CN113643042B - Security verification system based on online business security - Google Patents

Security verification system based on online business security Download PDF

Info

Publication number
CN113643042B
CN113643042B CN202110958013.XA CN202110958013A CN113643042B CN 113643042 B CN113643042 B CN 113643042B CN 202110958013 A CN202110958013 A CN 202110958013A CN 113643042 B CN113643042 B CN 113643042B
Authority
CN
China
Prior art keywords
module
verification
risk
unit
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110958013.XA
Other languages
Chinese (zh)
Other versions
CN113643042A (en
Inventor
陈晨
陈国庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Jiyi Network Technology Co ltd
Original Assignee
Wuhan Jiyi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Jiyi Network Technology Co ltd filed Critical Wuhan Jiyi Network Technology Co ltd
Priority to CN202110958013.XA priority Critical patent/CN113643042B/en
Publication of CN113643042A publication Critical patent/CN113643042A/en
Application granted granted Critical
Publication of CN113643042B publication Critical patent/CN113643042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/229Hierarchy of users of accounts
    • G06Q20/2295Parent-child type, e.g. where parent has control on child rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Health & Medical Sciences (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a security verification system based on online service security, which comprises a client, a server and a security verification system, wherein the client is in bidirectional connection with the server through an Ethernet, and the server is in bidirectional connection with the security verification system through the Ethernet. This safety verification system based on online business safety is through placing the verification mode that multiple difficult degree is different in the integration in verifying the integrated unit, utilizes the risk level to divide the unit to carry out the induction classification to the APP of online difference according to actual conditions, set up to the gradient that the important degree is different to set up the verification mode that corresponds specially for this APP, thereby under the cooperation of user's orbit analysis unit, when detecting that the user switches over to child or other users, directly launch the verification code that sets up in advance on different APP, at this moment, child is difficult to pass through the higher verification mode of degree of difficulty, can guarantee the safety of some important APP.

Description

Security verification system based on online business security
Technical Field
The invention relates to the technical field of security verification, in particular to a security verification system based on online business security.
Background
Business security refers to measures or means to protect business systems from security threats. The generalized business security includes the security of software and hardware platform (operating system, database, etc.), business system itself (software or equipment), and the services provided by the business; business security in a narrow sense refers to the security of the business system's own software and services.
Often, a family has a plurality of mobile phones, along with the popularization of mobile payment, people often carry cash very little, but wealth is placed on various APP of the mobile phones, and although payment passwords are limited, confidentiality of the payment passwords is not very high for families with children, the payment passwords are often remembered by some children and consumed through the mobile phones, and particularly under the condition that parents accompany the lack of time of the children, the mobile phones become an important game or animation watching tool for the children.
Aiming at the situation, the mobile phone has the hidden danger of payment, when a child plays the mobile phone, the mobile phone cannot verify the user according to the adjustment of the user, so that the child is very easy to touch by mistake when playing the mobile phone, and the consumption and other situations are caused.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects of the prior art, the invention provides a safety verification system based on online service safety, which solves the problems that a mobile phone cannot verify a user according to the adjustment of the user, so that a child is very easy to touch by mistake when playing the mobile phone, and the situation of consumption and the like is caused.
(II) technical scheme
In order to achieve the above purpose, the invention is realized by the following technical scheme: the utility model provides a security verification system based on online business safety, includes customer end, server and security verification system, the customer end passes through the ethernet and realizes two-way connection with the server, the server passes through the ethernet and realizes two-way connection with the security verification system, the security verification system realizes two-way connection with central processing module, central processing module realizes two-way connection with lock screen triggering module, information storage module, user track analysis unit, risk class division unit and verification integrated unit respectively, the output of verification integrated unit is connected with the input of risk class division unit, the output of risk class division unit is connected with the input of secondary verification unit, the output of secondary verification unit is connected with the input of coordinate record module and restriction locking module respectively, the output of coordinate record module is connected with the input of user track analysis unit.
Preferably, the user track analysis unit comprises a cluster analysis module, a category recording module, a duration recording module and a link trigger recording module, wherein the output ends of the category recording module, the duration recording module and the link trigger recording module are connected with the input end of the cluster analysis module.
Preferably, the cluster analysis module is mainly used for calculating the behavior track of the user by adopting a cluster algorithm and generating a behavior track report.
Preferably, the risk classification unit comprises a grade gradient setting module, a data comparison module, a low risk module, a medium risk module and a high risk module, wherein the output end of the grade gradient setting module is connected with the input end of the data comparison module, and the output end of the data comparison module is respectively connected with the input ends of the low risk module, the medium risk module and the high risk module.
Preferably, the grade gradient setting module is used for providing a section gradient value for setting a risk bearing range for a user.
Preferably, the verification integrated unit comprises a user setting matching module, a click verification module, an inference jigsaw verification module, a sliding jigsaw verification module, a space inference verification module and a short message uplink verification module, wherein the user setting matching module is respectively in bidirectional connection with the click verification module, the inference jigsaw verification module, the sliding jigsaw verification module, the space inference verification module and the short message uplink verification module.
Preferably, the click verification module comprises character click, chart click and word order click.
Preferably, the secondary verification unit comprises a risk triggering module, a system alarm module and a secondary verification module, wherein the output end of the risk triggering module is connected with the input end of the system alarm module, and the output end of the system alarm module is connected with the input end of the secondary verification module.
(III) beneficial effects
The invention provides a security verification system based on online business security. The beneficial effects are as follows:
(1) This safety verification system based on online business safety through placing the verification mode that multiple degree of difficulty is different in the integration in verifying the integrated unit, utilizes the risk level to divide the unit to carry out induction classification to online different APP according to actual conditions, sets up the gradient that the degree of importance is different to set up the verification mode that corresponds specially for this APP, thereby under the cooperation of user's orbit analysis unit, when detecting that the user switches over to child or other users, directly launch the verification code that sets up in advance on different APP, at this moment, child is difficult to pass through the higher verification mode of degree of difficulty, can guarantee the safety of some important APP.
(2) According to the safety verification system based on the online service safety, through the arrangement of the secondary verification unit, the risk triggering module is used for monitoring the analysis result of the user track analysis unit, when the fact that a current operator is a child is monitored, and the child still enters some important APP, the system alarm module is directly triggered, so that the user can continue to operate after the user passes the verification of the secondary verification module, the situation that the child is mistakenly touched with small probability and the user directly passes the verification is avoided, and the safety of the online service is further guaranteed.
(3) According to the safety verification system based on the online business safety, the user trajectory analysis unit is used for carrying out targeted monitoring on the use of the child, so that parents can better know the state of the child, targeted education is carried out, and the safe use of the subsequent online business and the healthy growth of the child are further ensured.
Drawings
FIG. 1 is a schematic block diagram of a system of the present invention;
FIG. 2 is a system schematic block diagram of a user trajectory analysis unit of the present invention;
FIG. 3 is a schematic block diagram of a system of risk classification units according to the present invention;
FIG. 4 is a schematic block diagram of a system for verifying an integrated unit in accordance with the present invention;
fig. 5 is a system schematic block diagram of the secondary authentication unit of the present invention.
In the figure, 1, a client; 2. a server; 3. a security verification system; 4. a central processing module; 5. a screen locking triggering module; 6. an information storage module; 7. a user trajectory analysis unit; 8. a risk level dividing unit; 9. verifying the integrated unit; 10. a secondary verification unit; 11. a coordinate recording module; 12. a limit lock module; 13. a cluster analysis module; 14. a category recording module; 15. a duration recording module; 16. a link triggering recording module; 17. a grade gradient setting module; 18. a data comparison module; 19. a low risk module; 20. a moderate risk module; 21. a high risk module; 22. a user sets a matching module; 23. a click verification module; 24. an inference jigsaw verification module; 25. a sliding jigsaw verification module; 26. a space reasoning verification module; 27. a short message uplink verification module; 28. a risk triggering module; 29. a system alarm module; 30. and a secondary verification module.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-5, the embodiment of the present invention provides a technical solution: the security verification system based on-line business security comprises a client 1, a server 2 and a security verification system 3, wherein the client 1 is in bidirectional connection with the server 2 through an Ethernet, the server 2 is in bidirectional connection with the security verification system 3 through the Ethernet, the security verification system 3 is in bidirectional connection with a central processing module 4, the central processing module 4 is an ARM9 series processor, the central processing module 4 is respectively in bidirectional connection with a screen locking triggering module 5, an information storage module 6, a user track analysis unit 7, a risk grade division unit 8 and a verification integration unit 9, the screen locking triggering module 5 is used for starting APP verification to achieve the purpose of one-key starting, the output end of the verification integration unit 9 is connected with the input end of the risk grade division unit 8, the output end of the risk grade division unit 8 is connected with the input end of a secondary verification unit 10, the output end of the secondary verification unit 10 is respectively connected with the input ends of the coordinate recording module 11 and the limiting locking module 12, the coordinate recording module 11 is just a coordinate module for recording time and corresponding used APP, data support is provided for subsequent analysis, the output end of the coordinate recording module 11 is connected with the input end of the user track analysis unit 7, further, by placing multiple verification modes with different difficulty levels into the verification integration unit 9, classifying different APP on line according to actual conditions by utilizing the risk level dividing unit 8, setting the different APP gradient with different importance levels, setting a special corresponding verification mode for the APP, thus when detecting that a user switches to a child or other users under the cooperation of the user track analysis unit 7, directly starting preset verification codes on different APP, at this time, the child is difficult to pass through the higher verification mode of degree of difficulty, can guarantee the safety of some important APP.
As a preferred scheme, the user track analysis unit 7 includes a cluster analysis module 13, a category recording module 14, a duration recording module 15 and a link triggering recording module 16, wherein the output ends of the category recording module 14, the duration recording module 15 and the link triggering recording module 16 are all connected with the input end of the cluster analysis module 13, the cluster analysis module 13 is mainly used for calculating the behavior track of a user by adopting a clustering algorithm and generating a behavior track report, further explaining that the category recording module 14 is the record of browsing different APPs by a child, the duration recording module 15 is used for recording the playing time of the child on one APP, the link triggering recording module 16 is used for counting the access of the child through the direct point opening link of the child, and the use of the child is monitored by the user track analysis unit 7 in a targeted manner, so that parents can better know the state of the child, thereby carrying out targeted education, and further guaranteeing the safe use of the follow-up online service and the health growth of the child.
As a preferred solution, the risk classification unit 8 includes a grade gradient setting module 17, a data comparing module 18, a low risk module 19, a moderate risk module 20 and a high risk module 21, wherein an output end of the grade gradient setting module 17 is connected with an input end of the data comparing module 18, an output end of the data comparing module 18 is respectively connected with input ends of the low risk module 19, the moderate risk module 20 and the high risk module 21, and the grade gradient setting module 17 is used for providing a section gradient value for setting a risk bearing range for a user, and further explaining that the data comparing module 18 is an LM239 model data comparator.
As a preferred solution, the verification integrated unit 9 includes a user setting matching module 22, a click verification module 23, an inference jigsaw verification module 24, a sliding jigsaw verification module 25, a spatial inference verification module 26 and a short message uplink verification module 27, where the user setting matching module 22 is respectively connected with the click verification module 23, the inference jigsaw verification module 24, the sliding jigsaw verification module 25, the spatial inference verification module 26 and the short message uplink verification module 27 in a bidirectional manner, and the click verification module 23 includes text click, chart click and word order click.
As a preferred scheme, the secondary verification unit 10 includes a risk triggering module 28, a system alarm module 29 and a secondary verification module 30, the output end of the risk triggering module 28 is connected with the input end of the system alarm module 29, the output end of the system alarm module 29 is connected with the input end of the secondary verification module 30, which further illustrates that, through the arrangement of the secondary verification unit 10, the analysis result of the user track analysis unit 7 is monitored by using the risk triggering module 28, when the current operator is a child, and the child still enters some important APPs, the system alarm module 29 is directly triggered, so that the user can continue to operate after the user needs to pass the verification of the secondary verification module 30, thereby avoiding the situation of false touch due to small probability of the child, and further guaranteeing the safety of online service.
When the mobile phone is used, a user logs in the security verification system 3 through the client 1 and is connected to the server 2 to set, the level gradient setting module 17 is utilized to divide different APP in the mobile phone according to the importance degree, and the verification mode corresponding to the importance degree is set through the user setting matching module 22, when a child needs to play a game or watch an animation, the parent directly presses a screen locking button, at the moment, the screen locking triggering module 5 is started, and the APP on the mobile phone needs to be verified to be opened, for example: after a child opens the screen unlocking interface, the child can enter the game APP or the animation screen to play the APP through simple verification, when the child mistakenly touches the related APP, the child needs to be verified with higher difficulty, the child cannot pass through the verification, the safety of online service can be ensured, when the child mistakenly touches the related APP, the risk triggering module 28 is triggered under the condition that the child is used by the user is calculated through the analysis of the user track analysis unit 7, and the system alarm module 29 alarms, so that the child needs to be verified by the secondary verification module 30 to enter the APP, the probability of mistaken touch passing is effectively avoided, and the online service safety is ensured.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation. The term "comprising" an element defined by the term "comprising" does not exclude the presence of other identical elements in a process, method, article or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (2)

1. The utility model provides a security verification system based on online business safety, includes customer end (1), server (2) and security verification system (3), customer end (1) realizes two-way connection through ethernet and server (2), server (2) realizes two-way connection through ethernet and security verification system (3), its characterized in that: the security verification system (3) is in bidirectional connection with the central processing module (4), the central processing module (4) is respectively in bidirectional connection with the lock screen triggering module (5), the information storage module (6), the user track analysis unit (7), the risk grade division unit (8) and the verification integration unit (9), the output end of the verification integration unit (9) is connected with the input end of the risk grade division unit (8), the output end of the risk grade division unit (8) is connected with the input end of the secondary verification unit (10), the output end of the secondary verification unit (10) is respectively connected with the input ends of the coordinate recording module (11) and the limiting locking module (12), and the output end of the coordinate recording module (11) is connected with the input end of the user track analysis unit (7);
the risk classification unit (8) comprises a grade gradient setting module (17), a data comparison module (18), a low risk module (19), a moderate risk module (20) and a high risk module (21), wherein the output end of the grade gradient setting module (17) is connected with the input end of the data comparison module (18), and the output end of the data comparison module (18) is respectively connected with the input ends of the low risk module (19), the moderate risk module (20) and the high risk module (21);
the grade gradient setting module (17) is used for providing a section gradient value for setting a risk bearing range for a user;
the verification integration unit (9) comprises a user setting matching module (22), a click verification module (23), an inference jigsaw verification module (24), a sliding jigsaw verification module (25), a space inference verification module (26) and a short message uplink verification module (27), wherein the user setting matching module (22) is respectively in bidirectional connection with the click verification module (23), the inference jigsaw verification module (24), the sliding jigsaw verification module (25), the space inference verification module (26) and the short message uplink verification module (27);
the clicking verification module (23) comprises character clicking, chart clicking and language order clicking;
the user track analysis unit (7) comprises a cluster analysis module (13), a category recording module (14), a duration recording module (15) and a link triggering recording module (16), wherein the output ends of the category recording module (14), the duration recording module (15) and the link triggering recording module (16) are connected with the input end of the cluster analysis module (13);
the secondary verification unit (10) comprises a risk triggering module (28), a system alarm module (29) and a secondary verification module (30), wherein the output end of the risk triggering module (28) is connected with the input end of the system alarm module (29), and the output end of the system alarm module (29) is connected with the input end of the secondary verification module (30).
2. A security verification system based on-line business security as claimed in claim 1, wherein: the cluster analysis module (13) is mainly used for calculating the behavior track of the user by adopting a cluster algorithm and generating a behavior track report.
CN202110958013.XA 2021-08-20 2021-08-20 Security verification system based on online business security Active CN113643042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110958013.XA CN113643042B (en) 2021-08-20 2021-08-20 Security verification system based on online business security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110958013.XA CN113643042B (en) 2021-08-20 2021-08-20 Security verification system based on online business security

Publications (2)

Publication Number Publication Date
CN113643042A CN113643042A (en) 2021-11-12
CN113643042B true CN113643042B (en) 2024-04-05

Family

ID=78423021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110958013.XA Active CN113643042B (en) 2021-08-20 2021-08-20 Security verification system based on online business security

Country Status (1)

Country Link
CN (1) CN113643042B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1741676A (en) * 2004-08-29 2006-03-01 华为技术有限公司 Method for protecting user card
CN102194177A (en) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 System for risk control over online payment
CA2734206A1 (en) * 2010-03-22 2011-09-22 Daon Holdings Limited Methods and systems for authenticating users
US8346630B1 (en) * 2006-06-30 2013-01-01 Intuit Inc. Method and apparatus to efficiently verify inventory
KR101523494B1 (en) * 2014-10-10 2015-05-28 주식회사 시큐브 Mobile payment relay validation system and method in online and offline
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
WO2018121387A1 (en) * 2016-12-30 2018-07-05 中国银联股份有限公司 Security verification method, platform, apparatus and system
CN108763884A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN108769366A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN109600336A (en) * 2017-09-30 2019-04-09 武汉极意网络科技有限公司 Store equipment, identifying code application method and device
WO2019104920A1 (en) * 2017-11-30 2019-06-06 北京集创北方科技股份有限公司 Electronic device, display system, integrated control device thereof, and security verification method
CN110147660A (en) * 2019-05-15 2019-08-20 四川长虹电器股份有限公司 Digital verification system and digital verification method based on classification of risks
CN110213281A (en) * 2019-06-10 2019-09-06 昆山顶象数据科技有限公司 Safety protecting method and device
CN110348980A (en) * 2018-04-08 2019-10-18 阿里巴巴集团控股有限公司 System, the method and apparatus of safety check
CN110503563A (en) * 2019-07-05 2019-11-26 中国平安人寿保险股份有限公司 Risk control method and system
CN111416817A (en) * 2020-03-17 2020-07-14 郑州轻工业大学 Mode identification method based on network verification code
KR102220027B1 (en) * 2020-08-03 2021-02-24 이효배 Assessment System of Safety and Health Management Level
CN112819391A (en) * 2021-04-02 2021-05-18 深圳大智软件技术有限公司 System for automatically distributing client clues of advertisement platform

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1741676A (en) * 2004-08-29 2006-03-01 华为技术有限公司 Method for protecting user card
US8346630B1 (en) * 2006-06-30 2013-01-01 Intuit Inc. Method and apparatus to efficiently verify inventory
CA2734206A1 (en) * 2010-03-22 2011-09-22 Daon Holdings Limited Methods and systems for authenticating users
CN102194177A (en) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 System for risk control over online payment
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
KR101523494B1 (en) * 2014-10-10 2015-05-28 주식회사 시큐브 Mobile payment relay validation system and method in online and offline
WO2018121387A1 (en) * 2016-12-30 2018-07-05 中国银联股份有限公司 Security verification method, platform, apparatus and system
CN109600336A (en) * 2017-09-30 2019-04-09 武汉极意网络科技有限公司 Store equipment, identifying code application method and device
WO2019104920A1 (en) * 2017-11-30 2019-06-06 北京集创北方科技股份有限公司 Electronic device, display system, integrated control device thereof, and security verification method
CN110348980A (en) * 2018-04-08 2019-10-18 阿里巴巴集团控股有限公司 System, the method and apparatus of safety check
CN108769366A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN108763884A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN110147660A (en) * 2019-05-15 2019-08-20 四川长虹电器股份有限公司 Digital verification system and digital verification method based on classification of risks
CN110213281A (en) * 2019-06-10 2019-09-06 昆山顶象数据科技有限公司 Safety protecting method and device
CN110503563A (en) * 2019-07-05 2019-11-26 中国平安人寿保险股份有限公司 Risk control method and system
CN111416817A (en) * 2020-03-17 2020-07-14 郑州轻工业大学 Mode identification method based on network verification code
KR102220027B1 (en) * 2020-08-03 2021-02-24 이효배 Assessment System of Safety and Health Management Level
CN112819391A (en) * 2021-04-02 2021-05-18 深圳大智软件技术有限公司 System for automatically distributing client clues of advertisement platform

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
利用基于身份的密码算法+短信验证码的移动安全支付方案;刘亚强;李晓宇;;计算机科学(第01期);第299-307页 *
基于加密短信验证码的移动安全支付解决方案;李赛;李晓宇;;计算机应用(第08期);第148-152、169页 *
李赛 ; 李晓宇 ; .基于加密短信验证码的移动安全支付解决方案.计算机应用.2017,(第08期),第148-152、169页. *
面向信息安全等级测评的安全配置审查系统;于佳丽;白晓红;;大众用电;20161225(第S2期);第103-106页 *

Also Published As

Publication number Publication date
CN113643042A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
US10764297B2 (en) Anonymized persona identifier
CN109635872B (en) Identity recognition method, electronic device and computer program product
US10083439B2 (en) Device, system, and method of differentiating over multiple accounts between legitimate user and cyber-attacker
US10339298B2 (en) Weak password support in a multi-user environment
Banerjee et al. Biometric authentication and identification using keystroke dynamics: A survey
CN108055281A (en) Account method for detecting abnormality, device, server and storage medium
Sarkisyan et al. WristSnoop: Smartphone PINs prediction using smartwatch motion sensors
CN108989150A (en) A kind of login method for detecting abnormality and device
Dowland et al. Keystroke analysis as a method of advanced user authentication and response
CN106156743A (en) The intelligent anti-interference method of door bell and button system and door bell and button system
CN109871673A (en) Based on the lasting identity identifying method and system in different context environmentals
CN109067717A (en) A kind of method and device detecting SQL injection loophole
US11606353B2 (en) System, device, and method of generating and utilizing one-time passwords
Han et al. Towards stalkerware detection with precise warnings
Villar‐Rodríguez et al. A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines
CN113643042B (en) Security verification system based on online business security
CN111882425B (en) Service data processing method, device and server
US20230047174A1 (en) System and method for improving cybersecurity for telecommunication devices
CN112087409B (en) Account correlation method, terminal and server
CN112464218A (en) Model training method and device, electronic equipment and storage medium
Tanaka A calculation method of generation probability of indoor activity sound in daily life
Wu et al. A Collaborative Filtering Method for Operation Maintenance Behavior in Power Monitoring Systems
Neal et al. Spoofing analysis of mobile device data as behavioral biometric modalities
CN117541318B (en) Offline consumption intelligent evaluation and supervision method, system and medium
CN114979258B (en) Method and system for pushing security system message to chat software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant