CN115271739A - Credit card transaction safety authentication method, device, equipment and storage medium - Google Patents

Credit card transaction safety authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN115271739A
CN115271739A CN202210914848.XA CN202210914848A CN115271739A CN 115271739 A CN115271739 A CN 115271739A CN 202210914848 A CN202210914848 A CN 202210914848A CN 115271739 A CN115271739 A CN 115271739A
Authority
CN
China
Prior art keywords
credit card
transaction
card transaction
image
wavelet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210914848.XA
Other languages
Chinese (zh)
Inventor
王晔然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210914848.XA priority Critical patent/CN115271739A/en
Publication of CN115271739A publication Critical patent/CN115271739A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The specification relates to the technical field of credit card transaction security authentication, and provides a method, a device, equipment and a storage medium for credit card transaction security authentication, wherein the method comprises the following steps: after a credit card transaction request sent by credit card terminal equipment passes through transaction password authentication, extracting one or more specified transaction characteristics of the credit card transaction request; judging whether the specified transaction characteristics are matched with suspicious transaction characteristics in a suspicious transaction characteristic set; if the authentication request is matched with the biometric authentication request, initiating a secondary authentication request based on biometric identification to the credit card terminal equipment; receiving a biological characteristic image returned by the credit card terminal equipment; performing biological feature recognition on the biological feature image to obtain a biological feature recognition result; and confirming whether the credit card transaction request passes secondary authentication according to the biological characteristic identification result. The embodiment of the specification improves the security of credit card transaction.

Description

Credit card transaction safety authentication method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of credit card transaction security authentication technologies, and in particular, to a method, an apparatus, a device, and a storage medium for credit card transaction security authentication.
Background
When the credit card transaction is frequently conducted, the transaction amount is large, or the credit card credit exceeds a fixed credit and needs to apply for adding a temporary credit, in order to improve the transaction security of the credit card, whether the suspicious transaction is operated by the user himself or herself is generally confirmed by means of a short message (such as an authentication code) or a telephone. However, the mobile phone of the credit card user may be lost or stolen, and it is often difficult for the staff of the credit card issuing organization to accurately determine whether the call object is the credit card user from the phone. Therefore, it is still difficult to achieve the purpose of higher security of credit card transactions by the secondary authentication of credit card transactions based on short messages, telephone or other methods.
Disclosure of Invention
An object of the embodiments of the present disclosure is to provide a method, an apparatus, a device and a storage medium for security authentication of credit card transactions, so as to improve the security of credit card transactions.
In order to achieve the above object, in one aspect, an embodiment of the present specification provides a credit card transaction security authentication method, including:
after a credit card transaction request sent by credit card terminal equipment passes through transaction password authentication, extracting one or more specified transaction characteristics of the credit card transaction request;
judging whether the specified transaction characteristics are matched with suspicious transaction characteristics in a suspicious transaction characteristic set;
if the two authentication requests are matched, a secondary authentication request based on biological feature identification is initiated to the credit card terminal equipment;
receiving a biological characteristic image returned by the credit card terminal equipment;
performing biological feature recognition on the biological feature image to obtain a biological feature recognition result;
and confirming whether the credit card transaction request passes the secondary authentication according to the biological characteristic identification result.
In the credit card transaction security authentication method according to the embodiment of the present specification, the biometric image includes a face image; performing biometric identification on the biometric image, including:
positioning each facial feature point in the face image;
segmenting a target image area from the face image by taking the facial feature points as a reference;
normalizing the size and the gray level of the target image area to obtain a normalized target image;
gridding the normalized target image to obtain a gridded target image;
respectively carrying out two-dimensional wavelet transformation on the gridding target image according to a plurality of specified frequencies and directions to obtain a wavelet cluster containing a plurality of wavelets;
taking the wavelet coefficient of each wavelet as a feature vector of a grid point, and taking the feature vectors of all the grid points as human face features;
and matching the face features with the target face features to obtain a face recognition result.
In the credit card transaction security authentication method according to the embodiment of the present specification, the two-dimensional wavelet transform is implemented according to the following formula:
Figure BDA0003775275550000021
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003775275550000022
for the image coordinates at a given location, ψ is the wavelet obtained after transformation,
Figure BDA0003775275550000023
is the center frequency of the jth wavelet filter, σ is the bandwidth of the wavelet filter, k v Is the kernel frequency, k, of the wavelet jx Is the kernel frequency, k, of the jth wavelet filter in the x-direction jy For the j-th wavelet filter in the y-directionThe kernel frequency, μ is the direction of the wavelet filter, a is the number of μ,
Figure BDA0003775275550000024
is an intermediate parameter.
In the method for authenticating credit card transaction security of the embodiment of the present specification, matching the face features with the target face features includes:
matching the facial features with target facial features based on a plurality of different expressions of the same user;
if the facial features of the target face under the different expressions are matched with the facial features of the target face under the different expressions; the face recognition is confirmed to be successful.
In the credit card transaction security authentication method according to the embodiment of the present specification, the facial feature points include: eye center, eyebrow center, nose center, and mouth center.
In the credit card transaction security authentication method according to the embodiment of the present specification, segmenting a target image region from the face image with the facial feature point as a reference includes:
determining the center point of the pupil distance between the center points of the two eyes;
and respectively cutting the first length in the left and right directions, the second length in the upward direction and the third length in the downward direction by taking the pupil distance center point as a reference.
In the credit card transaction security authentication method according to the embodiment of the present specification, the suspicious transaction feature set includes the following suspicious transaction features:
the transaction frequency reaches a frequency threshold value, and the transaction frequency exceeds a specified multiple of the historical transaction frequency mean value;
when the single transaction amount reaches the amount threshold, or the single transaction amount exceeds the fixed amount, a temporary amount needs to be added.
In the credit card transaction security authentication method according to the embodiment of the present specification, the plurality of different expressions include: neutral expressions, happy expressions, sad expressions, angry expressions, fear expressions.
On the other hand, the embodiments of the present specification further provide a credit card transaction security authentication device, including:
the system comprises an extraction module, a transaction password authentication module and a transaction processing module, wherein the extraction module is used for extracting one or more specified transaction characteristics of a credit card transaction request sent by credit card terminal equipment after the credit card transaction request passes the transaction password authentication;
the judging module is used for judging whether the specified transaction characteristics are matched with the suspicious transaction characteristics in the suspicious transaction characteristic set;
the initiating module is used for initiating a secondary authentication request based on biological characteristic identification to the credit card terminal equipment if the two are matched;
the receiving module is used for receiving the biometric image returned by the credit card terminal equipment;
the identification module is used for carrying out biological characteristic identification on the biological characteristic image to obtain a biological characteristic identification result;
and the confirmation module is used for confirming whether the credit card transaction request passes the secondary authentication according to the biological characteristic identification result.
In another aspect, the embodiments of the present specification further provide a computer device, which includes a memory, a processor, and a computer program stored in the memory, and when the computer program is executed by the processor, the computer program executes the instructions of the method.
In another aspect, the present specification further provides a computer storage medium, on which a computer program is stored, and the computer program is executed by a processor of a computer device to execute the instructions of the method.
In another aspect, the present specification further provides a computer program product, which includes a computer program that, when executed by a processor of a computer device, executes the instructions of the method described above.
As can be seen from the technical solutions provided in the embodiments of the present specification, after a credit card transaction request sent by a credit card terminal device passes through transaction password authentication, if the current credit card transaction is a suspicious transaction, the credit card terminal device may initiate a secondary authentication request based on biometric identification. Compared with a secondary authentication mode such as short message or telephone, the secondary authentication based on the biological characteristic identification can obviously improve the security of credit card transaction because the biological characteristic is not easy to forge and lose, and compared with a telephone mode, the secondary authentication based on the biological characteristic identification can not occupy human resources and occupies less time of a user, thereby reducing the cost of the security authentication of the credit card transaction and improving the user experience.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort. In the drawings:
FIG. 1 is a block diagram showing the structure of a credit card transaction system in some embodiments of the present description;
FIG. 2 illustrates a flow diagram of a method for secure authentication of credit card transactions in some embodiments of the present description;
FIG. 3 illustrates a flow diagram of face recognition in a method of secure authentication of credit card transactions in accordance with some embodiments of the present description;
FIG. 4 is a schematic diagram illustrating cropping of a target image region in a credit card transaction security authentication method according to some embodiments of the present description;
fig. 5 is a schematic diagram illustrating a feature vector (representing a human face feature) with wavelet coefficients as grid points in a credit card transaction security authentication method according to some embodiments of the present disclosure;
FIG. 6 shows a block diagram of the structure of a credit card transaction security authentication device in some embodiments of the present description;
FIG. 7 is a block diagram showing the structure of a computer device in some embodiments of the present description.
[ instruction of reference ]
10. A credit card terminal device;
20. a credit card transaction server;
61. an extraction module;
62. a judgment module;
63. an initiating module;
64. a receiving module;
65. an identification module;
66. a confirmation module;
702. a computer device;
704. a processor;
706. a memory;
708. a drive mechanism;
710. an input/output interface;
712. an input device;
714. an output device;
716. a presentation device;
718. a graphical user interface;
720. a network interface;
722. a communication link;
724. a communication bus.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without making any creative effort shall fall within the protection scope of the present specification.
Referring to fig. 1, the credit card transaction system includes a credit card terminal device 10 and a credit card transaction server 20. The credit card terminal device 10 may initiate a credit card transaction request to the credit card transaction server 20; the credit card transaction server 20 may process the credit card transaction request and return a credit card transaction response. In order to improve the security of the credit card transaction, the credit card transaction server 20 may also authenticate the credit card transaction request when receiving the credit card transaction request.
In some embodiments, the credit card terminal device 10 may be a POS machine, a self-service terminal device, a mobile terminal (i.e., a smartphone), a desktop computer, a tablet computer, a laptop computer, a digital assistant, or a smart wearable device, among others. Wherein, wearable equipment of intelligence can include intelligent bracelet, intelligent wrist-watch, intelligent glasses or intelligent helmet etc.. Of course, the user end is not limited to the electronic device with a certain entity, and may also be software running in the electronic device. The credit card transaction server 20 may be an electronic device having arithmetic and network interaction functions; software that runs in the electronic device and provides business logic for data processing and network interaction is also possible.
The embodiment of the present specification provides a credit card transaction security authentication method, which may be applied to the credit card transaction server side described above, and as shown in fig. 2, in some embodiments, the credit card transaction security authentication method may include the following steps:
step 201, after a credit card transaction request sent by a credit card terminal device passes through transaction password authentication, one or more specified transaction characteristics of the credit card transaction request are extracted.
Step 202, determining whether the specified transaction characteristics match with suspicious transaction characteristics in a suspicious transaction characteristic set. If so, go to step 203; otherwise, step 208 is performed.
Step 203, initiating a secondary authentication request based on biological characteristic identification to the credit card terminal device.
And step 204, receiving the biometric image returned by the credit card terminal equipment.
And step 205, performing biological feature identification on the biological feature image to obtain a biological feature identification result.
And step 206, confirming whether the credit card transaction request passes the secondary authentication according to the biological characteristic identification result. If so, go to step 207; otherwise, step 208 is performed.
Step 207, the subsequent processing of the transaction is continued.
And step 208, stopping the transaction, and sending an account risk prompt to the card-opening user terminal.
In the embodiment of the present specification, after the credit card transaction request sent by the credit card terminal device passes the transaction password authentication, if the current credit card transaction is a suspicious transaction, the credit card terminal device may initiate a secondary authentication request based on biometric identification. Compared with the secondary authentication mode such as short message or telephone, the secondary authentication based on the biological characteristic identification can obviously improve the security of credit card transaction because the biological characteristic is not easy to forge and lose, and compared with the telephone mode, the secondary authentication method can not occupy human resources and can save the time of a user, thereby reducing the cost of the security authentication of the credit card transaction and improving the user experience.
When a credit card transaction request is sent by credit card terminal equipment, in order to improve the credit card transaction security, a credit card transaction server initiates a transaction password authentication request to the credit card terminal equipment to request the credit card terminal equipment to provide a transaction password; when the transaction password provided by the credit card terminal equipment is consistent with the transaction password prestored by the credit card transaction server, the credit card transaction request is confirmed to pass the transaction password authentication. After the credit card transaction request sent by the credit card terminal equipment passes the transaction password authentication, the credit card transaction server can also extract one or more appointed transaction characteristics of the credit card transaction request so as to judge whether the credit card transaction is suspicious, and then the corresponding transaction control logic can be executed according to the judgment result. Thus, the credit card transaction security can be further improved.
The suspicious transaction feature set comprises a plurality of suspicious transaction features. For example, in some embodiments, suspicious transaction characteristics may include, for example: the transaction frequency reaches a frequency threshold value, and the transaction frequency exceeds a specified multiple of the historical transaction frequency mean value; the single transaction amount reaches the amount threshold value, or the single transaction amount exceeds the fixed amount and needs to apply for increasing the temporary amount, and the like.
Considering that some credit card users may be frequently engaged in high frequency transactions, if the frequency threshold is reached directly according to the transaction frequency (for example, 5 transactions in one hour, 3 transactions in 10 minutes, etc.), the user may be disturbed excessively, thereby affecting the credit card transaction experience of the user. Researches show that the credit card embezzlement usually has the characteristic of multiple transactions in a short time, and the transaction frequency of the credit card embezzlement generally shows a steep increase trend relative to the historical transaction frequency average value; therefore, the fact that the transaction frequency reaches the frequency threshold and exceeds the specified multiple of the historical transaction frequency mean value is used as the suspicious transaction characteristic is beneficial to accurately identifying the suspicious transaction and can avoid excessively disturbing the user.
The credit card embezzlement has the characteristics of short-time multiple transactions and large single transaction amount. If the amount threshold is set too small, the user may be disturbed too much; however, the fixed amount of the users with different credit levels is different, and for the credit card user with a smaller fixed amount, if the amount threshold is set too large, the situation that the amount threshold is not reached even after the single transaction exceeds the fixed amount may occur. Therefore, considering comprehensively, "the amount of a single transaction reaches an amount threshold (the amount threshold may be 1 ten thousand, for example), or the amount of a single transaction exceeds a fixed amount and requires an application for adding a temporary amount" may be taken as the suspicious transaction feature.
In some embodiments, the specified transaction characteristics refer to transaction characteristics corresponding to a preset set of suspicious transaction characteristics. For example, taking the suspicious transaction characteristics as "the transaction frequency reaches the frequency threshold and the transaction frequency exceeds the specified multiple of the historical transaction frequency mean value", the transaction frequency of the account corresponding to the current credit card transaction may be obtained and respectively reaches the frequency threshold, and the transaction frequency exceeds the historical transaction frequency mean value.
In some embodiments, determining whether the specified transaction characteristics match the suspicious transaction characteristics in the suspicious transaction characteristic set refers to: judging whether the specified transaction characteristics are the same as any one suspicious transaction characteristics in the suspicious transaction characteristic set or not; if the specified transaction characteristics are the same as any one of the suspicious transaction characteristics in the set of suspicious transaction characteristics, the credit card transaction request is considered as a suspicious transaction. If all the specified transaction characteristics of the credit card transaction request (when a plurality of specified transaction characteristics exist) are different from all the suspicious transaction characteristics in the suspicious transaction characteristic set, the credit card transaction request is regarded as a normal transaction.
In some embodiments below, a secondary authentication based on biometric recognition is described by taking face recognition as an example. However, those skilled in the art will appreciate that face recognition is only an exemplary example of biometric recognition, and in other embodiments of the present description, any biometric technology that can uniquely identify a human body, such as fingerprint, voiceprint, iris, human body smell, etc., may be used as desired.
In step 207, the following processing of the continued transaction is: and continuing to execute the transaction processing logic, and returning a credit card transaction response after the transaction is completed so as to facilitate the credit card user terminal to output a transaction result.
The above step 208 is to terminate the transaction, and send an account risk prompt to the card-opening user terminal (for example, a mobile phone of a credit card-opening user), so as to prompt the user to perform a handling process in time, thereby reducing or avoiding the transaction risk.
Referring to fig. 3, in some embodiments, taking face recognition as an example, the biometric recognition of the biometric image may include the following steps:
step 301, positioning each facial feature point in the facial image.
In some embodiments, the facial feature points in the face image may include some or all of an eye center point, an eyebrow center point, a nose center point, a mouth center point, and the like. These facial feature points in the face image can be identified by open Computer vision (openCV) or other techniques.
And step 302, segmenting a target image area from the face image by taking the facial feature points as the reference.
The target image area is segmented from the face image, so that more accurate face features can be acquired, and the calculated amount is reduced.
In some embodiments, segmenting a target image region from the face image based on the facial feature point may include:
(1) And determining the pupil distance central point of the pupil distance between the central points of the two eyes. For example, in an exemplary embodiment, the pupillary distance center point may be shown as the small black circle between the two eyes in figure 4.
(2) And respectively shearing the first length in the left direction and the right direction, shearing the second length in the upward direction and shearing the third length in the downward direction by taking the pupil distance center point as a reference. Wherein the first length, the second length and the third length may be preset. For example, in the exemplary embodiment shown in fig. 4, the first length may be 0.9d, the second length may be 0.55d, and the third length may be 1.45d; wherein d is the interpupillary distance. Of course, in other embodiments, the first length, the second length, and the third length may be adjusted to obtain more accurate facial features due to different facial features of different races.
And 303, normalizing the size and the gray level of the target image area to obtain a normalized target image.
When the face image is collected, the sizes of the collected face images are different because the distance between the face and an image collecting device such as a camera is random; for convenience of subsequent processing, size normalization processing can be carried out on the target image area; i.e. the target image area is adjusted to a preset uniform size.
Through the normalization of the target image area to the gray scale, the image details in the target image area can be clearer, so that the influence of light (or illumination intensity) on the target image area can be reduced.
And 304, gridding the normalized target image to obtain a gridded target image.
By carrying out gridding processing on the normalized target image, the face features represented by the feature vectors of the grid points can be conveniently generated in the subsequent process.
And 305, respectively carrying out two-dimensional wavelet transformation on the gridding target image according to a plurality of specified frequencies and directions to obtain a wavelet cluster containing a plurality of wavelets.
In some embodiments, the gridding target image is subjected to two-dimensional wavelet transform according to the following formula according to a plurality of specified frequencies and directions, respectively, so as to obtain a wavelet cluster containing a plurality of wavelets.
Figure BDA0003775275550000091
Wherein the content of the first and second substances,
Figure BDA0003775275550000092
for the image coordinates at a given location, ψ is the wavelet obtained after transformation,
Figure BDA0003775275550000093
is the center frequency of the jth wavelet filter, σ is the bandwidth of the wavelet filter, k v Is the kernel frequency of the wavelet, and
Figure BDA0003775275550000094
λ v is a wavelet wavelength, k jx For the kernel frequency, k, of the j-th wavelet filter in the x-direction jy The kernel frequency of the jth wavelet filter in the y-direction,
Figure BDA0003775275550000095
for the intermediate parameter, μ is the direction of the wavelet filter, and a is the number of μ (e.g., a may be 4, 6, or 8, etc.). Therefore, the above-mentioned frequencies specified in plural are core frequencies specified in plural, and the above-mentioned directions specified in plural are different directions (for example, x direction, y direction, diagonal direction (y = ± x), etc.) at each core frequency.
In the above formula, in order to eliminate the influence of the dc component of the image on the two-dimensional wavelet transform, the real part of the complex-valued plane wave is subtracted
Figure BDA0003775275550000096
The two-dimensional wavelet transform is not influenced by the absolute value of the image gray scale, thereby further reducing the pairInfluence of illumination change on face feature extraction.
And step 306, taking the wavelet coefficient of each wavelet as a feature vector of a grid point, and taking the feature vectors of all the grid points as the human face features.
By selecting wavelet coefficients of wavelets as feature vectors of grid points and taking the wavelet coefficients as face features, the face features have stronger elasticity or adaptability, and the recognition speed can be increased, so that more accurate face recognition results can be obtained under different expressions. In an exemplary embodiment, the face features characterized by wavelet coefficients based on wavelets as feature vectors of grid points may be as shown in fig. 5.
And 307, matching the face features with the target face features to obtain a face recognition result.
In some embodiments, only one target face feature may be constructed; during recognition, the face features can be matched with the target face features to obtain a face recognition result. Thus, the face recognition speed can be improved, and the authentication time can be shortened. The target face features refer to face features of a card opening user of an account corresponding to a credit card transaction request, and the face features are characterized by using wavelet coefficients based on wavelets as feature vectors of grid points.
In other embodiments, facial features under different expressions (such as neutral, happy, sad, angry, fear and the like) can be constructed for the card-opening user of the credit card, namely a facial feature set is constructed; when the face recognition is carried out, the face features can be matched with target face features based on a plurality of different expressions of the same user; if the facial features are matched with all the target facial features under the different expressions; the face recognition can be considered to be successful; otherwise, the face recognition can be considered to be failed; therefore, the accuracy of face recognition can be improved.
While the process flows described above include operations that occur in a particular order, it should be appreciated that the processes may include more or less operations that are performed sequentially or in parallel (e.g., using parallel processors or a multi-threaded environment).
Corresponding to the above-mentioned credit card transaction security authentication method, embodiments of the present disclosure further provide a credit card transaction security authentication device, which may be configured on the above-mentioned credit card transaction server, as shown in fig. 6, in some embodiments, the credit card transaction security authentication device may include:
the extracting module 61 may be configured to extract one or more specified transaction characteristics of a credit card transaction request sent by a credit card terminal device after the credit card transaction request passes authentication of a transaction password;
a determination module 62, which may be configured to determine whether the specified transaction characteristics match suspicious transaction characteristics in a suspicious transaction characteristics set;
an initiating module 63, configured to initiate a secondary authentication request based on biometric identification to the credit card terminal device if the two terminals are matched;
a receiving module 64, which can be used to receive the biometric image returned by the credit card terminal device;
the identification module 65 may be configured to perform biometric identification on the biometric image to obtain a biometric identification result;
the confirmation module 66 may be configured to confirm whether the credit card transaction request passes the secondary authentication according to the biometric identification result.
In the credit card transaction security authentication apparatus of some embodiments, the biometric image includes a face image; performing biometric recognition on the biometric image, including:
positioning each facial feature point in the face image;
segmenting a target image area from the face image by taking the facial feature points as a reference;
normalizing the size and the gray level of the target image area to obtain a normalized target image;
gridding the normalized target image to obtain a gridded target image;
respectively carrying out two-dimensional wavelet transformation on the gridding target image according to a plurality of specified frequencies and directions to obtain a wavelet cluster containing a plurality of wavelets;
taking the wavelet coefficient of each wavelet as a feature vector of a grid point, and taking the feature vectors of all the grid points as human face features;
and matching the face features with the target face features to obtain a face recognition result.
In the credit card transaction security authentication apparatus of some embodiments, the two-dimensional wavelet transform is implemented according to the following formula:
Figure BDA0003775275550000111
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003775275550000112
for the image coordinates at a given location, ψ is the wavelet obtained after transformation,
Figure BDA0003775275550000113
is the center frequency of the jth wavelet filter, σ is the bandwidth of the wavelet filter, k v Is the kernel frequency, k, of the wavelet jx For the kernel frequency, k, of the j-th wavelet filter in the x-direction jy Is the kernel frequency of the jth wavelet filter in the y-direction, μ is the direction of the wavelet filter, a is the number of μ,
Figure BDA0003775275550000114
is an intermediate parameter.
In the credit card transaction security authentication device according to some embodiments, matching the facial features with the target facial features includes:
matching the facial features with target facial features based on a plurality of different expressions of the same user;
if the facial features of the target face under the different expressions are matched with the facial features of the target face under the different expressions; the face recognition is confirmed to be successful.
In the credit card transaction security authentication apparatus of some embodiments, the facial feature points include: eye center, eyebrow center, nose center, and mouth center.
In the credit card transaction security authentication apparatus according to some embodiments, the segmenting a target image region from the face image with reference to the facial feature point includes:
determining the center point of the interpupillary distance between the center points of the two eyes;
and respectively shearing the first length in the left direction and the right direction, shearing the second length in the upward direction and shearing the third length in the downward direction by taking the pupil distance center point as a reference.
In the credit card transaction security authentication apparatus of some embodiments, the suspicious transaction feature set includes the following suspicious transaction features:
the transaction frequency reaches a frequency threshold value, and the transaction frequency exceeds a specified multiple of the historical transaction frequency mean value;
the single transaction amount reaches the amount threshold value, or the single transaction amount exceeds the fixed amount and needs to apply for increasing the temporary amount.
In the credit card transaction security authentication apparatus of some embodiments, the plurality of different emoticons includes: neutral expression, happy expression, sad expression, angry expression, fear expression.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the various elements may be implemented in the same one or more software and/or hardware implementations of the present description.
It should be noted that, in the embodiments of the present specification, the user information (including, but not limited to, user device information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to are information and data that are authorized by the user and are sufficiently authorized by the parties.
Embodiments of the present description also provide a computer device. As shown in FIG. 7, in some embodiments of the present description, the computer device 702 may include one or more processors 704, such as one or more Central Processing Units (CPUs) or Graphics Processors (GPUs), each of which may implement one or more hardware threads. The computer device 702 may also include any memory 706 for storing any kind of information such as code, settings, data, etc., and in a particular embodiment, a computer program on the memory 706 and executable on the processor 704, which when executed by the processor 704, may perform the instructions of the credit card transaction security authentication method described in any of the above embodiments. For example, and without limitation, the memory 706 can include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any memory may use any technology to store information. Further, any memory may provide volatile or non-volatile retention of information. Further, any memory may represent fixed or removable components of computer device 702. In one case, when the processor 704 executes associated instructions that are stored in any memory or combination of memories, the computer device 702 can perform any of the operations of the associated instructions. The computer device 702 also includes one or more drive mechanisms 708, such as a hard disk drive mechanism, an optical disk drive mechanism, or the like, for interacting with any of the memories.
Computer device 702 can also include input/output interface 710 (I/O) for receiving various inputs (via input device 712) and for providing various outputs (via output device 714). One particular output mechanism may include a presentation device 716 and an associated graphical user interface 718 (GUI). In other embodiments, input/output interface 710 (I/O), input device 712, and output device 714 may not be included, but merely as a computer device in a network. Computer device 702 may also include one or more network interfaces 720 for exchanging data with other devices via one or more communication links 722. One or more communication buses 724 couple the above-described components together.
Communication link 722 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the Internet), a point-to-point connection, etc., or any combination thereof. Communication link 722 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers, etc., as dictated by any protocol or combination of protocols.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), computer-readable storage media, and computer program products of some embodiments of the specification. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processor to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processor, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processor to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processor to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium which can be used to store information that can be accessed by a computer device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the embodiments described herein may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The embodiments of this specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The described embodiments may also be practiced in distributed computing environments where tasks are performed by remote processors that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
It should also be understood that, in the embodiment of the present specification, the term "and/or" is only one kind of association relation describing an associated object, and means that three kinds of relations may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the system embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for relevant points.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of an embodiment of the specification. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Moreover, various embodiments or examples and features of various embodiments or examples described in this specification can be combined and combined by one skilled in the art without being mutually inconsistent.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (12)

1. A credit card transaction security authentication method is characterized by comprising the following steps:
after a credit card transaction request sent by credit card terminal equipment passes through transaction password authentication, extracting one or more specified transaction characteristics of the credit card transaction request;
judging whether the specified transaction characteristics are matched with suspicious transaction characteristics in a suspicious transaction characteristic set;
if the two authentication requests are matched, a secondary authentication request based on biological feature identification is initiated to the credit card terminal equipment;
receiving a biological characteristic image returned by the credit card terminal equipment;
performing biological feature recognition on the biological feature image to obtain a biological feature recognition result;
and confirming whether the credit card transaction request passes secondary authentication according to the biological characteristic identification result.
2. The credit card transaction security authentication method of claim 1, wherein the biometric image comprises a face image; performing biometric recognition on the biometric image, including:
positioning each facial feature point in the face image;
segmenting a target image area from the face image by taking the facial feature points as a reference;
normalizing the size and the gray level of the target image area to obtain a normalized target image;
gridding the normalized target image to obtain a gridded target image;
respectively carrying out two-dimensional wavelet transformation on the gridding target image according to a plurality of specified frequencies and directions to obtain a wavelet cluster containing a plurality of wavelets;
taking the wavelet coefficient of each wavelet as a feature vector of a grid point, and taking the feature vectors of all the grid points as human face features;
and matching the face features with the target face features to obtain a face recognition result.
3. The credit card transaction security authentication method of claim 2, wherein the two-dimensional wavelet transform is implemented according to the following formula:
Figure FDA0003775275540000011
wherein the content of the first and second substances,
Figure FDA0003775275540000012
for the image coordinates at a given location, ψ is the wavelet obtained after transformation,
Figure FDA0003775275540000013
is the center frequency of the jth wavelet filter, σ is the bandwidth of the wavelet filter, k v Is the kernel frequency, k, of the wavelet jx Is the kernel frequency, k, of the jth wavelet filter in the x-direction jy Is the kernel frequency of the jth wavelet filter in the y direction, mu is the direction of the wavelet filter, a is the number of mu,
Figure FDA0003775275540000021
is an intermediate parameter.
4. The credit card transaction security authentication method of claim 3, wherein matching the facial features with target facial features comprises:
matching the facial features with target facial features based on a plurality of different expressions of the same user;
if the facial features are matched with all the target facial features under the different expressions; the face recognition is confirmed to be successful.
5. The credit card transaction security authentication method of claim 2, wherein the facial feature points comprise: eye center, eyebrow center, nose center, and mouth center.
6. The credit card transaction security authentication method of claim 3, wherein the segmenting a target image region from the face image with the facial feature point as a reference comprises:
determining the center point of the pupil distance between the center points of the two eyes;
and respectively cutting the first length in the left and right directions, the second length in the upward direction and the third length in the downward direction by taking the pupil distance center point as a reference.
7. The credit card transaction security authentication method of claim 1, wherein the set of suspicious transaction characteristics includes the following suspicious transaction characteristics:
the transaction frequency reaches a frequency threshold value, and the transaction frequency exceeds a specified multiple of the historical transaction frequency mean value;
when the single transaction amount reaches the amount threshold, or the single transaction amount exceeds the fixed amount, a temporary amount needs to be added.
8. The credit card transaction security authentication method of claim 4, wherein the plurality of different expressions comprises: neutral expressions, happy expressions, sad expressions, angry expressions, fear expressions.
9. A credit card transaction security authentication device, comprising:
the system comprises an extraction module, a transaction password authentication module and a transaction processing module, wherein the extraction module is used for extracting one or more specified transaction characteristics of a credit card transaction request sent by credit card terminal equipment after the credit card transaction request passes the transaction password authentication;
the judging module is used for judging whether the specified transaction characteristics are matched with the suspicious transaction characteristics in the suspicious transaction characteristic set;
the initiating module is used for initiating a secondary authentication request based on biological characteristic identification to the credit card terminal equipment if the two are matched;
the receiving module is used for receiving the biometric image returned by the credit card terminal equipment;
the identification module is used for carrying out biological characteristic identification on the biological characteristic image to obtain a biological characteristic identification result;
and the confirmation module is used for confirming whether the credit card transaction request passes the secondary authentication according to the biological characteristic identification result.
10. A computer device comprising a memory, a processor, and a computer program stored on the memory, wherein the computer program, when executed by the processor, performs the instructions of the method of any one of claims 1-8.
11. A computer storage medium on which a computer program is stored, characterized in that the computer program, when being executed by a processor of a computer device, is adapted to carry out the instructions of the method according to any one of claims 1-8.
12. A computer program product, characterized in that it comprises a computer program which, when being executed by a processor, executes instructions for a method according to any one of claims 1 to 8.
CN202210914848.XA 2022-08-01 2022-08-01 Credit card transaction safety authentication method, device, equipment and storage medium Pending CN115271739A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210914848.XA CN115271739A (en) 2022-08-01 2022-08-01 Credit card transaction safety authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210914848.XA CN115271739A (en) 2022-08-01 2022-08-01 Credit card transaction safety authentication method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115271739A true CN115271739A (en) 2022-11-01

Family

ID=83746695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210914848.XA Pending CN115271739A (en) 2022-08-01 2022-08-01 Credit card transaction safety authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115271739A (en)

Similar Documents

Publication Publication Date Title
US20190251571A1 (en) Transaction verification system
TWI752418B (en) Server, client, user authentication method and system
CN105069622A (en) Face identification payment system facing mobile terminal and face identification payment method facing mobile terminal
CN111754234A (en) Air banking business processing method and device
CN109416734B (en) Adaptive quantization method for iris image coding
CN108491812B (en) Method and device for generating face recognition model
CN110033365A (en) A kind of loan on personal security approval system and method
CN105681324B (en) Internet financial transaction system and method
EP3594879A1 (en) System and method for authenticating transactions from a mobile device
CN113066237B (en) Face living body detection and identification method for automatic teller machine and automatic teller machine
WO2019178753A1 (en) Payment method, device and system
US20230036338A1 (en) Method and apparatus for generating image restoration model, medium and program product
CN112418167A (en) Image clustering method, device, equipment and storage medium
Sabharwal et al. Recognition of surgically altered face images: an empirical analysis on recent advances
CN110599187A (en) Payment method and device based on face recognition, computer equipment and storage medium
CN110619281A (en) Identity recognition method and device
CN116778562B (en) Face verification method, device, electronic equipment and readable storage medium
CN111126229A (en) Data processing method and device
CN115271739A (en) Credit card transaction safety authentication method, device, equipment and storage medium
TWM592131U (en) Characteristic encoding system and internet bank service system applying the same
CN115481381A (en) Testimony comparison method, device and medium for self-service terminal
US10438061B2 (en) Adaptive quantization method for iris image encoding
CN113194421B (en) Debit card degradation processing method and system based on 5G message and relevant terminals
CN115761833B (en) Face recognition method, electronic equipment and medium
CN114821707A (en) Service processing method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination