CN114841708A - Information verification method, device, equipment and medium based on distributed interactive system - Google Patents

Information verification method, device, equipment and medium based on distributed interactive system Download PDF

Info

Publication number
CN114841708A
CN114841708A CN202210521828.6A CN202210521828A CN114841708A CN 114841708 A CN114841708 A CN 114841708A CN 202210521828 A CN202210521828 A CN 202210521828A CN 114841708 A CN114841708 A CN 114841708A
Authority
CN
China
Prior art keywords
length
current user
user information
verification
transaction operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210521828.6A
Other languages
Chinese (zh)
Inventor
王鹏培
杜楠
顾欣
唐月标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210521828.6A priority Critical patent/CN114841708A/en
Publication of CN114841708A publication Critical patent/CN114841708A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems

Abstract

The application provides an information verification method, device, equipment and medium based on a distributed interactive system, and can be applied to the financial field. The method comprises the following steps: acquiring a transaction operation request of a current user, wherein the transaction operation request comprises current user information and transaction operation to be processed; in response to the transaction operation request, calling a unified verification interface to verify the current user information, wherein the unified verification interface is used for verifying user information related to various transaction operations; and if the current user information is confirmed to pass the verification, calling a service logic processing layer to process the transaction operation to be processed so as to complete the transaction operation. The method can make the magnitude of the distributed interactive system lighter and simpler, and reduce the development difficulty in the development process.

Description

Information verification method, device, equipment and medium based on distributed interactive system
Technical Field
The present application relates to a distributed interactive system technology, and in particular, to an information verification method, apparatus, device, and medium based on a distributed interactive system.
Background
With the development of the distributed interactive system technology, in order to adapt to the development of network transactions, an information verification method based on the distributed interactive system of each financial institution appears.
At present, the network transaction mode is mainly as follows: the user and the merchant bind the bank card with the third party mechanism, so that the user can carry out network transaction with the merchant through the shopping APP. In the network transaction mode, due to different transaction message data structures of different third-party mechanisms, each bank respectively constructs an adaptive distributed interaction system and a corresponding verification mechanism for different third-party mechanisms.
However, in the distributed interactive system in the online shopping mode, due to differences in field names and transaction messages, for each third-party organization, the financial institution server usually needs to develop a dedicated verification interface for each transaction operation to complete verification of the transaction operation, so that the magnitude of the distributed interactive system is not light and simple enough, and the development difficulty in the development process is increased.
Disclosure of Invention
The application provides an information verification method, device, equipment and medium based on a distributed interactive system, which are used for solving the problems that the magnitude of the distributed interactive system is not light and simple enough and the development difficulty in the development process is increased in the prior art.
In a first aspect, the present application provides an information checking method based on a distributed interactive system, applied to a financial institution server, including:
acquiring a transaction operation request of a current user, wherein the transaction operation request comprises current user information and transaction operation to be processed;
in response to the transaction operation request, calling a unified verification interface to verify the current user information, wherein the unified verification interface is used for verifying user information related to various transaction operations;
and if the current user information is confirmed to pass the verification, calling a service logic processing layer to process the transaction operation to be processed so as to complete the transaction operation.
In a second aspect, the present application provides an information checking apparatus based on a distributed interactive system, including:
the request acquisition module is used for acquiring a transaction operation request of a current user, wherein the transaction operation request comprises current user information and transaction operation to be processed;
the information checking module is used for responding to the transaction operation request and calling a unified checking interface to check the current user information, and the unified checking interface is used for checking the user information related to various transaction operations;
and the operation execution module is used for calling a business logic processing layer to process the transaction operation to be processed to complete the transaction operation if the current user information is determined to pass the verification.
In a third aspect, the present application provides a financial institution server, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory to implement the method of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon computer-executable instructions for implementing the method of the first aspect when executed by a processor.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of the first aspect.
According to the information verification method, the information verification device, the information verification equipment and the information verification medium based on the distributed interactive system, a transaction operation request of a current user is obtained, and the transaction operation request comprises current user information and transaction operation to be processed; in response to the transaction operation request, calling a unified verification interface to verify the current user information, wherein the unified verification interface is used for verifying user information related to various transaction operations; and if the current user information is confirmed to pass the verification, calling a service logic processing layer to process the transaction operation to be processed so as to complete the transaction operation. The unified verification interface is used for verifying user information related to various transaction operations, namely common user information. For the transaction operation requests corresponding to various transaction operations, the common user information in the current user information is called to be processed by the unified processing interface, so that the magnitude of the distributed interactive system is lighter and simpler, a logical link for executing verification is not required to be developed for each transaction operation during development, and the difficulty of the development process can be reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is an application scenario diagram for implementing an information verification method based on a distributed interactive system according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating an implementation of an information verification method based on a distributed interactive system according to an embodiment of the present application;
fig. 3 is a schematic flowchart illustrating an implementation of an information checking method based on a distributed interactive system according to another embodiment of the present application;
FIG. 4 is a schematic structural diagram of an information verification method implemented based on a distributed interactive system according to the present application;
FIG. 5 is a schematic structural diagram of a financial institution server used for implementing the information verification method based on the distributed interactive system;
fig. 6 is a block diagram of a server implementing the information verification method based on the distributed interactive system according to the embodiment of the present invention.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terms referred to in this application are explained first:
a distributed interactive system: the method is a basic component framework established on a network and comprises an access layer and a service logic layer, wherein the access layer acquires data, and the service logic layer performs service logic processing on the data.
For a clear understanding of the technical solutions of the present application, a detailed description of the prior art solutions is first provided.
In the traditional mode, the network transaction mode is mainly as follows: the user and the merchant bind the bank card with the third party mechanism, so that the user can carry out network transaction with the merchant through the shopping APP. In the network transaction mode, due to different transaction message data structures of different third-party mechanisms, each bank respectively constructs an adaptive distributed interaction system and a corresponding verification mechanism for different third-party mechanisms. However, in the distributed interactive system in the online shopping mode, due to differences in field names and transaction messages, for each third-party organization, the financial institution server usually needs to develop a dedicated verification interface for each transaction operation to complete verification of the transaction operation, so that the magnitude of the distributed interactive system is not light and simple enough, and the development difficulty in the development process is increased.
Therefore, in the face of the technical problems in the prior art, the inventor finds, through creative research, that the development difficulty of the development process is reduced in order to make the magnitude of the distributed interactive system as light and simple as possible. When the transaction operation request of the current user is acquired, the unified verification interface is called to verify the information of the current user, and when the information of the current user passes the verification, the business logic processing layer is called to perform subsequent processing on the transaction operation to be processed, so that the transaction operation is completed. The unified verification interface is used for verifying user information related to various transaction operations, namely common user information. For the transaction operation requests corresponding to various transaction operations, the common user information in the current user information is called to be processed by the unified processing interface, so that the magnitude of the distributed interactive system is lighter and simpler, a logical link for executing verification is not required to be developed for each transaction operation during development, and the difficulty of the development process can be reduced.
As shown in fig. 1, an application scenario of the information verification method based on the distributed interactive system according to the embodiment of the present application includes, in a corresponding network architecture in the application scenario, a financial institution server 20 and a user terminal 10, where the user terminal 10 is in communication connection with the financial institution server 20. The user terminal 10 is installed with a financial institution mall through which the user can perform network transactions, the financial institution mall corresponds to two different financial institutions with the financial institution server 20, for example, the financial institution mall may correspond to a bank mall of bank a, and the financial institution server 20 may correspond to a server of bank B. When a user carries out network transaction through a financial institution mall, the financial institution server 20 firstly obtains a transaction operation request of the user, determines user information and transaction operation to be processed, then calls a uniform verification interface of a distributed interaction system to verify the current user information, and then calls a business logic processing layer to continue processing the transaction operation to be processed, thereby completing the transaction operation to be processed, and when the transaction operation to be processed is completed, the transaction operation can be returned to the user terminal 10 in an instruction form to inform the user.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a diagram illustrating an information verification method based on a distributed interactive system according to an embodiment of the present application, and as shown in fig. 2, an execution subject of the information verification method based on the distributed interactive system according to the present embodiment is a financial institution server. The information verification method based on the distributed interactive system provided by this embodiment includes the following steps:
step 101, a transaction operation request of a current user is obtained, wherein the transaction operation request comprises current user information and transaction operation to be processed.
The transaction operation request of the user is a request instruction sent to the financial institution server when the user terminal monitors that the user performs transaction operation in a mall of the financial institution. The current user information refers to information related to the user identity, including name, age, and the like. The pending transaction operation is the transaction operation that the user currently needs to process.
Specifically, the financial institution server may determine a pending transaction operation from a transaction type field in the transaction operation request in response to the transaction operation request.
And 102, responding to the transaction operation request, and calling a unified verification interface to verify the current user information, wherein the unified verification interface is used for verifying user information related to various transaction operations.
The unified verification interface is used for verifying user information related to various transaction operations, namely common user information. For different kinds of transaction operations, besides common user information to be verified, there are also non-common user information to be verified. And verifying the common user information through the unified verification interface, and verifying the non-common user information at the service logic processing layer by calling the service logic layer processing layer.
Specifically, when the unified verification interface is called to verify the current user information in response to the transaction operation request, the unified verification interface is called to verify the shared user information in the current user information, and partial information which does not belong to the shared user information in the current user information is verified in the service logic processing layer.
Step 103, if it is determined that the current user information passes the verification, a service logic processing layer is called to process the transaction operation to be processed so as to complete the transaction operation.
The business logic processing layer is a logic operation layer of the distributed interactive system and mainly performs calculation processing on transaction operation. And if the current user information is confirmed to pass the verification, calling a business logic processing layer to perform logic operation processing on the transaction operation to be processed so as to complete the transaction operation.
According to the information verification method based on the distributed interactive system, a transaction operation request of a current user is obtained, wherein the transaction operation request comprises current user information and transaction operation to be processed; in response to the transaction operation request, calling a unified verification interface to verify the current user information, wherein the unified verification interface is used for verifying user information related to various transaction operations; and if the current user information is confirmed to pass the verification, calling a service logic processing layer to process the transaction operation to be processed so as to complete the transaction operation. The unified verification interface is used for verifying user information related to various transaction operations, namely common user information. For the transaction operation requests corresponding to various transaction operations, the common user information in the current user information is called to be processed by the unified processing interface, so that the magnitude of the distributed interactive system is lighter and simpler, a logical link for executing verification is not required to be developed for each transaction operation during development, and the difficulty of the development process can be reduced.
As an optional implementation manner, the current user information includes a mobile phone number and an identification number, as shown in fig. 3, step 102 includes the following steps:
step 201, calling a unified verification interface to verify the length of the mobile phone number and the length of the identity card number.
Wherein, the length of the standard machine number and the length of the identification number are stored in the financial institution server in advance. The checking specifically comprises the steps of judging whether the length of the mobile phone number meets the length of a standard phone number or not, and whether the length of the identity card number meets the length of the standard identity card number or not.
Specifically, when a user initiates a transaction operation request, the user inputs the mobile phone number and the identity card number at the user terminal, and the unified verification interface is called to verify the mobile phone number and the identity card number input at the user terminal by the user.
Step 202, judging whether the length of the mobile phone number meets the length of the standard phone number or not and whether the length of the identity card number meets the length of the standard card number or not. And if the length of the mobile phone number accords with the length of a standard phone number and the length of the identity card number accords with the length of the standard card number, executing step 203, and determining that the current user information passes the verification.
Specifically, only if the mobile phone number and the identification number of the current user pass the verification, the information of the current user can pass the verification.
And if the length of the mobile phone number is determined to be not in accordance with the length of the standard phone number and/or the length of the identity card number is determined to be not in accordance with the length of the standard card number, executing step 204, and determining that the current user information is not verified.
Specifically, if only one or both of the current user mobile phone number and the identity card number fail to be verified, it is determined that the current user information cannot pass the verification.
In the information verification method based on the distributed interactive system, the length of the mobile phone number and the length of the identity card number are verified by calling a uniform verification interface; if the length of the mobile phone number accords with the length of a standard phone number and the length of the identity card number accords with the length of a standard card number, determining that the current user information passes verification; and if the length of the mobile phone number is determined to be not in accordance with the length of the standard phone number and/or the length of the identity card number is determined to be not in accordance with the length of the standard card number, determining that the current user information is not verified. The length of the mobile phone number and the length of the identity card number are verified, and the safety of transaction operation can be ensured.
As an optional implementation manner, if the length of the mobile phone number does not meet the standard number length, determining that the mobile phone number is input incorrectly, and sending out prompt information of the current user about the input error of the mobile phone number.
And if the length of the mobile phone number does not accord with the standard mobile phone number length, determining that the mobile phone number of the user is input wrongly, and sending a mobile phone number input mistake prompt message to the current user. The prompt information may be preset, for example, "the length of the mobile phone number should be 11 digits", "the length of the mobile phone number is less than 11 digits, please re-input" or "please input the correct mobile phone number", etc.
In the information verification method based on the distributed interactive system, if the length of the mobile phone number does not meet the standard mobile phone number length, it is determined that the mobile phone number is in error, and prompt information indicating that the mobile phone number of the current user is in error is sent out. When the mobile phone number is input in an omission mode, the current user can know the problem in time and input the correct mobile phone number by sending the prompt information.
As an optional implementation manner, if the length of the identification number does not conform to the length of the standard identification number, determining that the identification number is input incorrectly, and sending out prompt information of incorrect input of the identification number of the current user.
If the length of the identity card number does not accord with the standard machine number length, the input error of the user identity card number is determined, and the prompt information of the input error of the identity card number is sent to the current user. The prompt message may be preset, such as "the identification number should be 18 bits long", "the identification number is less than 18 bits long, please re-input" or "please input the correct identification number".
In the information verification method based on the distributed interactive system, if the length of the identification number does not meet the length of the standard identification number, it is determined that the identification number is input incorrectly, and prompt information of incorrect input of the identification number of the current user is sent. When the identity card number is input in an neglected mode, the current user can know the problem in time and input the correct identity card number by sending the prompt message.
As an optional implementation manner, if the type of the transaction operation to be processed is an accounting transaction operation, the current user information further includes a subscription agreement number, and step 102 further includes:
step 301, calling the unified verification interface to verify the signing protocol number.
Wherein, when the current user signs a contract with the financial institution, a user protocol number is generated. The user protocol number is generated and stored in a financial institution server, and the unique user can be determined according to the user protocol number, the signing mobile phone number, the user identity card number and the like.
Specifically, the check is to determine whether the subscription agreement number is consistent with a pre-stored user agreement number. The type of pending transaction operation is an accounting type transaction operation, meaning that the pending transaction operation relates to a financial transaction, such as a payment.
Step 302, if the contract agreement number is determined to be consistent with the pre-stored user agreement number, the length of the mobile phone number is in accordance with the length of the standard phone number, and the length of the identity card number is in accordance with the length of the standard card number, it is determined that the current user information passes the verification.
Specifically, if the contract agreement number is consistent with the user agreement number and the length of the mobile phone number and the length of the identity card number are input normally, it is determined that the current user information passes the verification.
In the information verification method based on the distributed interactive system, the unified verification interface is called to verify the subscription protocol number; and if the contract signing protocol number is consistent with the pre-stored user protocol number, the length of the mobile phone number is in accordance with the length of the standard phone number, and the length of the identity card number is in accordance with the length of the standard certificate number, determining that the current user information passes the verification. When the type of the transaction operation to be processed is the accounting transaction operation, the contract agreement number is transacted, so that the safety of the accounting transaction operation can be improved.
As an optional implementation manner, before the step 102, a step 401 is further included, according to a correspondence between the category of the user information and the verification policy in a pre-stored verification policy table, to determine the verification policy corresponding to the current user information. And 102, invoking a unified verification interface to verify the current user information, specifically, invoking the unified verification interface to verify the current user information according to a verification strategy corresponding to the current user information.
The storage content of the verification policy table comprises the corresponding relation between the category of the user information and the verification policy. The obtaining of the check policy table specifically includes: the financial institution server acquires various types of transaction operations and analyzes the service types; determining a corresponding verification policy for the user information involved in various transaction operations. And storing the verification strategy table in the financial institution server after the verification strategy table is obtained.
Specifically, a corresponding verification strategy is determined according to current user information, and during verification, the unified verification interface is called to verify the current user information according to the verification strategy corresponding to the current user information. For example, when the non-accounting transaction operation is performed, the verification strategy comprises the verification of a signing agreement number; when the transaction operation is an account transaction operation, the verification strategy comprises the length verification of the input of the mobile phone number and the identification number.
In the information verification method based on the distributed interactive system, according to a correspondence between the category of the user information and the verification policy in a pre-stored verification policy table, a verification policy corresponding to the current user information is determined; and calling a unified verification interface to verify the current user information, wherein the step of calling the unified verification interface to verify the current user information comprises calling the unified verification interface according to a verification strategy corresponding to the current user information. By determining the verification strategy corresponding to the current user information, verification can be performed more specifically when the unified verification interface is called for processing.
Fig. 4 is a schematic structural diagram of an information verification apparatus 40 based on a distributed interactive system according to an embodiment of the present application, and as shown in fig. 4, the information verification apparatus 40 based on a distributed interactive system according to the present embodiment is located in a financial institution server, and the information verification apparatus 40 based on a distributed interactive system according to the present embodiment includes: a request acquisition module 41, an information verification module 42 and an operation execution module 43.
The request obtaining module 41 is configured to obtain a transaction operation request of a current user, where the transaction operation request includes current user information and a transaction operation to be processed. And the information checking module 42 is configured to respond to the transaction operation request, and invoke a unified checking interface to check the current user information, where the unified checking interface is used to check user information related to various transaction operations. And the operation executing module 43 is configured to, if it is determined that the current user information passes the verification, invoke a service logic processing layer to process the transaction operation to be processed, so as to complete the transaction operation.
Optionally, the information checking module 42 includes a number checking module, and is specifically configured to: calling a unified verification interface to verify the length of the mobile phone number and the length of the identity card number; if the length of the mobile phone number accords with the length of a standard phone number and the length of the identity card number accords with the length of a standard card number, determining that the current user information passes verification; and if the length of the mobile phone number is determined to be not in accordance with the length of the standard phone number and/or the length of the identity card number is determined to be not in accordance with the length of the standard card number, determining that the current user information is not verified.
Optionally, the number verification module is further specifically configured to: and if the length of the mobile phone number does not accord with the standard mobile phone number length, determining that the mobile phone number is input wrongly, and sending prompt information of the current user mobile phone number input mistake.
Optionally, the number verification module is further specifically configured to: and if the length of the identity card number does not accord with the length of the standard identity card number, determining that the identity card number is input wrongly, and sending prompt information of the current user identity card number input mistake.
Optionally, if the type of the operation to be processed is an accounting transaction operation, the current user information further includes a subscription agreement number, and the information verification module 42 is further specifically configured to: calling the unified verification interface to verify the signing protocol number; and if the contract agreement number is consistent with the pre-stored user agreement number, the length of the mobile phone number is in accordance with the length of the standard phone number, and the length of the identity card number is in accordance with the length of the standard card number, determining that the current user information passes the verification.
Optionally, the information verification apparatus based on the distributed interactive system further includes a verification policy determining apparatus, which is specifically configured to: and determining a verification strategy corresponding to the current user information according to the corresponding relation between the category of the user information and the verification strategy in a pre-stored verification strategy table.
Optionally, the information checking module 42, when invoking the unified checking interface to check the current user information, is specifically configured to: and calling the unified verification interface to verify the current user information according to a verification strategy corresponding to the current user information.
Fig. 5 is a block diagram illustrating a financial institution server according to an exemplary embodiment, and the apparatus may be the financial institution server shown in fig. 5, including: a memory 51, a processor 52; memory 51 is a memory for storing processor-executable instructions; the processor 52 is configured to execute a computer program or instructions to implement the method for monitoring the connection status of the internet of things provided in any one of the above embodiments.
The memory 51 stores programs. In particular, the program may include program code including computer operating instructions. The memory 51 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The processor 52 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement the embodiments of the present disclosure.
Alternatively, in a specific implementation, if the memory 51 and the processor 52 are implemented independently, the memory 51 and the processor 52 may be connected to each other through a bus 53 and perform communication with each other. The bus 53 may be an Industry Standard Architecture (ISA) bus 53, a Peripheral Component Interconnect (PCI) bus 53, an Extended ISA (EISA) bus 53, or the like. The bus 53 may be divided into an address bus 53, a data bus 53, a control bus 53, and the like. For ease of illustration, only one thick line is shown in fig. 5, but does not indicate only one bus 53 or one type of bus 53.
Alternatively, in a specific implementation, if the memory 51 and the processor 52 are integrated on a chip, the memory 51 and the processor 52 may complete the same communication through an internal interface.
Fig. 6 is a block diagram of a server for implementing the information verification method based on the distributed interactive system according to the embodiment of the present invention, and as shown in fig. 6, the server provided in this embodiment is a financial institution server.
The server 600 may include one or more of the following components: processing component 601, memory 602, power component 603, input/output (I/O) interface 604, and communication component 605.
The processing component 601 generally controls overall operation of the server 600, such as operations associated with data communications. The processing component 601 may include one or more processors 620 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 601 may include one or more modules that facilitate interaction between the processing component 601 and other components.
The memory 602 is configured to store various types of data to support operations at the server 600. Examples of such data include instructions for any application or method operating on server 600, and so forth. The memory 602 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power component 603 provides power to the various components of the server 600. The power components 603 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the server 600.
The I/O interface 604 provides an interface between the processing component 601 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Communications component 605 is configured to facilitate communications between server 600 and other devices in a wired or wireless manner. The server 600 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 605 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 605 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the server 600 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
A non-transitory computer readable storage medium, wherein instructions of the storage medium, when executed by a processor of a financial institution server, enable the financial institution server to perform a distributed interactive system-based information verification method of the financial institution server.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (12)

1. An information verification method based on a distributed interactive system is applied to a financial institution server, and is characterized in that the method comprises the following steps:
acquiring a transaction operation request of a current user, wherein the transaction operation request comprises current user information and transaction operation to be processed;
in response to the transaction operation request, calling a unified verification interface to verify the current user information, wherein the unified verification interface is used for verifying user information related to various transaction operations;
and if the current user information is confirmed to pass the verification, calling a service logic processing layer to process the transaction operation to be processed so as to complete the transaction operation.
2. The method of claim 1, wherein the current user information comprises a mobile phone number and an identification number, and invoking a unified verification interface to verify the current user information comprises:
calling a unified verification interface to verify the length of the mobile phone number and the length of the identity card number;
if the length of the mobile phone number accords with the length of a standard phone number and the length of the identity card number accords with the length of a standard card number, determining that the current user information passes verification;
and if the length of the mobile phone number is determined to be not in accordance with the length of the standard phone number and/or the length of the identity card number is determined to be not in accordance with the length of the standard card number, determining that the current user information is not verified.
3. The method of claim 2, further comprising:
and if the length of the mobile phone number does not accord with the standard mobile phone number length, determining that the mobile phone number is input wrongly, and sending prompt information of the current user mobile phone number input mistake.
4. The method of claim 2, further comprising:
and if the length of the identity card number does not accord with the length of the standard identity card number, determining that the identity card number is input wrongly, and sending prompt information of the current user identity card number input mistake.
5. The method of claim 2, wherein if the type of the transaction operation to be processed is an accounting transaction operation, the current user information further includes a contract agreement number, and the invoking the unified verification interface to verify the current user information further comprises:
calling the unified verification interface to verify the signing protocol number;
and if the contract agreement number is consistent with the pre-stored user agreement number, the length of the mobile phone number is in accordance with the length of the standard phone number, and the length of the identity card number is in accordance with the length of the standard card number, determining that the current user information passes the verification.
6. The method according to any one of claims 1-5, wherein before said invoking a unified verification interface to verify said current user information in response to said transaction operation request, further comprises:
determining a verification strategy corresponding to the current user information according to a corresponding relation between the category of the user information and the verification strategy in a pre-stored verification strategy table;
the calling of the unified verification interface to verify the current user information comprises the following steps:
and calling the unified verification interface to verify the current user information according to a verification strategy corresponding to the current user information.
7. An information verification apparatus based on a distributed interactive system, the apparatus comprising:
the request acquisition module is used for acquiring a transaction operation request of a current user, wherein the transaction operation request comprises current user information and transaction operation to be processed;
the information checking module is used for responding to the transaction operation request and calling a unified checking interface to check the current user information, and the unified checking interface is used for checking the user information related to various transaction operations;
and the operation execution module is used for calling a business logic processing layer to process the transaction operation to be processed to complete the transaction operation if the current user information is determined to pass the verification.
8. The device of claim 7, wherein the information checking module comprises a number checking module for calling a unified checking interface to check the length of the mobile phone number and the length of the identification number; if the length of the mobile phone number accords with the length of a standard phone number and the length of the identity card number accords with the length of a standard card number, determining that the current user information passes verification; and if the length of the mobile phone number is determined to be not in accordance with the length of the standard phone number and/or the length of the identity card number is determined to be not in accordance with the length of the standard card number, determining that the current user information is not verified.
9. The device according to claim 7 or 8, wherein the number verification module is further configured to determine that the mobile phone number is incorrectly input and send a prompt message indicating that the mobile phone number of the current user is incorrectly input if the length of the mobile phone number does not conform to the standard length of the mobile phone number.
10. A financial institution server, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory to implement the method of any of claims 1-6.
11. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, perform the method of any one of claims 1-6.
12. A computer program product comprising a computer program which, when executed by a processor, implements the method of any one of claims 1-6.
CN202210521828.6A 2022-05-13 2022-05-13 Information verification method, device, equipment and medium based on distributed interactive system Pending CN114841708A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210521828.6A CN114841708A (en) 2022-05-13 2022-05-13 Information verification method, device, equipment and medium based on distributed interactive system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210521828.6A CN114841708A (en) 2022-05-13 2022-05-13 Information verification method, device, equipment and medium based on distributed interactive system

Publications (1)

Publication Number Publication Date
CN114841708A true CN114841708A (en) 2022-08-02

Family

ID=82569926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210521828.6A Pending CN114841708A (en) 2022-05-13 2022-05-13 Information verification method, device, equipment and medium based on distributed interactive system

Country Status (1)

Country Link
CN (1) CN114841708A (en)

Similar Documents

Publication Publication Date Title
EP3079326B1 (en) Network payment method, apparatus and system
CA2933021C (en) Systems, apparatus and methods for improved authentication
US20150254672A1 (en) Processing authorization requests
US20140052638A1 (en) Method and system for providing a card payment service using a mobile phone number
US10896415B2 (en) System for executing a computer process for processing a transaction, and related computer process
WO2021253185A1 (en) Aggregate payment method and related products
CN109933626B (en) Financial business data processing method and device and financial transaction terminal
US20210125285A1 (en) Method, device, storage medium and terminal for modifying account name
KR20180114549A (en) Financial transaction management system, method, storage medium and server
CN111552942B (en) Identity authentication method, system, device and computer storage medium
US20150178726A1 (en) System and method for mobile payment authentication
CN111510908B (en) Card opening method, device, equipment and medium
CN108537535B (en) Mobile terminal based on mobile phone shield and mobile phone shield management method
WO2024016619A1 (en) Payment method, apparatus and system based on 5g messaging application, and device and medium
WO2024016634A1 (en) Smart routing-based remote payment method and apparatus, terminal, system, and medium
CN114841708A (en) Information verification method, device, equipment and medium based on distributed interactive system
CN111049916A (en) Control method, control device, proxy server and storage medium
US20180349885A1 (en) Mobile device, method, computer program product and issuance system for configuring ticket co-branded credit card based on tokenization technology
CN111144977B (en) Stock order processing method and device
CN108573446B (en) Bank card authentication method, device, equipment and readable storage medium
CN109327814B (en) Short message processing method and device, electronic equipment and readable storage medium
CN114169895A (en) Payment information processing system, method, device, medium, product and equipment
CN113904774A (en) Block chain address authentication method and device and computer equipment
TWM587315U (en) Electronic payment service system and credit card service system
TWI832344B (en) Review trading system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination