CN112651841A - Online business handling method and device, server and computer readable storage medium - Google Patents

Online business handling method and device, server and computer readable storage medium Download PDF

Info

Publication number
CN112651841A
CN112651841A CN202011508000.4A CN202011508000A CN112651841A CN 112651841 A CN112651841 A CN 112651841A CN 202011508000 A CN202011508000 A CN 202011508000A CN 112651841 A CN112651841 A CN 112651841A
Authority
CN
China
Prior art keywords
client
information
service
risk index
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011508000.4A
Other languages
Chinese (zh)
Other versions
CN112651841B (en
Inventor
黄志辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN202011508000.4A priority Critical patent/CN112651841B/en
Priority claimed from CN202011508000.4A external-priority patent/CN112651841B/en
Publication of CN112651841A publication Critical patent/CN112651841A/en
Application granted granted Critical
Publication of CN112651841B publication Critical patent/CN112651841B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Abstract

The application provides an online service handling method, an online service handling device, a server and a computer readable storage medium, wherein the method comprises the following steps: determining the risk level of the service to be handled according to the service handling information; when the risk level is greater than a preset risk level, acquiring a core body video sent by the terminal equipment; extracting a face image and audio data in the core body video, and performing identity verification on a client according to the face image and the audio data; when the client passes the identity authentication, controlling the terminal equipment to output the authentication problem according to the service handling information, and acquiring answer information of the authentication problem sent by the terminal equipment; when the answer information is correct, acquiring signature information sent by the terminal equipment; and when the signature information passes the verification, handling the corresponding service according to the service handling information. The method improves the safety of handling the service online. The present application also relates to the field of blockchain, and the computer-readable storage medium may store data created from use of blockchain nodes.

Description

Online business handling method and device, server and computer readable storage medium
Technical Field
The present application relates to the field of business security technologies, and in particular, to an online business handling method, an online business handling device, a server, and a computer-readable storage medium.
Background
At present, the traditional insurance business handling mode is mainly that a client personally goes to an insurance branch office to handle related business, such as client data change, client security layer change and the like. With the rapid development of internet technology, more and more insurance companies develop online business handling systems, so that customers can access the online business handling systems through mobile phones or computers and the like to help handle insurance businesses, and the requirement that the customers can handle related insurance businesses at any time in 24 hours can be met. However, in some high risk scenes, a client needs to perform a video with a teller of an insurance company through a network remote place, and risk confirmation is performed manually by the teller of the insurance company, so as to reduce the occurrence of conditions such as fraud and the like, and thus self-service handling of services in the high risk scenes cannot be realized, and user experience is not good.
Disclosure of Invention
The embodiment of the application provides an online service handling method, an online service handling device, a server and a computer readable storage medium, and aims to realize online service handling in a high risk scene and improve the security of online service handling.
In a first aspect, an embodiment of the present application provides an online service handling method, which is applied to a server, and the method includes:
acquiring a service handling request sent by terminal equipment, and determining the risk level of a service to be handled according to service handling information in the service handling request;
when the risk level is greater than a preset risk level, controlling the terminal equipment to display a core body page, and acquiring a core body video which is sent by the terminal equipment and is recorded by a client through the core body page;
extracting the face image and the audio data in the core body video, and performing identity verification on the client according to the face image and the audio data;
when the client passes the identity authentication, controlling the terminal equipment to output an authentication question according to the service handling information, and acquiring answer information of the authentication question sent by the terminal equipment;
when the answer information is correct, controlling the terminal equipment to display a signature confirmation page, and acquiring the signature information which is sent by the terminal equipment and is input by the client on the signature confirmation page;
and when the signature information passes the verification, transacting the corresponding service according to the service transacting information.
In a second aspect, an embodiment of the present application further provides an online service handling device, where the online service handling device includes an obtaining module, a determining module, a control module, an authentication module, and a service handling module, where:
the acquisition module is used for acquiring a service handling request sent by the terminal equipment;
the determining module is used for determining the risk level of the service to be handled according to the service handling information in the service handling request;
the control module is used for controlling the terminal equipment to display a core page when the risk level is greater than a preset risk level;
the acquiring module is further configured to acquire a core body video, which is sent by the terminal device and recorded by the client through the core body page;
the identity authentication module is used for extracting the face image and the audio data in the core body video and authenticating the identity of the client according to the face image and the audio data;
the control module is also used for controlling the terminal equipment to output a verification problem according to the service handling information when the client passes the identity verification;
the obtaining module is further configured to obtain answer information of the verification question sent by the terminal device;
the control module is further configured to control the terminal device to display a signature confirmation page when the answer information is correct;
the acquisition module is further configured to acquire signature information, which is sent by the terminal device and input by the client on the signature confirmation page;
and the service handling module is used for handling the corresponding service according to the service handling information when the signature information passes the verification.
In a third aspect, an embodiment of the present application further provides a server, where the server includes a processor, a memory, and a computer program stored on the memory and executable by the processor, where the computer program, when executed by the processor, implements the steps of the online service transaction method described above.
In a fourth aspect, this application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the online service handling method as described above.
The embodiment of the application provides an online service handling method, an online service handling device, a server and a computer readable storage medium, when the risk level of a service to be handled is greater than a preset risk level, a core body video recorded by a client through a core body page and sent by a terminal device is acquired, face images and audio data in the core body video are extracted, the client is authenticated according to the face images and the audio data, then when the client passes the authentication, the terminal device is controlled to output authentication problems according to service handling information, answer information of the authentication problems sent by the terminal device is acquired, if the answer information is correct, signature information input by the client on a signature confirmation page and sent by the terminal device is acquired, and finally when the signature information passes the authentication, a corresponding service is handled according to the service handling information, so that online service handling under a high risk scene can be realized, the safety of online business handling is improved, and the user experience is greatly improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an online service handling method according to an embodiment of the present application;
FIG. 2 is a flow diagram illustrating sub-steps of the online transaction method of FIG. 1;
FIG. 3 is a flow diagram illustrating another sub-step of the online transaction method of FIG. 1;
FIG. 4 is a schematic block diagram of an online transaction apparatus provided in an embodiment of the present application;
FIG. 5 is a schematic block diagram of sub-modules of the online service transaction apparatus of FIG. 4;
fig. 6 is a block diagram schematically illustrating a structure of a server according to an embodiment of the present disclosure.
The implementation, functional features and advantages of the objectives of the present application will be further described with reference to the accompanying drawings.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
At present, the traditional insurance business handling mode is mainly that a client personally goes to an insurance branch office to handle related business, such as client data change, client security layer change and the like. With the rapid development of internet technology, more and more insurance companies develop online business handling systems, so that customers can access the online business handling systems through mobile phones or computers and the like to help handle insurance businesses, and the requirement that the customers can handle related insurance businesses at any time in 24 hours can be met. However, in some high risk scenes, a client needs to perform a video with a teller of an insurance company through a network remote place, and risk confirmation is performed manually by the teller of the insurance company, so as to reduce the occurrence of conditions such as fraud and the like, and thus self-service handling of services in the high risk scenes cannot be realized, and user experience is not good.
In order to solve the above problems, embodiments of the present application provide an online service handling method, an apparatus, a server, and a computer-readable storage medium, where when a risk level of a service to be handled is greater than a preset risk level, a core video recorded on a core page by a client sent by a terminal device is obtained, then a face image and audio data in the core video are extracted, and the client is authenticated according to the face image and the audio data, then when the client passes the authentication, the terminal device is controlled to output an authentication problem according to service handling information, answer information of the authentication problem sent by the terminal device is obtained, if the answer information is correct, signature information input on a signature confirmation page by the client sent by the terminal device is obtained, and finally when the signature information passes the authentication, a corresponding service is handled according to the service handling information, so that online service handling in a high-risk scenario can be implemented, the safety of online business handling is improved, and the user experience is greatly improved.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating an online service handling method according to an embodiment of the present application.
As shown in fig. 1, the online transaction processing method includes steps S101 to S106.
Step S101, acquiring a service handling request sent by a terminal device, and determining the risk level of a service to be handled according to service handling information in the service handling request.
The terminal equipment displays a business handling homepage, wherein the business handling homepage comprises a plurality of business handling options; acquiring a service handling option selected by a client in the service handling homepage, and displaying a corresponding service handling page according to the service handling option selected by the client, wherein the service handling page comprises a confirmation control; and responding to the triggering operation of the client on the confirmation control, acquiring the service handling information selected or input by the client on the service handling page, and sending a corresponding service handling request to the server according to the service handling information. The service handling information comprises at least one item of personal information of the client, service type identification and positioning information of the terminal equipment.
The service handling options include an insurance application option, a premium change option, a policy migration option, a client data change option and the like, and the service handling information of different service types is different, for example, the service handling information of which the service type is insurance application includes a service type identifier corresponding to the service type of insurance application, insurance applicant information, information of a insured person, payment method, beneficiary information, positioning information of the terminal device and the like, the insurance application information includes an identity number, a contact method, a contact address and the like of the insured person, and the insured person information includes an identity number, a contact method, a contact address and the like of the insured person.
For another example, the service transaction information whose service type is the premium change includes a service type identifier corresponding to the service type of the premium change, an identity number of the client, a policy number of the policy to be changed, the changed premium, an identity number of the client, and location information of the terminal device. For another example, the service handling information whose service type is policy migration includes a service type identifier corresponding to the service type of policy migration, an identity number of the client, a policy number of the policy to be migrated, a detailed address of the migration destination, migration time, and location information of the terminal device.
In an embodiment, as shown in fig. 2, the step of determining the risk level of the service to be handled according to the service handling information in the service handling request includes: substeps 1011 to substep S1015.
And a substep S1011, obtaining credit investigation data of the customer according to the personal information of the customer, and determining a first risk index of the customer according to the credit investigation data.
Illustratively, the server generates a credit investigation data query request carrying the personal information, and sends the credit investigation data query request to a credit investigation system, and the credit investigation system acquires credit investigation data of the client based on the personal information in the credit investigation data query request; and counting the total number of loans, the total loan amount and the residual loan amount under the client name according to the credit investigation data, and inputting the total number of loans, the total loan amount and the residual loan amount under the client name into a risk index evaluation model to obtain a first risk index of the client. The personal information of the client comprises an identity card number, a mobile phone number and the like, the risk index evaluation model is a pre-trained neural network model, and the training process is as follows: collecting a large amount of credit investigation data, extracting the total number of loans, the total loan amount and the residual loan amount under the name of a client from the credit investigation data, and marking corresponding risk indexes to obtain a large amount of sample data; and training the neural network model based on the sample data until the trained neural network model converges to obtain a risk index evaluation model.
And a substep S1012, obtaining a risk index corresponding to the service type identifier, and determining the risk index corresponding to the service type identifier as a second risk index of the client.
The server stores mapping relationships between different service types and risk indexes, and can determine a second risk index of the client according to the mapping relationships between different service types and risk indexes and the service type identifier of the client, and the mapping relationships between different service types and risk indexes can be set based on actual conditions, which is not specifically limited in the embodiment of the present application.
And a substep S1013 of determining a first city code of the client 'S standing city according to the personal information, and determining a second city code of the client' S current city according to the positioning information.
Illustratively, an address of a frequent residence place of the client is obtained from the personal information, and a city code corresponding to the address is determined as a first city code of the frequent residence city of the client; and matching the positioning information with the longitude and latitude range corresponding to each city code, and determining the city code corresponding to the longitude and latitude range matched with the positioning information as a second city code. The server stores mapping relations between different city codes and latitude and longitude ranges, the city code of the current city of the client can be quickly determined through the mapping relations, the mapping relations between the different city codes and the latitude and longitude ranges can be set based on actual conditions, and the method and the device are not specifically limited in this embodiment.
And a substep S1014, comparing the first city code with the second city code to obtain a comparison result, and determining a third risk index of the client according to the comparison result.
Illustratively, if the comparison result is that the first city code is the same as the second city code, the first preset risk index is determined as the third risk index of the client; and if the comparison result is that the first city code is different from the second city code, determining the second preset risk index as a third risk index of the client. The second preset risk index is greater than the first preset risk index, and the first preset risk index and the second risk index may be set based on an actual situation, which is not specifically limited in the embodiment of the present application, for example, the first risk index is 10 points, and the second risk index is 40 points.
And a substep S1015, determining the risk level of the business to be handled according to the first risk index, the second risk index and the third risk index.
Exemplarily, determining a product of the first risk index and a first preset weight value to obtain a first weight risk index; determining the product of the second risk index and a second preset weight value to obtain a second weight risk index; determining the product of the third risk index and a third preset weight value to obtain a third weight risk index; accumulating the first weight risk index, the second weight risk index and the third weight risk index to obtain a target risk index; and determining the risk index range in which the target risk index is positioned, and determining the risk grade corresponding to the risk index range as the risk grade of the business to be handled. The higher the risk index is, the higher the risk level is, the lower the risk index is, and the lower the risk level is, the server stores a mapping relationship between the risk index range and the risk level, and the risk level of the business to be handled can be determined through the relationship.
And S102, when the risk level is greater than a preset risk level, controlling the terminal equipment to display a core body page, and acquiring a core body video which is sent by the terminal equipment and is recorded by a client through the core body page.
Illustratively, when the risk level is greater than a preset risk level, acquiring a target core code of a client, and generating a core video recording request carrying the target core code; and sending a core body video recording request to the terminal equipment so that the terminal equipment can display a core body page comprising the target core body code based on the core body video recording request. The character type in the target core-body code comprises at least one of numbers, English letters and Chinese characters, and the number of characters in the target core-body code and the preset risk level can be set based on actual conditions, for example, the number of characters in the target core-body code is 10. The core page containing the target core code is displayed through the terminal equipment, so that a user can read the target core code in the process of recording the video, and the recorded core video carries the audio information containing the target core code.
In an embodiment, the manner of obtaining the target core identity code of the client may be: randomly acquiring a character from a preset character library, and arranging the characters in the preset number when the characters in the preset number are acquired to obtain the target core code of the client. The preset character library comprises characters such as numbers, English letters, Chinese characters and the like, a preset number of characters can be arranged according to character types, and the preset number of characters can also be arranged according to the acquisition sequence of the characters.
In an embodiment, the terminal device displays a core page including the target core code, wherein the core page includes the target core code and a video recording button, when a triggering operation of the video recording button by a user is detected, video recording is started, in the process of recording the video, when the triggering operation of the video recording button by the user is detected again, video recording is stopped to obtain the core video, the core video is sent to the server, and the server obtains the core video which is sent by the terminal device and is recorded by the client through the core page. The core body video comprises a face image of a client and audio information containing the target core body code.
In one embodiment, when the risk level is less than or equal to a preset risk level, controlling the terminal device to display a signature confirmation page and acquiring signature information sent by the terminal device and input by a client on the signature confirmation page; and when the signature information passes the verification, handling the corresponding service according to the service handling information.
And S103, extracting the face image and the audio data in the core body video, and performing identity verification on the client according to the face image and the audio data.
After the core body video of the client is obtained, the client is authenticated based on the core body video of the client, namely, the face image and the audio data in the core body video are extracted, and the client is authenticated according to the face image and the audio data. The identity of the client can be accurately verified through the face image and the audio data.
In one embodiment, as shown in fig. 3, the authenticating the client according to the facial image and the audio data may include: substeps 1031 to substep S1033.
And a substep S1031, extracting face features from the face image, and comparing the face features with preset face features of the client to obtain a face feature comparison result of the client.
The face feature comparison result of the client comprises that the face feature extracted from the face image is the same as the preset face feature of the client or the face feature extracted from the face image is different from the preset face feature of the client, the preset face feature of the client is the face feature uploaded to the server by the terminal equipment when the client is registered, and the preset face feature of the client can be obtained based on the identity information of the client.
And a substep S1032 of converting the voice information in the audio data into text information, and comparing the text information with the target core code to obtain a core code comparison result.
The core code comparison result comprises that the core code in the text message is the same as the target core code or the core code in the text message is different from the target core code.
For example, the method for comparing the text information with the target core code may be: converting the text information into a first feature vector, and converting the target core body code into a second feature vector; and determining the similarity between the first feature vector and the second feature vector, determining whether the similarity is greater than or equal to a preset similarity, if the similarity is greater than or equal to the preset similarity, determining that the core code in the text information is the same as the target core code, and if the similarity is less than the preset similarity, determining that the core code in the text information is different from the target core code. The preset similarity may be set based on an actual situation, and this is not specifically limited in the embodiment of the present application.
And a substep S1033 of determining whether the client passes the identity authentication or not according to the face feature comparison result and the verification code comparison result.
And if the face feature comparison result is that the face features are the same and the body code comparison result is that the body codes are the same, determining that the client passes the identity authentication, and if the face feature comparison result is that the face features are different and/or the body code comparison result is that the body codes are different, determining that the client does not pass the identity authentication.
In one embodiment, extracting face features from a face image, and comparing the face features with preset face features of a client to obtain a face feature comparison result of the client; converting voice information in the audio data into text information, and comparing the text information with the target core code to obtain a core code comparison result; extracting voiceprint features in the audio data, and comparing the voiceprint features with preset voiceprint features of the client to determine a voiceprint feature comparison result of the client; and determining whether the client passes the identity authentication or not according to the face feature comparison result, the core-body code comparison result and the voiceprint feature comparison result. The preset voiceprint feature of the client is a voiceprint feature uploaded to the server by the terminal device when the client registers, and the preset voiceprint feature of the client can be obtained based on the identity information of the client. And whether the client passes the identity authentication can be accurately determined through the face characteristic comparison result, the core-body code comparison result and the voiceprint characteristic comparison result.
And step S104, when the client passes the identity authentication, controlling the terminal equipment to output an authentication question according to the service handling information, and acquiring answer information of the authentication question sent by the terminal equipment.
The method comprises the steps that a verification question is output at a terminal device, the terminal device obtains answer information of the verification question input by a user and sends the answer information to a server, and the server obtains the answer information of the verification question sent by the terminal device. The service handling information comprises at least one item of personal information of the client, service type identification and positioning information of the terminal equipment.
Illustratively, a plurality of verification questions corresponding to the service type identification are obtained from a preset verification question library; the control terminal device outputs an authentication question related to the personal information among the plurality of authentication questions. The verification questions in the preset verification question bank may be set based on actual situations, which is not specifically limited in the present application. For example, the authentication question associated with the identification number is "how many do you ask for the identification number? "what is the number of mobile phone asking for you? ".
And step S105, when the answer information is correct, controlling the terminal equipment to display a signature confirmation page, and acquiring the signature information which is sent by the terminal equipment and is input by the client on the signature confirmation page.
When the answer information of the verification question sent by the terminal equipment is acquired, whether the answer information is correct is determined, if the answer information is correct, a signature confirmation request is sent to the terminal equipment, the terminal equipment displays a signature confirmation page based on the signature confirmation request, and the signature information which is sent by the terminal equipment and is input by a client on the signature confirmation page is acquired. When the answer information is correct, if the verification question output by the terminal device is not the last one, controlling the terminal device to output the next verification question, if the verification question output by the terminal device is the last one, sending a signature confirmation request to the terminal device, and displaying a signature confirmation page by the terminal device based on the signature confirmation request.
In an embodiment, if the answer information is incorrect, according to the service handling information, a different verification question is obtained from the preset verification question library again, and the verification question is sent to the terminal device, and when the terminal device receives the verification question, the verification question is output, that is, the verification question is displayed and/or broadcast.
And step S106, when the signature information passes the verification, transacting the corresponding service according to the service transacting information.
After the terminal device displays the signature confirmation page, the terminal device acquires the signature information input on the signature confirmation page by the user and sends the signature information to the server, the server acquires the signature information input on the signature confirmation page by the client and sent by the terminal device, verifies the signature information, and then transacts the corresponding service according to the service transaction information when the signature information passes the verification. For example, when the signature information passes verification, a client data change service, a warranty change service, a policy migration service, or the like is handled.
In an embodiment, the signature information includes a signature track, and the way of verifying the signature information may be: acquiring a preset signature track of the client, and determining the similarity between the signature track and the preset signature track; and determining whether the similarity between the signature track and a preset signature track is greater than or equal to a preset similarity, if the similarity between the signature track and the preset signature track is greater than or equal to the preset similarity, determining that the signature of the client passes verification, and if the similarity between the signature track and the preset signature track is less than the preset similarity, determining that the signature of the client does not pass verification. The preset signature track of the client is a signature track uploaded to the server by the terminal device when the client registers, and the preset similarity may be set based on an actual situation, which is not specifically limited in the embodiment of the present application, for example, the third preset similarity is 80%.
The online service handling method provided by the above embodiment obtains the core video recorded by the client through the core page sent by the terminal device when the risk level of the service to be handled is greater than the preset risk level, then extracts the face image and the audio data in the core video, and performs the identity verification on the client according to the face image and the audio data, then controls the terminal device to output the verification problem according to the service handling information when the client passes the identity verification, and obtains the answer information of the verification problem sent by the terminal device, if the answer information is correct, obtains the signature information input by the client on the signature confirmation page sent by the terminal device, and finally handles the corresponding service according to the service handling information when the signature information passes the verification, thereby realizing the online service handling in the high risk scene and improving the security of the online service handling, user experience is greatly improved.
Referring to fig. 4, fig. 4 is a schematic block diagram of an online service handling apparatus according to an embodiment of the present application.
As shown in fig. 4, the online transaction apparatus 200 includes: an obtaining module 210, a determining module 220, a control module 230, an identity verification module 240 and a business handling module 250, wherein:
the acquiring module 210 is configured to acquire a service transaction request sent by a terminal device;
the determining module 220 is configured to determine a risk level of a service to be handled according to the service handling information in the service handling request;
the control module 230 is configured to control the terminal device to display a core page when the risk level is greater than a preset risk level;
the obtaining module 210 is further configured to obtain a core body video, which is sent by the terminal device and recorded by the client through the core body page;
the identity authentication module 240 is configured to extract a face image and audio data in the core body video, and perform identity authentication on the client according to the face image and the audio data;
the control module 230 is further configured to control the terminal device to output a verification problem according to the service handling information when the client passes the authentication;
the obtaining module 210 is further configured to obtain answer information of the verification question sent by the terminal device;
the control module 230 is further configured to control the terminal device to display a signature confirmation page when the answer information is correct;
the obtaining module 210 is further configured to obtain signature information, which is sent by the terminal device and input by the client on the signature confirmation page;
the service handling module 250 is configured to handle the corresponding service according to the service handling information when the signature information passes the verification.
In one embodiment, as shown in fig. 5, the determining module 220 includes:
the first determining submodule 221 is configured to obtain credit investigation data of the customer according to the personal information of the customer, and determine a first risk index of the customer according to the credit investigation data;
a second determining submodule 222, configured to obtain a risk index corresponding to the service type identifier, and determine the risk index corresponding to the service type identifier as a second risk index of the client;
the third determining submodule 223 determines a first city code of the standing city of the client according to the personal information, and determines a second city code of the current city of the client according to the positioning information;
the third determining submodule 223 is further configured to compare the first city code with the second city code to obtain a comparison result, and determine a third risk index of the client according to the comparison result;
and the fourth determining submodule 224 is configured to determine the risk level of the service to be handled according to the first risk index, the second risk index and the third risk index.
In an embodiment, the fourth determination submodule 224 is further configured to:
determining the product of the first risk index and a first preset weight value to obtain a first weight risk index;
determining the product of the second risk index and a second preset weight value to obtain a second weight risk index;
determining a product of the third risk index and a third preset weight value to obtain a third weight risk index;
accumulating the first weight risk index, the second weight risk index and the third weight risk index to obtain a target risk index;
and determining the risk index range of the target risk index, and determining the risk grade corresponding to the risk index range as the risk grade of the business to be handled.
In one embodiment, the control module 230 is further configured to:
acquiring a plurality of verification problems corresponding to the service type identification in the service handling information from a preset verification problem library;
and controlling the terminal equipment to output the verification question related to the personal information in the business handling information in the plurality of verification questions.
In one embodiment, the control module 230 is further configured to:
acquiring a target core code of the client and generating a core video recording request carrying the target core code;
and sending the core body video recording request to the terminal equipment so that the terminal equipment can display a core body page comprising the target core body code based on the core body video recording request.
In an embodiment, the identity verification module 240 is further configured to:
extracting face features from the face image, and comparing the face features with preset face features of the client to obtain a face feature comparison result of the client;
converting voice information in the audio data into text information, and comparing the text information with a target core code to obtain a core code comparison result;
and determining whether the client passes the identity authentication or not according to the face feature comparison result and the core body code comparison result.
In an embodiment, the identity verification module 240 is further configured to:
extracting face features from the face image, and comparing the face features with preset face features of the client to obtain a face feature comparison result of the client;
converting voice information in the audio data into text information, and comparing the text information with the target core code to obtain a core code comparison result;
extracting voiceprint features in the audio data, and comparing the voiceprint features with preset voiceprint features of the client to determine a voiceprint feature comparison result of the client;
and determining whether the client passes the identity authentication or not according to the face feature comparison result and the core body code comparison result.
It should be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the apparatus and each module and unit described above may refer to the corresponding processes in the foregoing embodiments of the online service handling method, and are not described herein again.
The apparatus provided by the above embodiment may be implemented in a form of a computer program, and the computer program may be run on a server as shown in fig. 6.
Referring to fig. 6, fig. 6 is a schematic block diagram of a server according to an embodiment of the present disclosure.
As shown in fig. 6, the server includes a processor, a memory, and a network interface connected by a system bus, wherein the memory may include a storage medium and an internal memory.
The storage medium may store an operating system and a computer program. The computer program comprises program instructions that, when executed, cause a processor to perform any of the online transaction methods.
The processor is used for providing calculation and control capacity and supporting the operation of the whole server.
The internal memory provides an environment for the execution of a computer program on a storage medium, which when executed by a processor causes the processor to perform any of the methods of online transaction.
The network interface is used for network communication, such as sending assigned tasks and the like. Those skilled in the art will appreciate that the architecture shown in fig. 6 is a block diagram of only a portion of the architecture associated with the subject application, and does not constitute a limitation on the servers to which the subject application applies, as a particular server may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is a block diagram of only a portion of the architecture associated with the subject application, and does not constitute a limitation on the servers to which the subject application applies, as a particular server may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Wherein, in an embodiment, the processor is configured to run a computer program stored in the memory to implement the steps of:
acquiring a service handling request sent by terminal equipment, and determining the risk level of a service to be handled according to service handling information in the service handling request;
when the risk level is greater than a preset risk level, controlling the terminal equipment to display a core body page, and acquiring a core body video which is sent by the terminal equipment and is recorded by a client through the core body page;
extracting the face image and the audio data in the core body video, and performing identity verification on the client according to the face image and the audio data;
when the client passes the identity authentication, controlling the terminal equipment to output an authentication question according to the service handling information, and acquiring answer information of the authentication question sent by the terminal equipment;
when the answer information is correct, controlling the terminal equipment to display a signature confirmation page, and acquiring the signature information which is sent by the terminal equipment and is input by the client on the signature confirmation page;
and when the signature information passes the verification, transacting the corresponding service according to the service transacting information.
In an embodiment, the service handling information includes at least one of personal information of the client, a service type identifier, and location information of the terminal device, and the processor is configured to, when determining a risk level of a service to be handled according to the service handling information in the service handling request, implement:
acquiring credit investigation data of the client according to personal information of the client, and determining a first risk index of the client according to the credit investigation data;
acquiring a risk index corresponding to the service type identifier, and determining the risk index corresponding to the service type identifier as a second risk index of the client;
determining a first city code of a standing city of the client according to the personal information, and determining a second city code of a current city of the client according to the positioning information;
comparing the first city code with the second city code to obtain a comparison result, and determining a third risk index of the client according to the comparison result;
and determining the risk level of the business to be handled according to the first risk index, the second risk index and the third risk index.
In an embodiment, the processor, when implementing determining the risk level of the service to be handled according to the first risk index, the second risk index and the third risk index, is configured to implement:
determining the product of the first risk index and a first preset weight value to obtain a first weight risk index;
determining the product of the second risk index and a second preset weight value to obtain a second weight risk index;
determining a product of the third risk index and a third preset weight value to obtain a third weight risk index;
accumulating the first weight risk index, the second weight risk index and the third weight risk index to obtain a target risk index;
and determining the risk index range of the target risk index, and determining the risk grade corresponding to the risk index range as the risk grade of the business to be handled.
In an embodiment, when the processor is used for controlling the terminal device to output the verification problem according to the service handling information, the processor is configured to:
acquiring a plurality of verification problems corresponding to the service type identification in the service handling information from a preset verification problem library;
and controlling the terminal equipment to output the verification question related to the personal information in the business handling information in the plurality of verification questions.
In an embodiment, when the processor is configured to control the terminal device to display the core page, the processor is configured to:
acquiring a target core code of the client and generating a core video recording request carrying the target core code;
and sending the core body video recording request to the terminal equipment so that the terminal equipment can display a core body page comprising the target core body code based on the core body video recording request.
In one embodiment, the processor, when performing authentication of the client based on the facial image and audio data, is configured to perform:
extracting face features from the face image, and comparing the face features with preset face features of the client to obtain a face feature comparison result of the client;
converting voice information in the audio data into text information, and comparing the text information with a target core code to obtain a core code comparison result;
and determining whether the client passes the identity authentication or not according to the face feature comparison result and the core body code comparison result.
In one embodiment, the processor, when performing authentication of the client based on the facial image and audio data, is configured to perform:
extracting face features from the face image, and comparing the face features with preset face features of the client to obtain a face feature comparison result of the client;
converting voice information in the audio data into text information, and comparing the text information with a target core code to obtain a core code comparison result;
extracting voiceprint features in the audio data, and comparing the voiceprint features with preset voiceprint features of the client to determine a voiceprint feature comparison result of the client;
and determining whether the client passes the identity authentication or not according to the face feature comparison result, the core-body code comparison result and the voiceprint feature comparison result.
It should be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the server described above may refer to the corresponding process in the foregoing online service handling method embodiment, and details are not described herein again.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of software products, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and include instructions for causing a server (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present application.
Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, where the computer program includes program instructions, and a method implemented when the program instructions are executed may refer to various embodiments of the online service handling method of the present application.
The computer readable storage medium may be volatile or nonvolatile. The computer readable storage medium may be an internal storage unit of the server described in the foregoing embodiment, for example, a hard disk or a memory of the server. The computer readable storage medium may also be an external storage device of the server, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the server.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the blockchain node, and the like.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments. While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An online service handling method is applied to a server, and the method comprises the following steps:
acquiring a service handling request sent by terminal equipment, and determining the risk level of a service to be handled according to service handling information in the service handling request;
when the risk level is greater than a preset risk level, controlling the terminal equipment to display a core body page, and acquiring a core body video which is sent by the terminal equipment and is recorded by a client through the core body page;
extracting the face image and the audio data in the core body video, and performing identity verification on the client according to the face image and the audio data;
when the client passes the identity authentication, controlling the terminal equipment to output an authentication question according to the service handling information, and acquiring answer information of the authentication question sent by the terminal equipment;
when the answer information is correct, controlling the terminal equipment to display a signature confirmation page, and acquiring the signature information which is sent by the terminal equipment and is input by the client on the signature confirmation page;
and when the signature information passes the verification, transacting the corresponding service according to the service transacting information.
2. The online business handling method according to claim 1, wherein the business handling information includes at least one of personal information of the client, a business type identifier, and location information of the terminal device, and determining the risk level of the business to be handled according to the business handling information in the business handling request includes:
acquiring credit investigation data of the client according to personal information of the client, and determining a first risk index of the client according to the credit investigation data;
acquiring a risk index corresponding to the service type identifier, and determining the risk index corresponding to the service type identifier as a second risk index of the client;
determining a first city code of a standing city of the client according to the personal information, and determining a second city code of a current city of the client according to the positioning information;
comparing the first city code with the second city code to obtain a comparison result, and determining a third risk index of the client according to the comparison result;
and determining the risk level of the business to be handled according to the first risk index, the second risk index and the third risk index.
3. The online business handling method according to claim 2, wherein the determining the risk level of the business to be handled according to the first risk index, the second risk index and the third risk index comprises:
determining the product of the first risk index and a first preset weight value to obtain a first weight risk index;
determining the product of the second risk index and a second preset weight value to obtain a second weight risk index;
determining a product of the third risk index and a third preset weight value to obtain a third weight risk index;
accumulating the first weight risk index, the second weight risk index and the third weight risk index to obtain a target risk index;
and determining the risk index range of the target risk index, and determining the risk grade corresponding to the risk index range as the risk grade of the business to be handled.
4. The online business handling method according to claim 1, wherein the controlling the terminal device to output the verification problem according to the business handling information comprises:
acquiring a plurality of verification problems corresponding to the service type identification in the service handling information from a preset verification problem library;
and controlling the terminal equipment to output the verification question related to the personal information in the business handling information in the plurality of verification questions.
5. The online service transaction method according to any one of claims 1 to 4, wherein the controlling the terminal device to display a core page includes:
acquiring a target core code of the client and generating a core video recording request carrying the target core code;
and sending the core body video recording request to the terminal equipment so that the terminal equipment can display a core body page comprising the target core body code based on the core body video recording request.
6. The online business handling method according to claim 1, wherein the authenticating the client according to the facial image and the audio data comprises:
extracting face features from the face image, and comparing the face features with preset face features of the client to obtain a face feature comparison result of the client;
converting voice information in the audio data into text information, and comparing the text information with a target core code to obtain a core code comparison result;
and determining whether the client passes the identity authentication or not according to the face feature comparison result and the core body code comparison result.
7. The online service transaction method according to claim 6, wherein after comparing the text message with the target core code to obtain a core code comparison result, the method further comprises:
extracting voiceprint features in the audio data, and comparing the voiceprint features with preset voiceprint features of the client to determine a voiceprint feature comparison result of the client;
the determining whether the client passes the identity verification according to the face feature comparison result and the verification code comparison result comprises the following steps:
and determining whether the client passes the identity authentication or not according to the face feature comparison result, the core-body code comparison result and the voiceprint feature comparison result.
8. The utility model provides an online business is handled device, its characterized in that, online business is handled device is including obtaining module, confirming module, control module, authentication module and business and is handled the module, wherein:
the acquisition module is used for acquiring a service handling request sent by the terminal equipment;
the determining module is used for determining the risk level of the service to be handled according to the service handling information in the service handling request;
the control module is used for controlling the terminal equipment to display a core page when the risk level is greater than a preset risk level;
the acquiring module is further configured to acquire a core body video, which is sent by the terminal device and recorded by the client through the core body page;
the identity authentication module is used for extracting the face image and the audio data in the core body video and authenticating the identity of the client according to the face image and the audio data;
the control module is also used for controlling the terminal equipment to output a verification problem according to the service handling information when the client passes the identity verification;
the obtaining module is further configured to obtain answer information of the verification question sent by the terminal device;
the control module is further configured to control the terminal device to display a signature confirmation page when the answer information is correct;
the acquisition module is further configured to acquire signature information, which is sent by the terminal device and input by the client on the signature confirmation page;
and the service handling module is used for handling the corresponding service according to the service handling information when the signature information passes the verification.
9. A server, characterized in that the server comprises a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program, when executed by the processor, carries out the steps of the online transaction method according to any of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a computer program, wherein the computer program, when being executed by a processor, carries out the steps of the online transaction method according to any of claims 1 to 7.
CN202011508000.4A 2020-12-18 Online business handling method, online business handling device, server and computer readable storage medium Active CN112651841B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011508000.4A CN112651841B (en) 2020-12-18 Online business handling method, online business handling device, server and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011508000.4A CN112651841B (en) 2020-12-18 Online business handling method, online business handling device, server and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112651841A true CN112651841A (en) 2021-04-13
CN112651841B CN112651841B (en) 2024-04-19

Family

ID=

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112950366A (en) * 2021-04-30 2021-06-11 中国银行股份有限公司 Bank business handling method and device, electronic equipment and computer storage medium
CN113487294A (en) * 2021-07-23 2021-10-08 重庆富民银行股份有限公司 On-line service non-inductive verification method based on list mechanism
CN113836502A (en) * 2021-08-02 2021-12-24 上海盛付通电子支付服务有限公司 Method, apparatus, medium, and program product for re-identifying user information
CN114125851A (en) * 2021-09-08 2022-03-01 深圳传音控股股份有限公司 Information processing method, mobile terminal and readable storage medium
CN114245204A (en) * 2021-12-15 2022-03-25 平安银行股份有限公司 Video surface signing method and device based on artificial intelligence, electronic equipment and medium
CN115086434A (en) * 2022-06-14 2022-09-20 中国银行股份有限公司 Bank business handling method and device based on block chain
CN115708116A (en) * 2021-08-10 2023-02-21 瑞庭网络技术(上海)有限公司 Video verification method, device and system, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811952A (en) * 2014-01-26 2015-07-29 中国移动通信集团江苏有限公司 Service processing verification method and system
CN104835266A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Business handling method and system of VTM
CN107784428A (en) * 2017-08-18 2018-03-09 平安科技(深圳)有限公司 Witness method, apparatus, computer equipment and storage medium based on mobile terminal
CN109214821A (en) * 2018-08-15 2019-01-15 中国平安人寿保险股份有限公司 identity remote authentication method and terminal device
CN109325657A (en) * 2018-08-17 2019-02-12 平安普惠企业管理有限公司 A kind of measures and procedures for the examination and approval of credit operation, storage medium and server
CN109544095A (en) * 2018-10-17 2019-03-29 国家电网有限公司 A kind of electric power fused business of identity-based identification handles method and system
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN111899038A (en) * 2020-08-11 2020-11-06 中国工商银行股份有限公司 5G network-based non-contact loan auxiliary auditing method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811952A (en) * 2014-01-26 2015-07-29 中国移动通信集团江苏有限公司 Service processing verification method and system
CN104835266A (en) * 2015-04-22 2015-08-12 中国建设银行股份有限公司 Business handling method and system of VTM
CN107784428A (en) * 2017-08-18 2018-03-09 平安科技(深圳)有限公司 Witness method, apparatus, computer equipment and storage medium based on mobile terminal
CN109214821A (en) * 2018-08-15 2019-01-15 中国平安人寿保险股份有限公司 identity remote authentication method and terminal device
CN109325657A (en) * 2018-08-17 2019-02-12 平安普惠企业管理有限公司 A kind of measures and procedures for the examination and approval of credit operation, storage medium and server
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data
CN109544095A (en) * 2018-10-17 2019-03-29 国家电网有限公司 A kind of electric power fused business of identity-based identification handles method and system
CN111899038A (en) * 2020-08-11 2020-11-06 中国工商银行股份有限公司 5G network-based non-contact loan auxiliary auditing method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112950366A (en) * 2021-04-30 2021-06-11 中国银行股份有限公司 Bank business handling method and device, electronic equipment and computer storage medium
CN112950366B (en) * 2021-04-30 2024-02-02 中国银行股份有限公司 Banking business handling method and device, electronic equipment and computer storage medium
CN113487294A (en) * 2021-07-23 2021-10-08 重庆富民银行股份有限公司 On-line service non-inductive verification method based on list mechanism
CN113487294B (en) * 2021-07-23 2023-06-09 重庆富民银行股份有限公司 On-line business noninductive verification method based on list mechanism
CN113836502A (en) * 2021-08-02 2021-12-24 上海盛付通电子支付服务有限公司 Method, apparatus, medium, and program product for re-identifying user information
CN115708116A (en) * 2021-08-10 2023-02-21 瑞庭网络技术(上海)有限公司 Video verification method, device and system, electronic equipment and storage medium
CN114125851A (en) * 2021-09-08 2022-03-01 深圳传音控股股份有限公司 Information processing method, mobile terminal and readable storage medium
CN114245204A (en) * 2021-12-15 2022-03-25 平安银行股份有限公司 Video surface signing method and device based on artificial intelligence, electronic equipment and medium
CN115086434A (en) * 2022-06-14 2022-09-20 中国银行股份有限公司 Bank business handling method and device based on block chain
CN115086434B (en) * 2022-06-14 2024-04-16 中国银行股份有限公司 Bank business handling method and device based on blockchain

Similar Documents

Publication Publication Date Title
US10650379B2 (en) Method and system for validating personalized account identifiers using biometric authentication and self-learning algorithms
CN110322317B (en) Transaction data processing method and device, electronic equipment and medium
US20180052981A1 (en) Systems and methods for improving kba identity authentication questions
US11188913B2 (en) Systems and methods for securely verifying a subset of personally identifiable information
RU2638775C2 (en) System of access control and management based on biometric technologies for authenticating person by voice and by face
JP5479583B2 (en) How to get data from users at the time of card payment made using payment terminal
CN112204599A (en) System and method for dynamic identity decision
CN108763898A (en) A kind of information processing method and system
CA3025402A1 (en) Systems and methods relating to digital identities
US20040098339A1 (en) Method and apparatus for identifying an entity with which transactions are prohibited
JP6875521B2 (en) Methods and equipment for security verification based on biometric features
US20110191156A1 (en) Pre-approved customer acceptance validation
KR101763275B1 (en) The method for customer certification using credit bereau information, the system thereof, and computer-readable recording medium for recording program executing the same method
US11538116B2 (en) Life event bank ledger
Gatali et al. A qualitative study on adoption of biometrics technologies: Canadian banking industry
CN117275138A (en) Identity authentication method, device, equipment and storage medium based on automatic teller machine
US11836816B1 (en) Systems and methods for verification of property records
US20180060379A1 (en) Automated correlation and deduplication of identities
CN110705733A (en) Number obtaining method and device, electronic equipment and computer readable storage medium
CN112651841B (en) Online business handling method, online business handling device, server and computer readable storage medium
CN112651841A (en) Online business handling method and device, server and computer readable storage medium
CN115099937A (en) Asset configuration information sharing method and system and computer equipment
US11756147B1 (en) Systems and methods for verifying the authenticity of documents
KR20220153145A (en) Device for signing insurance contract and method thereof
CN111882425A (en) Service data processing method and device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant