CN113487300A - Safety verification method and device for expense data earmark process and electronic equipment - Google Patents

Safety verification method and device for expense data earmark process and electronic equipment Download PDF

Info

Publication number
CN113487300A
CN113487300A CN202110471152.XA CN202110471152A CN113487300A CN 113487300 A CN113487300 A CN 113487300A CN 202110471152 A CN202110471152 A CN 202110471152A CN 113487300 A CN113487300 A CN 113487300A
Authority
CN
China
Prior art keywords
load
earmark
record
value
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110471152.XA
Other languages
Chinese (zh)
Inventor
阮文忠
李斌
吴锡可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hengsheng Yunqing Network Technology Co ltd
Original Assignee
Hangzhou Hengsheng Yunqing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hengsheng Yunqing Network Technology Co ltd filed Critical Hangzhou Hengsheng Yunqing Network Technology Co ltd
Priority to CN202110471152.XA priority Critical patent/CN113487300A/en
Publication of CN113487300A publication Critical patent/CN113487300A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/06Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a safety verification method and device for an expense data earmark process and electronic equipment, and the safety verification method and device comprises the steps of extracting earmark characteristic values in an earmark terminal; sending a load application request to a load server based on the obtained load characteristic value and a load count value; if a successful load application return value fed back by the server is received, completing the load operation according to the successful load application return value; in the loading process, the security of the whole loading process is verified by combining a chip counter in the non-stop toll card and a transaction record file mechanism, so that the loading process can be carried out only once after one-time recharging. Meanwhile, under the condition of failure in the loading process, the previous abnormal record can be automatically processed in the next operation.

Description

Safety verification method and device for expense data earmark process and electronic equipment
Technical Field
The application relates to the field of data information security, in particular to a security verification method for an expense data earmark process.
Background
The toll collection pass card is a CPU card with double interfaces and can be used as a pass card and a payment card. The toll card for charging without parking is divided into an account keeping card and a value storing card, the account keeping card is bound with a bank account during handling, and the toll is directly deducted from the bank account. The stored value card needs to load the fund into the pass card in advance, and the fund is automatically deducted from the fund stored in the card during passing.
In the prior art, when a mobile terminal such as a mobile phone APP (application) is used for loading the electronic toll collection access card, the electronic toll collection access card is easily grabbed by people, and then loading instructions are simulated to repeatedly load the electronic toll collection access card. When the situation occurs, the situation can be found only through later account checking, and the instant processing cannot be realized.
Disclosure of Invention
In order to solve the defects and shortcomings in the prior art, the invention provides a safety verification method for the loading process of the expense data, and whether the loading process is safe is judged according to whether the loading characteristic value requested to a loading server is normal.
Specifically, the security verification method for the earmark process of the fee data provided by the embodiment of the present application includes:
extracting a load characteristic value in a load terminal;
sending a load application to a load server based on the obtained load characteristic value and a load count value;
if a successful load application return value fed back by the server is received, completing the load operation according to the successful load application return value;
and if the successful load application return value fed back by the server is not received, the load exception is proposed.
Optionally, the extracting a load feature value in the load terminal includes:
acquiring a transaction record file in a load terminal;
extracting the online transaction serial number and the load amount which are closest to the current time from the transaction record file;
if the acquired online transaction serial number and the load amount are consistent with the value stored by the load server, judging that the load characteristic value meeting the requirement is extracted;
and if the acquired online transaction serial number and the earmark amount are inconsistent with the value stored by the earmark server, judging that the earmark characteristic value is an abnormal value.
Optionally, after determining that the load feature value is an abnormal value, the method further includes:
inquiring the load record of the current card in the load record file;
if the load record cannot be found, feeding back load exception;
and if the load record is inquired, adjusting the load record of the load server, and performing load confirmation processing based on the adjusted load record.
Optionally, if the load record is queried, adjusting the load record of the load server, and performing load confirmation processing based on the adjusted load record, where the load confirmation processing includes:
calculating the difference value between the earmark count value and the earmark count value in the earmark record;
if the difference is larger than or equal to the load record threshold set in the load terminal, terminating the current load operation;
and if the difference value is smaller than the loading record threshold value set in the loading terminal, adding one to the loading count value in the obtained loading record, simultaneously storing the obtained loading record to the loading server, and finishing the loading operation in the loading terminal.
Optionally, the sending a load application to the load server based on the obtained load characteristic value in combination with the load count value includes:
sending the obtained online transaction serial number, the load terminal number, the load amount and a load count value representing the current load amount as keywords to a load server;
and the load server feeds back a corresponding load application success return value according to the received keyword.
Optionally, if the load application success return value fed back by the server is received, the load operation is completed according to the load application success return value, including:
and if the current load record is judged to be the latest and completed load operation, judging that the load operation is completed.
Optionally, if the load application success return value fed back by the server is received, the load operation is completed according to the load application success return value, including:
and if the current load record is not the completed load operation, judging whether the current load record is the latest load record.
Optionally, the method further includes:
and if the current load record is judged to be the latest load record, calling a load confirmation interface of the service system to finish the load operation.
Optionally, if the load application success return value fed back by the server is received, the load operation is completed according to the load application success return value, including:
and if the current load record is judged to belong to the loaded operation but not the latest load record, completing the load confirmation again at the load terminal, and completing the load operation according to the confirmation result.
According to a second aspect of the embodiments of the present disclosure, an embodiment of the present disclosure further provides a security verification apparatus for an expense data earmark process, where the apparatus includes:
the characteristic value extraction unit is used for extracting the load characteristic value in the load terminal;
the application sending unit is used for sending the earmark application to the earmark server based on the obtained earmark characteristic value and the earmark counting value;
the first load operation unit is used for completing the load operation according to the load application return success value if the load application success return value fed back by the server is received;
and the second earmark operation unit is used for proposing earmark exception if the successful return value of the earmark application fed back by the server is not received.
Optionally, the feature value extracting unit includes:
the file acquisition subunit is used for acquiring the transaction record file in the load terminal;
the information extraction subunit is used for extracting the online transaction serial number and the load amount which are closest to the current time from the transaction record file;
the first result judging subunit is used for judging that the load characteristic value meeting the requirement is extracted if the acquired online transaction serial number and the load amount are consistent with the value stored by the load server;
and the second result judging subunit is used for judging that the load characteristic value is an abnormal value if the acquired online transaction serial number and the load amount are inconsistent with the value stored by the load server.
Optionally, after determining that the load feature value is an abnormal value, the feature value extracting unit includes:
the record inquiry subunit is used for inquiring the load record of the current card in the load record file;
the first processing subunit is used for feeding back the load exception if the load record cannot be found;
and the second processing subunit is used for adjusting the load record of the load server if the load record is inquired, and performing load confirmation processing based on the adjusted load record.
Optionally, the second processing subunit includes:
the difference value calculation primary subunit is used for calculating the difference value between the earmark count value and the earmark count value in the earmark record;
the load processing primary subunit is used for terminating the current load operation if the difference value is greater than or equal to a load record threshold value set in the load terminal;
and the earmark processing primary subunit is also used for adding an operation to the earmark count value in the obtained earmark record if the difference value is smaller than the earmark record threshold value set in the earmark terminal, simultaneously storing the obtained earmark record to the earmark server, and finishing the earmark operation in the earmark terminal.
Optionally, the application sending unit includes:
the sending subunit is used for sending the obtained online transaction serial number, the load terminal number, the load amount and the load count value representing the current load amount as keywords to the load server;
and the result returning subunit is used for feeding back a corresponding load application success return value by the load server according to the received keyword.
Optionally, the first spooling operation unit is further configured to:
and if the current load record is judged to be the latest and completed load operation, judging that the load operation is completed.
Optionally, the first spooling operation unit is further configured to:
and if the current load record is not the completed load operation, judging whether the current load record is the latest load record.
Optionally, the first spooling operation unit is further configured to:
and if the current load record is judged to be the latest load record, calling a load confirmation interface of the service system to finish the load operation.
Optionally, the first spooling operation unit is further configured to:
and if the current load record is judged to belong to the loaded operation but not the latest load record, completing the load confirmation again at the load terminal, and completing the load operation according to the confirmation result.
According to a third aspect of an embodiment of the present disclosure, the embodiment provides an electronic device, including:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to load the fee data into the load via performing steps of a security check method for the fee data load process.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program for executing by a processor the steps of a security verification method for an expense data earmark process.
According to the scheme, the safety verification method and device for the fee data earmark process and the electronic equipment are provided, and the safety verification method for the fee data earmark process comprises the steps of extracting earmark characteristic values in an earmark terminal; sending a load application to a load server based on the obtained load characteristic value and a load count value; if a successful load application return value fed back by the server is received, completing the load operation according to the successful load application return value; and if the successful load application return value fed back by the server is not received, the load exception is proposed. In the loading process, the security of the whole loading process is verified by combining a chip counter in the non-stop toll card and a transaction record file mechanism.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a security verification method for an expense data earmark process according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a security verification apparatus for an expense data earmark process according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
To make the structure and advantages of the present invention clearer, the structure of the present invention will be further described with reference to the accompanying drawings.
Example one
The main implementation ideas of the processing method of the application are as follows:
in the loading process, the whole loading process is checked safely by combining a core sheet counter mechanism in the non-stop toll collection pass card, and the loading process is ensured to be only loaded once by one-time recharging. And the method can automatically process the previous abnormal records in the next operation under the condition that the loading process of the mobile phone APP of the user fails.
Specifically, the security verification method for the expense data earmark process, which is provided by the embodiment of the present application, as shown in fig. 1, includes:
s1, extracting the load characteristic value in the load terminal;
s2, sending a load application to a load server based on the obtained load characteristic value and the load count value;
s3, if the successful load application return value fed back by the server is received, the load operation is completed according to the successful load application return value;
and S4, if the successful return value of the load application fed back by the server is not received, the load exception is proposed.
In implementation, in order to solve a possible repeated load behavior, the load characteristic value is provided in the embodiment of the present application based on a general data type in a general terminal transaction record file, and an existing file does not need to be modified.
The whole loading process including the above contents is as follows:
and after the load is started, executing a load initialization command.
If the command is successfully executed, the initialization is judged to be successful, and the CPU card is controlled to return initialization result information. If the command fails to execute, the load is judged to fail.
And analyzing the loading initialization information, assembling the information and calling an encryption machine interface of the remote loading server.
If the load server encryption machine returns the MAC2, further executing the load instruction; and if the encryption machine does not return the message, judging that the load fails.
After the load instruction is executed, the CPU card returns the load result information.
And after executing the balance acquisition instruction, acquiring the balance after the load, and judging whether the current balance is equal to the sum of the sum before the load and the sum of the load.
If the two numbers are equal, the load is judged to be successful, otherwise, the load is judged to be failed.
In the above flow, the following steps are performed:
specifically, the step of acquiring the load feature value, i.e. S1, includes:
s11, acquiring a transaction record file in the load terminal;
s12, extracting the online transaction serial number and the earmark amount which are nearest to the current time from the transaction record file;
s13, if the obtained online transaction serial number and the load amount are consistent with the value stored by the load server, judging that the load characteristic value meeting the requirement is extracted;
and S14, if the acquired online transaction serial number and the earmark amount are not consistent with the value stored by the earmark server, judging that the earmark characteristic value is an abnormal value.
In practice, the online transaction number (LastCounter) of the record of the last circle in the card is denoted by C, the load amount (LastMoney) of the record of the last circle in the card is denoted by M, and an automatic 1-up Counter (Counter) per successful load is denoted by S.
When C, M in the loading characteristic value needs to be obtained, the transaction record file in the card is read, and then the first matched loading record is found out through the transaction terminal machine number, so that the loading record can be obtained.
Since the data are important data representing the loading process, it is necessary to determine whether the loading process is abnormal according to the specific value of the data. If the data value cannot be obtained, the load record may not exist, and secondary judgment needs to be performed along with the query result of the load record, specifically as follows:
s141, inquiring the load record of the current card in the load record table;
s142, if the load record cannot be found, feeding back load exception;
and S143, if the load record is inquired, adjusting the load record of the load service, and performing load confirmation processing based on the adjusted load record.
If the load record is not inquired and the load server has no load record, the fact that no load operation is normal before is represented. If the load record is inquired, the load record of the load server needs to be adjusted so as to continue the load, and the method specifically comprises the following steps:
s1431, calculating the difference value between the load count value and the load count value in the load record;
s1432, if the difference value is larger than or equal to a load record threshold value set in the load terminal, terminating the current load operation;
and S1433, if the difference value is smaller than a load record threshold value set in the load terminal, adding one to a load count value in the obtained load record, storing the obtained load record to a load server, and completing the load operation in the load terminal.
Optionally, the S2 includes:
s21, the obtained online transaction serial number, the load terminal number, the load amount and the load count value representing the current load amount are used as keywords to be sent to a load server;
and S22, the earmark server feeds back a return value of the corresponding earmark application according to the received keyword.
In implementation, all the load records are stored on the load server based on data storage and security considerations, so that a request needs to be sent to the load server to obtain the required load records.
Based on the load record of the feedback, the following processing procedure shows two indexes of whether the load is successfully loaded and whether the load is the latest load record according to the load record to discuss, and the following contents are mainly included:
and S31, if the current load record is judged to be the latest and completed load operation, judging that the load operation is completed.
And S32, if the current load record is not the completed load operation, judging whether the current load record is the latest load record.
At this time, the secondary judgment according to whether the load record is the latest load record is as follows:
s321, if the current load record is judged to be the latest load record, a load confirmation interface of the service system is called to complete the load operation.
S322, if the load record is not the latest load record, the load exception is proposed.
And S33, if the current load record is judged to belong to the loaded operation but not the latest load record, completing the load confirmation at the load terminal again, and completing the load operation according to the confirmation result.
Example two
According to a second aspect of the embodiments of the present disclosure, an embodiment of the present disclosure further provides a security verification apparatus for an expense data earmark process, as shown in fig. 2, the apparatus includes:
the characteristic value extraction unit 21 is used for extracting the load characteristic value in the load terminal;
the application sending unit 22 is configured to send a load application to the load server based on the obtained load characteristic value in combination with the load count value;
the first earmark operation unit 23 is configured to, if a successful earmark application return value fed back by the server is received, complete an earmark operation according to the successful earmark application return value;
and the second earmark operation unit 24 is configured to propose an earmark exception if a successful earmark application return value fed back by the server is not received.
In implementation, in order to solve a possible repeated load behavior, the load characteristic value is provided in the embodiment of the present application based on a general data type in a general terminal transaction record file, and an existing file does not need to be modified.
The whole loading process including the above contents is as follows:
and after the load is started, executing a load initialization command.
If the command is successfully executed, the initialization is judged to be successful, and the CPU card is controlled to return initialization result information. If the command fails to execute, the load is judged to fail.
And analyzing the loading initialization information, assembling the information and calling an encryption machine interface of the remote loading server.
If the load server encryption machine returns the MAC2, further executing the load instruction; and if the encryption machine does not return the message, judging that the load fails.
After the load instruction is executed, the CPU card returns the load result information.
And after executing the balance acquisition instruction, acquiring the balance after the load, and judging whether the current balance is equal to the sum of the sum before the load and the sum of the load.
If the two numbers are equal, the load is judged to be successful, otherwise, the load is judged to be failed.
Optionally, the feature value extracting unit 21 includes:
the file acquisition subunit 211 is configured to acquire a transaction record file in the earmark terminal;
an information extraction subunit 212, configured to extract, from the transaction record file, the online transaction serial number and the load amount closest to the current time;
the first result judging subunit 213 is configured to judge that a load characteristic value meeting the requirement has been extracted if the acquired online transaction serial number and the load amount are consistent with the value stored by the load server;
and the second result determining subunit 214 is configured to determine that the load characteristic value is an abnormal value if the acquired online transaction serial number and the load amount are inconsistent with the value stored by the load server.
In practice, the online transaction number (LastCounter) of the record of the last circle in the card is denoted by C, the load amount (LastMoney) of the record of the last circle in the card is denoted by M, and an automatic 1-up Counter (Counter) per successful load is denoted by S.
When C, M in the loading characteristic value needs to be obtained, the transaction record file in the card is read, and then the first matched loading record is found out through the transaction terminal machine number, so that the loading record can be obtained.
Since the data are important data representing the loading process, it is necessary to determine whether the loading process is abnormal according to the specific value of the data. If the data value cannot be obtained, the load record may not exist, and secondary judgment needs to be performed along with the query result of the load record, specifically as follows:
after determining that the load feature value is an abnormal value, the feature value extraction unit 21 includes:
the record inquiry subunit 211 is configured to inquire the load record of the current card in the load record file;
the first processing subunit 212 is configured to feed back an earmark exception if the earmark record cannot be found;
and the second processing subunit 213, configured to, if the load record is queried, adjust the load record of the load server, and perform load confirmation processing based on the adjusted load record.
If the load record is not inquired and the load server has no load record, the fact that no load operation is normal before is represented. If the load record is inquired, the load record of the load server needs to be adjusted so as to continue the load, and the method specifically comprises the following steps:
wherein the second processing subunit 213 includes:
a difference value calculation primary subunit 2131, configured to calculate a difference value between the earmark count value and the earmark count value in the earmark record;
a load handling primary subunit 2132, configured to terminate the current load operation if the difference is greater than or equal to a load record threshold set in the load terminal;
the load handling primary subunit 2133 is further configured to, if the difference is smaller than a load record threshold set in the load terminal, add an operation to a load count value in the obtained load record, store the obtained load record to the load server, and complete the load operation in the load terminal.
Optionally, the application sending unit 22 includes:
the sending subunit 221, configured to send the obtained online transaction serial number, the load terminal number, the load amount, and the load count value representing the current load amount as a keyword to the load server;
and a result returning subunit 222, configured to feed back, by the load server, a corresponding load application success return value according to the received keyword.
In implementation, all the load records are stored on the load server based on data storage and security row considerations, so that a request needs to be sent to the load server to obtain the required load records.
Based on the load record of the feedback, the following processing procedure shows two indexes of whether the load is successfully loaded and whether the load is the latest load record according to the load record to discuss, and the following contents are mainly included:
step one, if the current load record is judged to be the latest and completed load operation, the load operation is judged to be completed.
And step two, if the current load record is judged not to be the completed load operation, judging whether the current load record is the latest load record.
At this time, the secondary judgment according to whether the load record is the latest load record is as follows:
and if the current load record is judged to be the latest load record, calling a load confirmation interface of the service system to finish the load operation.
And if the load record is not the latest load record, proposing a load exception.
And step three, if the current load record is judged to belong to the loaded operation but not the latest load record, completing the load confirmation at the load terminal again, and completing the load operation according to the confirmation result.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units. The components shown as modules or units may or may not be physical units, i.e. may be located in one place or may also be distributed over a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the wood-disclosed scheme. One of ordinary skill in the art can understand and implement it without inventive effort.
In this exemplary embodiment, a computer-readable storage medium is further provided, on which a computer program is stored, which when executed by a processor implements the steps of the security verification method for the expense data earmark process described in any of the above embodiments. For the specific steps of the security verification method for the expense data earmark process, reference may be made to the detailed description of the data processing steps in the foregoing embodiments, which is not described herein again. The computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
There is also provided in this example embodiment an electronic device that may include a processor and a memory to store executable instructions for the processor. Wherein the processor is configured to execute the steps of the security verification method for the expense data earmark process in any of the above embodiments via execution of the executable instructions. The steps of the generating method can refer to the detailed description in the foregoing method embodiments, and are not described herein again.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
FIG. 3 shows a schematic diagram of an electronic device in an example embodiment according to the present disclosure. For example, the apparatus may be provided as a server or client. Referring to fig. 3, the device includes a processing component 422, which further includes one or more processors, and memory resources, represented by memory 432, for storing instructions, such as application programs, that are executable by the processing component 422. The application programs stored in memory 432 may include one or more modules that each correspond to a set of instructions. Further, the processing component 422 is configured to execute instructions to perform the above-described methods.
The device may also include a power component 426 configured to perform power management of the device, a wired or wireless network interface 450 configured to connect the device to a network, and an input output (I/O) interface 458. The device may operate based on an operating system stored in memory 432, such as Windows Server (TM), Mac OS XTM, Unix (TM), Linux (TM), FreeBSDTM, or the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This embodiment is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (20)

1. A security verification method for an expense data earmark process, the method comprising:
extracting a load characteristic value in a load terminal;
sending a load application to a load server based on the obtained load characteristic value and a load count value;
if a successful load application return value fed back by the server is received, completing the load operation according to the successful load application return value;
and if the successful load application return value fed back by the server is not received, the load exception is proposed.
2. The security verification method for the fee data earmark process according to claim 1, wherein the extracting the earmark feature value in the earmark terminal comprises:
acquiring a transaction record file in a load terminal;
extracting the online transaction serial number and the load amount which are closest to the current time from the transaction record file;
if the acquired online transaction serial number and the load amount are consistent with the value stored by the load server, judging that the load characteristic value meeting the requirement is extracted;
and if the acquired online transaction serial number and the load amount are inconsistent with the value stored by the load server, judging that the load characteristic value is an abnormal value.
3. The security verification method for the fee data earmark process as claimed in claim 2, wherein after determining that the earmark characteristic value is an abnormal value, the method further comprises:
inquiring the load record of the current card in the load record file;
if the load record cannot be found, feeding back load exception;
and if the load record is inquired, adjusting the load record of the load server, and performing load confirmation processing based on the adjusted load record.
4. The security verification method for the fee data loading process according to claim 3, wherein the adjusting the loading record of the loading server if the loading record is queried and the loading confirmation processing based on the adjusted loading record comprise:
calculating the difference value between the earmark count value and the earmark count value in the earmark record;
if the difference is larger than or equal to the load record threshold set in the load terminal, terminating the current load operation;
and if the difference value is smaller than the loading record threshold value set in the loading terminal, adding one to the loading count value in the obtained loading record, simultaneously storing the obtained loading record to the loading server, and finishing the loading operation in the loading terminal.
5. The security verification method for the fee data earmark process according to claim 2, wherein the sending an earmark application to the earmark server based on the obtained earmark feature value in combination with the earmark count value comprises:
sending the obtained online transaction serial number, the load terminal number, the load amount and a load count value representing the current load amount as keywords to a load server;
and the load server feeds back a corresponding load application success return value according to the received keyword.
6. The security verification method for the fee data earmark process according to claim 1, wherein if the earmark application success return value fed back by the server is received, the earmark operation is completed according to the earmark application success return value, comprising:
and if the current load record is judged to be the latest and completed load operation, judging that the load operation is completed.
7. The security verification method for the fee data earmark process according to claim 1, wherein if the earmark application success return value fed back by the server is received, the earmark operation is completed according to the earmark application success return value, comprising:
and if the current load record is not the completed load operation, judging whether the current load record is the latest load record.
8. The security verification method for the fee data earmark process as recited in claim 7, further comprising:
and if the current load record is judged to be the latest load record, calling a load confirmation interface of the service system to finish the load operation.
9. The security verification method for the fee data earmark process according to claim 1, wherein if the earmark application success return value fed back by the server is received, the earmark operation is completed according to the earmark application success return value, comprising:
and if the current load record is judged to belong to the loaded operation but not the latest load record, completing the load confirmation again at the load terminal, and completing the load operation according to the confirmation result.
10. A safety verification device for a charge data earmark process, the method comprising:
the characteristic value extraction unit is used for extracting the load characteristic value in the load terminal;
the application sending unit is used for sending the earmark application to the earmark server based on the obtained earmark characteristic value and the earmark counting value;
the first load operation unit is used for completing the load operation according to the load application return success value if the load application success return value fed back by the server is received;
and the second earmark operation unit is used for proposing earmark exception if the successful return value of the earmark application fed back by the server is not received.
11. The security verification apparatus for the fee data earmark process as claimed in claim 10, wherein the characteristic value extraction unit comprises:
the file acquisition subunit is used for acquiring the transaction record file in the load terminal;
the information extraction subunit is used for extracting the online transaction serial number and the load amount which are closest to the current time from the transaction record file;
the first result judging subunit is used for judging that the load characteristic value meeting the requirement is extracted if the acquired online transaction serial number and the load amount are consistent with the value stored by the load server;
and the second result judging subunit is used for judging that the load characteristic value is an abnormal value if the acquired online transaction serial number and the load amount are inconsistent with the value stored by the load server.
12. The security verification apparatus for the fee data earmark process according to claim 10, wherein the characteristic value extraction unit, after determining that the earmark characteristic value is an abnormal value, comprises:
the record inquiry subunit is used for inquiring the load record of the current card in the load record file;
the first processing subunit is used for feeding back the load exception if the load record cannot be found;
and the second processing subunit is used for adjusting the load record of the load server if the load record is inquired, and performing load confirmation processing based on the adjusted load record.
13. The security verification apparatus for the charge data earmark process as claimed in claim 12, wherein the second processing subunit comprises:
the difference value calculation primary subunit is used for calculating the difference value between the earmark count value and the earmark count value in the earmark record;
the load processing primary subunit is used for terminating the current load operation if the difference value is greater than or equal to a load record threshold value set in the load terminal;
and the earmark processing primary subunit is also used for adding an operation to the earmark count value in the obtained earmark record if the difference value is smaller than the earmark record threshold value set in the earmark terminal, simultaneously storing the obtained earmark record to the earmark server, and finishing the earmark operation in the earmark terminal.
14. The security verification apparatus for the earmark process of fee data according to claim 11, wherein the application sending unit comprises:
the sending subunit is used for sending the obtained online transaction serial number, the load terminal number, the load amount and the load count value representing the current load amount as keywords to the load server;
and the result returning subunit is used for feeding back a corresponding load application success return value by the load server according to the received keyword.
15. The security verification apparatus for the charge data earning process according to claim 10, wherein the first earning operation unit is further configured to:
and if the current load record is judged to be the latest and completed load operation, judging that the load operation is completed.
16. The security verification apparatus for the charge data earning process according to claim 10, wherein the first earning operation unit is further configured to:
and if the current load record is not the completed load operation, judging whether the current load record is the latest load record.
17. The security verification apparatus for fee data earmark process as claimed in claim 16, wherein said first earmark operation unit is further configured to:
and if the current load record is judged to be the latest load record, calling a load confirmation interface of the service system to finish the load operation.
18. The security verification apparatus for the charge data earning process according to claim 10, wherein the first earning operation unit is further configured to:
and if the current load record is judged to belong to the loaded operation but not the latest load record, completing the load confirmation again at the load terminal, and completing the load operation according to the confirmation result.
19. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the steps of the security verification method for expense data earmark process of any of claims 1 to 9 via execution of the executable instructions.
20. A computer-readable storage medium, on which a computer program is stored which is executed by a processor for carrying out the steps of the security verification method for a fee data earmark process according to any one of claims 1 to 9.
CN202110471152.XA 2021-04-29 2021-04-29 Safety verification method and device for expense data earmark process and electronic equipment Pending CN113487300A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110471152.XA CN113487300A (en) 2021-04-29 2021-04-29 Safety verification method and device for expense data earmark process and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110471152.XA CN113487300A (en) 2021-04-29 2021-04-29 Safety verification method and device for expense data earmark process and electronic equipment

Publications (1)

Publication Number Publication Date
CN113487300A true CN113487300A (en) 2021-10-08

Family

ID=77933366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110471152.XA Pending CN113487300A (en) 2021-04-29 2021-04-29 Safety verification method and device for expense data earmark process and electronic equipment

Country Status (1)

Country Link
CN (1) CN113487300A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667314A (en) * 2009-08-19 2010-03-10 北京握奇数据系统有限公司 Method and system for charging on-board units on line
CN106326793A (en) * 2015-06-30 2017-01-11 阿里巴巴集团控股有限公司 Information processing method and device
CN106600726A (en) * 2016-12-16 2017-04-26 湖北省高速公路联网收费中心 Electronic cash credit for load system and method for highway toll charging lane
CN107578483A (en) * 2017-08-21 2018-01-12 深圳市金溢科技股份有限公司 A kind of electric non-stop toll method of commerce, server and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667314A (en) * 2009-08-19 2010-03-10 北京握奇数据系统有限公司 Method and system for charging on-board units on line
CN106326793A (en) * 2015-06-30 2017-01-11 阿里巴巴集团控股有限公司 Information processing method and device
CN106600726A (en) * 2016-12-16 2017-04-26 湖北省高速公路联网收费中心 Electronic cash credit for load system and method for highway toll charging lane
CN107578483A (en) * 2017-08-21 2018-01-12 深圳市金溢科技股份有限公司 A kind of electric non-stop toll method of commerce, server and system

Similar Documents

Publication Publication Date Title
CN105447604B (en) Account processing method and device
KR102151326B1 (en) Data processing method and device
CN107818460B (en) Payment method and device
CN109285069B (en) Resource transfer method, device and server
CN107689002B (en) Checking method and device for cash withdrawal request, electronic equipment and storage medium
CN110457118B (en) Task processing method, device, computer equipment and storage medium
CN111241563A (en) Configuration method, device, server and storage medium of authority information
CN111553788B (en) Capital business processing method and device based on big data, electronic equipment and medium
CN113626218A (en) Data processing method, data processing device, storage medium and computer equipment
CN113487300A (en) Safety verification method and device for expense data earmark process and electronic equipment
CN112099921A (en) Java application system preheating method and system based on JVM
CN113781226A (en) Batch transaction data processing method and device
CN115204996A (en) Capital collection method and device and computer equipment
CN111737262A (en) Data processing method and device
CN110716930A (en) Numerical value transfer method, device, computer equipment and storage medium
CN110930206A (en) Invoice matching method and device and storage medium
CN111738708A (en) Data processing method, device, server and storage medium
US20240185196A1 (en) Reduced memory resources for proactive monitoring of electronic transactions
CN113643111B (en) Electric power marketing refund management system and method
CN113947393A (en) Transfer data processing method and device, storage medium and electronic equipment
CN117709964A (en) Transaction processing method and device, storage medium and electronic equipment
CN112950363A (en) Data processing method and device, electronic equipment and storage medium
RU2510528C2 (en) Request processing system, request processing method and computer-readable medium having request processing instructions
CN116167883A (en) One-stop batch accounting processing method and system
WO2020024461A1 (en) Method and apparatus for implementing integration of digital certificate transaction records

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination