification comprises a merchant identification of a gaming merchant and/or a digital entertainment merchant.
10. The method of claim 2, wherein the payment information includes a point in time of payment, the payment information corresponding to a security protection condition including a protection period;
the determining whether the payment information meets the corresponding security protection condition includes:
and judging whether the payment time point is in a time period outside the protection period.
11. The method of claim 2, wherein the payment information includes a payment amount, the payment information corresponding to a security protection condition including a protection amount;
the determining whether the payment information meets the corresponding security protection condition includes:
determining whether the payment amount is less than or equal to the protection amount.
12. A payment device, comprising:
the system comprises a receiving module, a payment processing module and a payment processing module, wherein the receiving module is used for receiving a payment request of current payment sent by terminal equipment of a user, and the payment request comprises a merchant identifier;
the inquiry module is used for inquiring whether a user sets a security protection strategy and inquiring whether the set selected merchant identification comprises the merchant identification;
the identity authentication module is used for authenticating the identity information acquired from the terminal equipment if the inquiry module inquires that the user sets a security protection strategy and inquires that the set selected merchant identification comprises the merchant identification;
and the payment allowing module is used for allowing the current payment if the identity authentication of the identity authentication module is successful.
13. The apparatus of claim 12, wherein the security protection policy includes at least one security protection condition, the payment request further includes at least one payment information;
the device further comprises:
a first judging module, configured to, if the user-set security protection policy is found by the querying module and the set selected merchant identifier includes the merchant identifier, judge whether the payment information meets the corresponding security protection condition, and if the payment information does not meet the corresponding security protection condition, trigger the identity authentication module to continue to perform the step of authenticating the identity information acquired from the terminal device;
the payment allowing module is further configured to allow the current payment if the first determining module determines that the payment information meets the corresponding security protection condition.
14. The apparatus of claim 12, further comprising:
and the second judgment module is used for judging whether the current payment has risks or not if the inquiry module inquires that the user does not set a security protection strategy or inquires that the set selected merchant identifier does not comprise the merchant identifier or inquires that the user does not set a security protection strategy and inquires that the set selected merchant identifier does not comprise the merchant identifier, and triggering the payment allowing module to allow the current payment if the current payment has no risks.
15. The apparatus of claim 14, wherein,
the second judging module is further configured to trigger the identity verification module to continue to perform the step of verifying the identity information acquired from the terminal device if it is judged that the current transaction is risky.
16. The apparatus of claim 12, further comprising:
and the payment refusing module is used for refusing the current payment if the identity authentication of the identity authentication module fails.
17. The apparatus of claim 12, further comprising:
the verification module is used for verifying the verification information acquired from the terminal equipment, and if the verification is successful, the inquiry module is triggered to continuously execute the steps that whether the inquiry user sets a security protection strategy or not and whether the set selected merchant identification comprises the merchant identification or not;
and the payment refusing module is also used for refusing the current payment if the verification of the verification module fails.
18. A storage medium, comprising: the storage medium includes a stored program, wherein the program, when executed, controls a device in which the storage medium is located to perform the payment method of any one of claims 1 to 11.
19. A computer device comprising a memory for storing information including program instructions and a processor for controlling the execution of the program instructions, wherein the program instructions when loaded and executed by the processor implement the steps of a payment method as claimed in any one of claims 1 to 11.
CN202011299817.5A 2020-11-18 2020-11-18 Payment method, payment device, storage medium and computer equipment Pending CN112308568A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011299817.5A CN112308568A (en) 2020-11-18 2020-11-18 Payment method, payment device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011299817.5A CN112308568A (en) 2020-11-18 2020-11-18 Payment method, payment device, storage medium and computer equipment

Publications (1)

Publication Number Publication Date
CN112308568A true CN112308568A (en) 2021-02-02

Family

ID=74335192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011299817.5A Pending CN112308568A (en) 2020-11-18 2020-11-18 Payment method, payment device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN112308568A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116681447A (en) * 2023-07-28 2023-09-01 青岛华正信息技术股份有限公司 Business big data processing method and system based on big data and artificial intelligence
CN116704586A (en) * 2023-08-01 2023-09-05 荣耀终端有限公司 Face recognition method, electronic device, storage medium and program product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107705128A (en) * 2017-09-05 2018-02-16 深圳支点电子智能科技有限公司 A kind of payment verification method and system
CN109255617A (en) * 2018-08-22 2019-01-22 奇酷互联网络科技(深圳)有限公司 Intelligent payment method, mobile terminal and computer-readable storage media
WO2019178753A1 (en) * 2018-03-20 2019-09-26 深圳蓝贝科技有限公司 Payment method, device and system
CN111815331A (en) * 2020-09-04 2020-10-23 支付宝(杭州)信息技术有限公司 Juvenile payment behavior identification method and device
CN111915317A (en) * 2020-08-31 2020-11-10 支付宝(杭州)信息技术有限公司 Payment processing method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107705128A (en) * 2017-09-05 2018-02-16 深圳支点电子智能科技有限公司 A kind of payment verification method and system
WO2019178753A1 (en) * 2018-03-20 2019-09-26 深圳蓝贝科技有限公司 Payment method, device and system
CN109255617A (en) * 2018-08-22 2019-01-22 奇酷互联网络科技(深圳)有限公司 Intelligent payment method, mobile terminal and computer-readable storage media
CN111915317A (en) * 2020-08-31 2020-11-10 支付宝(杭州)信息技术有限公司 Payment processing method, device and system
CN111815331A (en) * 2020-09-04 2020-10-23 支付宝(杭州)信息技术有限公司 Juvenile payment behavior identification method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116681447A (en) * 2023-07-28 2023-09-01 青岛华正信息技术股份有限公司 Business big data processing method and system based on big data and artificial intelligence
CN116704586A (en) * 2023-08-01 2023-09-05 荣耀终端有限公司 Face recognition method, electronic device, storage medium and program product

Similar Documents

Publication Publication Date Title
US10102524B2 (en) Access control and mobile security app
CN106797371B (en) Method and system for user authentication
CN108352022B (en) System and method for monitoring computer authentication programs
CN104200152B (en) System and method for risk-based authentication
US9589260B2 (en) System and method for authenticating electronic money using a smart card and a communication terminal
US9489503B2 (en) Behavioral stochastic authentication (BSA)
US8365246B2 (en) Protecting confidential information on network sites based on security awareness
US8572686B2 (en) Method and apparatus for object transaction session validation
CN104915832B (en) Mobile payment, verification method and its device and system
US20100063906A1 (en) Systems and methods for authentication of a virtual stored value card
US8806602B2 (en) Apparatus and method for performing end-to-end encryption
US8752157B2 (en) Method and apparatus for third party session validation
US20240007476A1 (en) Multi-factor authentication using confidant verification of user identity
US8572690B2 (en) Apparatus and method for performing session validation to access confidential resources
CN112308568A (en) Payment method, payment device, storage medium and computer equipment
CN106529955A (en) Payment method and device
EP3185195A1 (en) Method and system for cross-authorisation of a financial transaction made from a joint account
CN111754237B (en) Verification method and device for transfer transaction
TW202042136A (en) Mobile payment self-service signing method, device and system
US20180375847A1 (en) Stored value user identification system using blockchain or math-based function
US8572724B2 (en) Method and apparatus for network session validation
EP4046093B1 (en) A digital, personal and secure electronic access permission
CN104252676A (en) System and method for using real-time communication and digital certificate to authenticate Internet bank account identity
US8584201B2 (en) Method and apparatus for session validation to access from uncontrolled devices
US8572688B2 (en) Method and apparatus for session validation to access third party resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40045457

Country of ref document: HK

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210202