CN113784355B - Account security guarantee method and device - Google Patents

Account security guarantee method and device Download PDF

Info

Publication number
CN113784355B
CN113784355B CN202111060993.8A CN202111060993A CN113784355B CN 113784355 B CN113784355 B CN 113784355B CN 202111060993 A CN202111060993 A CN 202111060993A CN 113784355 B CN113784355 B CN 113784355B
Authority
CN
China
Prior art keywords
user
network environment
mobile phone
intelligent
environment information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111060993.8A
Other languages
Chinese (zh)
Other versions
CN113784355A (en
Inventor
晏焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202111060993.8A priority Critical patent/CN113784355B/en
Publication of CN113784355A publication Critical patent/CN113784355A/en
Application granted granted Critical
Publication of CN113784355B publication Critical patent/CN113784355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/407Cancellation of a transaction

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of mobile interconnection, and provides a method and a device for guaranteeing account security, wherein the method comprises the following steps: when a mobile phone bank receives a transaction request of a user sent by a smart phone, acquiring network environment information of the smart phone; acquiring network environment information of intelligent wearable equipment bound with an intelligent mobile phone; comparing network environment information of the smart phone and the intelligent wearable equipment, and if the fact that the 5G access base stations are inconsistent is determined, sending verification information to the intelligent wearable equipment; and receiving transaction illegal confirmation information fed back by the user, and temporarily freezing the account of the user. The network environment information of the smart mobile phone and the network environment information of the smart wearable device are compared based on the characteristic that the network coverage area of the 5G micro base station technology is smaller, if the network environment information of the smart mobile phone and the network environment information of the smart wearable device are inconsistent, the smart mobile phone is likely to be lost, verification information is further sent to the smart wearable device, and if the user feeds back the transaction illegal, the account of the user is temporarily frozen, so that after the smart mobile phone is lost, the account safety is ensured, and the user loss is reduced.

Description

Account security guarantee method and device
Technical Field
The invention relates to the technical field of mobile interconnection, in particular to an account security guarantee method and device.
Background
With the popularization of smart phones, the payment range of people using smart phones is wider and wider. However, if the smart phone is lost, even if various loss reports are immediately carried out, a certain time difference exists from the discovery of the loss of the smart phone to the freezing of various bank card payment accounts, and therefore great potential safety hazards are brought to the account safety of the user.
Disclosure of Invention
The embodiment of the invention provides an account security assurance method, which is used for guaranteeing the account security of a user after the smart phone of the user is lost, and comprises the following steps:
when a mobile phone bank receives a transaction request of a user sent by a smart phone, acquiring network environment information of the smart phone;
acquiring network environment information of intelligent wearable equipment bound with the intelligent mobile phone;
comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined, sending verification information to the intelligent wearable device;
and receiving transaction illegal confirmation information fed back by the user, and temporarily freezing the account of the user.
The embodiment of the invention also provides an account security assurance device, which is used for guaranteeing the account security of a user after the smart phone of the user is lost, and comprises the following steps:
the mobile phone network environment acquisition module is used for acquiring network environment information of the smart phone when the mobile phone bank receives a transaction request of a user sent by the smart phone;
the wearable device network environment acquisition module is used for acquiring network environment information of the intelligent wearable device bound with the intelligent mobile phone;
the information verification module is used for comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and sending verification information to the intelligent wearable device if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined;
and the account freezing module is used for receiving transaction illegal confirmation information fed back by the user and temporarily freezing the account of the user.
The embodiment of the invention also provides computer equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the account security assurance method when executing the computer program.
Embodiments of the present invention also provide a computer-readable storage medium storing a computer program for executing the above account security assurance method.
In the embodiment of the invention, when a mobile phone bank receives a transaction request of a user sent by a smart phone, network environment information of the smart phone is obtained; acquiring network environment information of intelligent wearable equipment bound with an intelligent mobile phone; comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined, sending verification information to the intelligent wearable device; and receiving transaction illegal confirmation information fed back by the user, and temporarily freezing the account of the user. The network coverage of the micro base station technology based on 5G is smaller, network environment information of the smart mobile phone and network environment information of the intelligent wearable equipment are compared, if the network environment information of the smart mobile phone and the network environment information of the intelligent wearable equipment are inconsistent, the smart mobile phone is possibly lost, verification information is further sent to the intelligent wearable equipment, and if a user feeds back a transaction violation, the account of the user is temporarily frozen, so that after the smart mobile phone of the user is lost, the account safety of the user is ensured, and the user loss is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an account security method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of an account security method according to an embodiment of the invention.
FIG. 3 is a schematic diagram of an account security method according to another embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating the implementation of step 102 in an embodiment of the present invention.
Fig. 5 is a schematic diagram of an account security device according to an embodiment of the present invention.
FIG. 6 is a schematic diagram of an account security device according to an embodiment of the invention.
FIG. 7 is a schematic diagram of an account security device according to another embodiment of the present invention.
Fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The embodiment of the invention provides an account security assurance method, which is used for guaranteeing the account security of a user after the smart phone of the user is lost, as shown in fig. 1, and comprises the following steps:
step 101: when a mobile phone bank receives a transaction request of a user sent by a smart phone, acquiring network environment information of the smart phone;
step 102: acquiring network environment information of intelligent wearable equipment bound with the intelligent mobile phone;
step 103: comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined, sending verification information to the intelligent wearable device;
step 104: and receiving transaction illegal confirmation information fed back by the user, and temporarily freezing the account of the user.
As can be seen from the flow shown in fig. 1, in the embodiment of the present invention, when a mobile phone bank receives a transaction request of a user sent by a smart phone, network environment information of the smart phone is obtained; acquiring network environment information of intelligent wearable equipment bound with an intelligent mobile phone; comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined, sending verification information to the intelligent wearable device; and receiving transaction illegal confirmation information fed back by the user, and temporarily freezing the account of the user. The network coverage of the micro base station technology based on 5G is smaller, network environment information of the smart mobile phone and network environment information of the intelligent wearable equipment are compared, if the network environment information of the smart mobile phone and the network environment information of the intelligent wearable equipment are inconsistent, the smart mobile phone is possibly lost, verification information is further sent to the intelligent wearable equipment, and if a user feeds back a transaction violation, the account of the user is temporarily frozen, so that after the smart mobile phone of the user is lost, the account safety of the user is ensured, and the user loss is reduced.
When the mobile phone bank receives a transaction request of a user sent by the smart phone, network environment information of the smart phone is firstly obtained, namely the method comprises the following steps: 5G access base station, access network, network speed, etc.
After the network environment information of the smart phone is obtained, the network environment information of the intelligent wearable device bound with the smart phone is obtained. In a specific embodiment, the method for binding the intelligent wearable device in the mobile banking by the user in advance includes: smart watches, smart bracelets, bluetooth headsets, etc. to be able to open rights to the smart wearable device that is bound in advance and send messages. Therefore, as shown in fig. 2, the account security method in the embodiment further includes, based on fig. 1:
step 201: receiving a network access equipment number of intelligent wearing equipment bound with an intelligent mobile phone, which is uploaded by a mobile phone bank;
step 202: and recording the association relation among the network access equipment numbers of the user, the intelligent mobile phone and the intelligent wearable equipment in the bank background system.
In a specific embodiment, a user selects an intelligent wearable device to be bound in a mobile phone bank, and the mobile phone bank identifies the network access device number of the intelligent wearable device and uploads the network access device number to a bank background system. In a bank background system, a data table or a database is set, and the association relationship among the numbers of the network access equipment of the user, the smart phone and the intelligent wearing equipment is recorded, for example, the smart phone B001 of Mr. A of the user has the association relationship with the intelligent wearing equipment with the network access equipment number of C10001; and the user A first has an association relationship between the smart phone B002 and the smart wearable device with the network access device number of C20001, and the association relationship is recorded in a bank background system respectively.
In another embodiment, in order to ensure the security of the data, the account security assurance method shown in fig. 3 based on the non-tamperable characteristic of the data of the blockchain network further includes, based on fig. 2:
step 301: and storing the association relation among the network access equipment numbers of the user, the intelligent mobile phone and the intelligent wearable equipment into the blockchain network.
Based on the above-mentioned early binding and recording association relationship, the specific steps, as shown in fig. 4, include:
step 401: inquiring in a bank background system to obtain the network access equipment number of the intelligent wearable equipment with association relation with the intelligent mobile phone and the user;
step 402: and determining network environment information of the intelligent wearable device bound with the intelligent mobile phone according to the network access device number of the intelligent wearable device with the association relation with the intelligent mobile phone and the user.
That is, firstly, the network access equipment number of the intelligent wearable equipment bound with the smart phone is queried through the association relation, and the network access equipment number is unique, so that the intelligent wearable equipment bound with the smart phone can be searched through the network access equipment number, and network environment information of the intelligent wearable equipment is detected, and the method comprises the following steps: 5G access base station, access network, network speed, etc.
After the network environment information of the intelligent wearable device bound with the smart phone is determined, the network environment information of the smart phone is compared with the network environment information of the intelligent wearable device, and if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined, verification information is sent to the intelligent wearable device. Because the network coverage area of the 5G micro base station technology is smaller, if the access base stations of the smart mobile phone and the smart wearable device are inconsistent, the smart mobile phone user can be primarily considered as an illegal user. Therefore, verification information needs to be sent to the intelligent wearable equipment to inquire whether the intelligent mobile phone is lost or not to ensure account fund safety of the user.
The user replies on the intelligent wearing equipment, and feeds back whether the transaction initiated by the intelligent mobile phone at the mobile phone bank is legal, namely whether the transaction is wished by the user or whether the operation is performed by the user. And temporarily freezing the account of the user when transaction illegal confirmation information fed back by the user is received.
Specifically, the smart phone and the smart wearable device in the embodiment of the invention both use 5G technology.
A specific example is given below to illustrate how an embodiment of the present invention implements account security. Under the technical background of 5G everything interconnection, the intelligent watch (bracelet) in this example can be connected to the 5G network just like the intelligent mobile phone.
The precondition preparation work comprises:
after logging in the mobile banking, the user selects an intelligent watch (bracelet) as an auxiliary security verification tool to bind when binding various accounts such as debit cards, credit cards and the like. After receiving the binding condition of the auxiliary security verification tool sent by the mobile banking system, the intelligent watch (bracelet) uploads the network access equipment number (unique, unrepeatable and untampereable) of the intelligent watch to the mobile banking system. The mobile banking system receives the network access equipment number of the intelligent watch (bracelet), binds with the user account and stores the network access equipment number in the special blockchain (tamper-proof).
After the precondition preparation work is carried out, when a user subsequently logs in a mobile phone bank or pays by using the mobile phone bank, the mobile phone bank system can simultaneously acquire the network environment information of the intelligent mobile phone and the intelligent watch (bracelet).
The mobile banking system checks the legality of the intelligent watch (bracelet) through the network access equipment number, namely, inquires whether the equipment has historical information such as user report loss or unbinding, and if the user report loss or unbinding, the intelligent watch (bracelet) is illegal to check. If the verification is legal, comparing network environments of the smart phone and the smart watch (bracelet), and if the access base stations of the smart phone and the smart watch (bracelet) are inconsistent, the user of the smart phone is considered as an illegal user because the network coverage of the 5G micro base station technology is smaller.
If the mobile banking system judges that the smart phone user is an illegal user, the mobile banking system automatically sends verification information to the smart watch (bracelet), and the user confirms whether the transaction is illegal through the smart watch (bracelet).
If the user feedback is non-rule, terminating the transaction, and temporarily freezing the account; if the user feedback is legal, the transaction is continued.
Meanwhile, in order to facilitate users to freeze account funds in time after finding that the smart phone is lost, the users can actively freeze the account temporarily through the smart watch (bracelet).
After the user smart phone is lost, the user account fund safety is timely protected.
The implementation of the above specific application is only an example, and the rest of the embodiments are not described in detail.
Based on the same inventive concept, the embodiment of the invention also provides an account security assurance device, and because the principle of the problem solved by the account security assurance device is similar to that of the account security assurance method, the implementation of the account security assurance device can be referred to the implementation of the account security assurance method, and the repetition is omitted, and the specific structure is shown in fig. 5:
the mobile phone network environment obtaining module 501 is configured to obtain network environment information of the smart phone when the mobile phone bank receives a transaction request of a user sent by the smart phone;
the wearable device network environment obtaining module 502 is configured to obtain network environment information of an intelligent wearable device bound to the smart phone;
the information verification module 503 is configured to compare the network environment information of the smart phone with the network environment information of the smart wearable device, and if it is determined that the 5G access base stations of the smart phone and the smart wearable device are inconsistent, send verification information to the smart wearable device;
and the account freezing module 504 is used for receiving the transaction violation confirmation information fed back by the user and temporarily freezing the account of the user.
In a specific embodiment, as shown in fig. 6, the provided account security protection device further includes, on the basis of fig. 5:
the association relation recording module 601 is configured to:
receiving a network access equipment number of intelligent wearing equipment bound with an intelligent mobile phone, which is uploaded by a mobile phone bank;
and recording the association relation among the network access equipment numbers of the user, the intelligent mobile phone and the intelligent wearable equipment in a bank background system.
In another embodiment, as shown in fig. 7, the account security device provided in the present invention further includes, on the basis of fig. 6:
a storage module 701, configured to:
and storing the association relation among the network access equipment numbers of the user, the intelligent mobile phone and the intelligent wearable equipment into a blockchain network.
The wearable device network environment obtaining module 502 is specifically configured to:
inquiring in a bank background system to obtain the network access equipment number of the intelligent wearable equipment with association relation with the intelligent mobile phone and the user;
and determining network environment information of the intelligent wearable device bound with the smart phone according to the network access device number of the intelligent wearable device with the association relation with the smart phone and the user.
The embodiment of the invention also provides a computer device, and fig. 8 is a schematic diagram of the computer device in the embodiment of the invention, where the computer device can implement all the steps in the account security assurance method in the above embodiment, and the computer device specifically includes the following contents:
a processor (processor) 801, a memory (memory) 802, a communication interface (Communications Interface) 803, and a communication bus 804;
wherein the processor 801, the memory 802, and the communication interface 803 complete communication with each other through the communication bus 804; the communication interface 803 is used for realizing information transmission between related devices;
the processor 801 is configured to invoke a computer program in the memory 802, where the processor executes the computer program to implement the account security method in the foregoing embodiment.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program for executing the account security assurance method.
In summary, the account security assurance method and device provided by the embodiment of the invention have the following advantages:
acquiring network environment information of the smart phone when a mobile phone bank receives a transaction request of a user sent by the smart phone; acquiring network environment information of intelligent wearable equipment bound with an intelligent mobile phone; comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined, sending verification information to the intelligent wearable device; and receiving transaction illegal confirmation information fed back by the user, and temporarily freezing the account of the user. The network coverage of the micro base station technology based on 5G is smaller, network environment information of the smart mobile phone and network environment information of the intelligent wearable equipment are compared, if the network environment information of the smart mobile phone and the network environment information of the intelligent wearable equipment are inconsistent, the smart mobile phone is possibly lost, verification information is further sent to the intelligent wearable equipment, and if a user feeds back a transaction violation, the account of the user is temporarily frozen, so that after the smart mobile phone of the user is lost, the account safety of the user is ensured, and the user loss is reduced.
Although the invention provides method operational steps as described in the examples or flowcharts, more or fewer operational steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. When implemented by an actual device or client product, the instructions may be executed sequentially or in parallel (e.g., in a parallel processor or multi-threaded processing environment) as shown in the embodiments or figures.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, apparatus (system) or computer program product. Accordingly, the present specification embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments. In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The orientation or positional relationship indicated by the terms "upper", "lower", etc. are based on the orientation or positional relationship shown in the drawings, are merely for convenience of description and to simplify the description, and are not indicative or implying that the apparatus or elements in question must have a specific orientation, be constructed and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Unless specifically stated or limited otherwise, the terms "mounted," "connected," and "coupled" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances. It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other. The present invention is not limited to any single aspect, nor to any single embodiment, nor to any combination and/or permutation of these aspects and/or embodiments. Moreover, each aspect and/or embodiment of the invention may be used alone or in combination with one or more other aspects and/or embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.

Claims (6)

1. An account security assurance method, comprising:
when a mobile phone bank receives a transaction request of a user sent by a smart phone, acquiring network environment information of the smart phone;
acquiring network environment information of intelligent wearable equipment bound with the intelligent mobile phone;
comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined, sending verification information to the intelligent wearable device;
receiving transaction illegal confirmation information fed back by a user, and temporarily freezing an account of the user;
wherein the method further comprises:
receiving a network access equipment number of intelligent wearing equipment bound with an intelligent mobile phone, which is uploaded by a mobile phone bank;
recording the association relation among the numbers of the network access devices of the user, the smart phone and the smart wearable device in a bank background system;
the method for acquiring the network environment information of the intelligent wearable device bound with the intelligent mobile phone comprises the following steps:
inquiring in a bank background system to obtain the network access equipment number of the intelligent wearable equipment with association relation with the intelligent mobile phone and the user;
and determining network environment information of the intelligent wearable device bound with the smart phone according to the network access device number of the intelligent wearable device with the association relation with the smart phone and the user.
2. The account security method of claim 1, further comprising:
and storing the association relation among the user, the smart phone and the network access equipment number of the intelligent wearable equipment into a blockchain network.
3. An account security assurance device, comprising:
the mobile phone network environment acquisition module is used for acquiring network environment information of the smart phone when the mobile phone bank receives a transaction request of a user sent by the smart phone;
the wearable device network environment acquisition module is used for acquiring network environment information of the intelligent wearable device bound with the intelligent mobile phone;
the information verification module is used for comparing the network environment information of the smart phone with the network environment information of the intelligent wearable device, and sending verification information to the intelligent wearable device if the fact that the 5G access base stations of the smart phone and the intelligent wearable device are inconsistent is determined;
the account freezing module is used for receiving transaction illegal confirmation information fed back by the user and temporarily freezing the account of the user;
wherein the apparatus further comprises: the association relation recording module is used for:
receiving a network access equipment number of intelligent wearing equipment bound with an intelligent mobile phone, which is uploaded by a mobile phone bank;
recording the association relation among the numbers of the network access devices of the user, the smart phone and the smart wearable device in a bank background system;
the wearable device network environment acquisition module is specifically configured to:
inquiring in a bank background system to obtain the network access equipment number of the intelligent wearable equipment with association relation with the intelligent mobile phone and the user;
and determining network environment information of the intelligent wearable device bound with the smart phone according to the network access device number of the intelligent wearable device with the association relation with the smart phone and the user.
4. The account security assurance device of claim 3, further comprising: a storage module for:
and storing the association relation among the user, the smart phone and the network access equipment number of the intelligent wearable equipment into a blockchain network.
5. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of claim 1 or 2 when executing the computer program.
6. A computer readable storage medium storing a computer program for execution by a processor to implement the account security method of claim 1 or 2.
CN202111060993.8A 2021-09-10 2021-09-10 Account security guarantee method and device Active CN113784355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111060993.8A CN113784355B (en) 2021-09-10 2021-09-10 Account security guarantee method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111060993.8A CN113784355B (en) 2021-09-10 2021-09-10 Account security guarantee method and device

Publications (2)

Publication Number Publication Date
CN113784355A CN113784355A (en) 2021-12-10
CN113784355B true CN113784355B (en) 2024-02-23

Family

ID=78842508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111060993.8A Active CN113784355B (en) 2021-09-10 2021-09-10 Account security guarantee method and device

Country Status (1)

Country Link
CN (1) CN113784355B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424696A (en) * 2013-09-02 2015-03-18 陈业军 Wearable mobile payment equipment and payment method
CN110135835A (en) * 2018-09-29 2019-08-16 广东小天才科技有限公司 Payment information acquisition method based on wearable device and wearable device
CN113259866A (en) * 2021-05-18 2021-08-13 中国银行股份有限公司 Mobile phone bank payment verification method and wearable bracelet

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424696A (en) * 2013-09-02 2015-03-18 陈业军 Wearable mobile payment equipment and payment method
CN110135835A (en) * 2018-09-29 2019-08-16 广东小天才科技有限公司 Payment information acquisition method based on wearable device and wearable device
CN113259866A (en) * 2021-05-18 2021-08-13 中国银行股份有限公司 Mobile phone bank payment verification method and wearable bracelet

Also Published As

Publication number Publication date
CN113784355A (en) 2021-12-10

Similar Documents

Publication Publication Date Title
EP2352252B1 (en) Key distribution method and system
EP2646990B1 (en) Improved method and system for nfc transaction
EP2343852B1 (en) Key distribution method and system
CN105046486A (en) NFC-based mobile payment method and device
CN103699997B (en) A kind of method, apparatus and electronic equipment of locking mobile payment service
KR20110005889A (en) An electronic payment system
CN109155731A (en) The management of password transaction
CN109727008A (en) A kind of data processing method and relevant device based on block chain
US20150363765A1 (en) Method and system for managing a device with a secure element used as a payment terminal
CN102546172A (en) Access control method of intelligent card, intelligent card, terminal and system
CN103839340A (en) Method and system for synchronizing electronic purse information and over-the-air earmarking service platform
CN204614018U (en) A kind of payment system, key terminal and key support system
CN104778579A (en) Induction payment method and device based on electronic identity recognition carrier
CN105931037A (en) Electronic cash transfer method, device and system
CN113205199A (en) Mobile phone bank foreign currency and cash reservation method and device
EP2523485A1 (en) Method and service platform for implementing funds transfer using mobile terminal
CN113784355B (en) Account security guarantee method and device
CN101894334A (en) Payment method, payment system, mobile terminal and payment method and system of mobile terminal
CN104715368A (en) Method, device, system and relevant equipment for logging out electronic wallet
CN103699994B (en) A kind of method and system that space transference is carried out to mobile terminal stored value card
CN103886450A (en) Four-party on-line online shopping payment system and corresponding method
CN105279414A (en) Verification device based on fingerprint application and verification method based on fingerprint application
CN106535082A (en) Method, device and system for processing data
US20220092564A1 (en) Resource configuration methods, apparatuses, and systems
CN104573765A (en) Smart card information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant