Disclosure of Invention
The application provides a fund transaction clearing method and a fund transaction clearing system, which are used for identifying the authenticity of access in a multi-party participation and dynamic verification mode so as to improve the safety in fund clearing.
The above object of the present application is achieved by the following technical solutions:
in a first aspect, the present application provides a fund transaction clearing method, comprising:
responding to the obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
performing a clearing after verifying the identity of the requesting end;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
In a possible implementation manner of the first aspect, the number of the verification terminals is multiple;
in the identity authentication process, the clearing result sent by the request end every time points to different authentication ends.
In a possible implementation manner of the first aspect, the total number of verification ends is M, the number of verification ends participating in an authentication process is N, and 1-N-M-s are constructed;
the verification end participating in the identity verification process each time is randomly selected from all verification ends.
In a possible implementation manner of the first aspect, the clearing result received by the verifying end participating in the identity verification process includes zero, one, and multiple;
in time series, any two adjacent clearing results are respectively sent to two verification ends.
In a possible implementation manner of the first aspect, when the verification end is selected, the pointing address is obtained after the current time is input into the specified calculation model, and the pointing address points to a certain verification end.
In a possible implementation manner of the first aspect, the verifying end includes an open state and a rejection state;
in the process of one-time verification, two or more verification ends are in an open state.
In a possible implementation manner of the first aspect, at least one verifying terminal is in a rejected state.
In a second aspect, the present application provides a fund transaction clearing device comprising:
the first processing unit is used for responding to the acquired clearing request, analyzing the content in the clearing request and obtaining an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for executing clearing after the identity of the request end is verified.
In a third aspect, the present application provides a fund transaction clearing system, comprising:
one or more memories for storing instructions; and
one or more processors configured to invoke and execute the instructions from the memory to perform the method according to the first aspect and any possible implementation manner of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium comprising:
a program for performing a method as described in the first aspect and any possible implementation manner of the first aspect when the program is run by a processor.
In a fifth aspect, the present application provides a computer program product comprising program instructions for executing the method according to the first aspect and any possible implementation manner of the first aspect when the program instructions are executed by a computing device.
In a sixth aspect, the present application provides a system on a chip comprising a processor configured to perform the functions recited in the above aspects, such as generating, receiving, sending, or processing data and/or information recited in the above methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices, connected in a wired or wireless manner, or coupled to the same device.
Detailed Description
The technical solution of the present application is further described in detail below with reference to the accompanying drawings.
Referring to fig. 1, the fund transaction clearing method disclosed in the present application is applied to a fund platform, and the fund platform is composed of a request end, a verification end, a clearing platform and the like, wherein the request end faces a user, the clearing platform is used for clearing according to a request of the request end, and the verification end is used for verifying the request end in cooperation with the clearing platform.
The number of the request ends is multiple, each request end faces a fixed user, and the users can carry out services such as fund learning, inquiring and purchasing through the request ends belonging to the users. The clearing platform is used for clearing according to a clearing request sent by the request end.
Here, the clearing platform may face a plurality of requesters, or it may be understood that the clearing platform is a platform with a certain open function, which is used for clearing computation. For example, if each fund is provided with clearing resources (statically configured), more clearing resources need to be prepared and cannot be scheduled. However, after the clearing platform is used, the clearing platform can perform dynamic scheduling of clearing resources according to actual use requirements.
For example, the total amount of the liquidation resources that can be scheduled by the liquidation platform is one hundred, and liquidation resources of an appropriate size can be collected for fund liquidation aiming at liquidation requests sent by different request terminals, and after the liquidation requests of one request terminal are completed, the liquidation resources can be configured for liquidation requests sent by other request terminals.
It is apparent that dynamic clearing resource scheduling can meet larger scale usage requirements with a smaller number of clearing resources. However, the fund platform with the architecture needs to be designed in a modularized way, the request end and the clearing platform need to be mutually independent and respectively take charge of tasks belonging to the request end and the clearing platform needs to verify the identity of the request end before clearing, so that on one hand, the situation that clearing resources are consumed in disorder and normal clearing requests cannot be processed is avoided, and on the other hand, fund theft caused by false clearing can also be avoided.
For example, in the full electronic flow process, the functional units are modularized, so that each participating functional unit leaves a use trace in a complete process. For a clearing platform, the authenticity of a clearing request is identified in the clearing process, a pseudo clearing request is proposed after the identification is successful, and the use trace of the pseudo clearing request cannot be complete.
Referring to fig. 2, a fund transaction clearing method disclosed in the present application includes the following steps:
s101, responding to the obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
s102, selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
s103, selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
s104, sending the encrypted clearing result to the request end and the verification end, and verifying the clearing result received by the request end through the verification end; and
s105, clearing is executed after the identity of the request end is verified;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
Specifically, in step S101, the request end sends a clearing request to the clearing platform, and after receiving the clearing request, the clearing platform parses the content in the clearing request, where the parsed content includes an account name, a clearing initiation time, and a clearing object.
The account name has uniqueness, subsequent processing contents can be marked through the account, the marking can enable data in the processing process to have directionality, and the data belonging to one account name can be grouped together.
The clearing initiating time refers to the time for the request end to generate or send the clearing request, and the clearing platform needs to select a proper time point for unified clearing according to the clearing initiating time. For example, if the current fund mostly adopts the account arrival time of "T + N", then in a trading day, it can be specified that at an expiration time point (for example, six pm), the clearing request received before the expiration time point is processed on the day, and the clearing request received after the expiration time point is carried forward to the next trading day.
The clearing object refers to the fund attributed to the account name, for example, there are a plurality of funds under one account name, and the fund to be cleared is the clearing object mentioned above, and the clearing object simultaneously includes the clearing status (due clearing, mid-course withdrawal, special withdrawal and appointment withdrawal) of the clearing object.
In step S102, the preprocessing time period corresponding to the clearing request is selected according to the clearing initiation time, that is, the above-mentioned description about the deadline. It should also be noted that there are two trigger conditions, a fixed point in time and a fixed throughput, for clearing.
The fixed time point refers to the unified clearing after the deadline time point.
The fixed processing amount refers to that after the clearing requests meeting the number are received before the fixed time point, the clearing requests are cleared uniformly, and the triggering mode of the fixed processing amount can avoid that all the calculations are carried out after the deadline time point.
In step S103, the clearing platform selects a clearing model according to the clearing object, and then uses the clearing model to clear the clearing request and obtain the clearing result. The clearing model is prefabricated in the clearing platform in advance, namely at the beginning of the design of each fund, aiming at the clearing modes (due clearing, midway withdrawal, special withdrawal and appointed withdrawal) of the fund, the clearing model is designed.
In the subsequent clearing process, the corresponding clearing model is directly called, and clearing can be directly carried out, so that the clearing process does not need manual participation, and data abnormity or fund flow abnormity caused by accidental authorization is avoided. Meanwhile, the method can also shorten the fund clearing process and time.
In step S104, the clearing platform sends the encrypted clearing result to the request end and the verifying end, and verifies the clearing result received by the request end through the verifying end, specifically, the request end sends the received clearing result to the verifying end, the verifying end receives the clearing result sent by the clearing platform after receiving the clearing result sent by the request end, the verifying end compares the two clearing results and sends the comparison result to the clearing platform, the comparison result is consistent, it indicates that the request end is true, otherwise, it indicates that the request end is false.
When the clearing platform selects the clearing model, a correct clearing model and a plurality of error clearing models are selected, wherein the correct clearing model refers to the clearing model which is selected according to the clearing object and corresponds to the clearing object, and the error clearing model refers to the clearing models except the correct clearing model.
These selected correct calculation models are randomly arranged with the error calculation models, for example, the number of the error calculation models is four, and the correct calculation models may be located at any one position (any one of the first position to the fifth position) in the queue as shown in fig. 3.
The clearing platform sends clearing results to the request end in sequence, the request end also sends clearing results to the verification end in sequence, and the verification end only verifies one clearing model each time.
It should be appreciated that the fake request end may compute, via public information or the like, the correct result, which is consistent with the result obtained using the correct clearing model. However, the error clearance model cannot know which clearance model is used, and therefore cannot know the specific result.
The addition of the error clearing model defeats the means of calculating the correct result in advance because besides the correct result, a plurality of error results need to be calculated in advance, but the calculation of the error results needs the error clearing model which is selected from the clearing model library and can not be known in advance.
The discovery process of the false request end is composed of several reference factors:
1. and time limitation, namely, illegal decryption requires certain time, so that the receiving time of the verification end is limited, the counting is started after the clearing platform sends a clearing result to the request end, and if the clearing result sent by the request end is not received within the specified time, the request end is judged to be a fake request end.
2. And (4) limiting the times, wherein the verification end only receives the clearing result sent by the request end once, and if the wrong clearing result is received, the request end is judged to be a fake request end.
In addition, the mode of using the verification end to receive the clearing result sent by the request end and the clearing result sent by the clearing platform has the following advantages:
1. for the verification end, various and high-specification encryption modes can be adopted, and the targeted design can be performed on encryption and verification;
2. the verification end can be opened when in use and closed when not in use, thereby providing better confidentiality;
3. after the verification end is added, the number of nodes needing to be cracked or controlled is increased, so that the difficulty of successful intrusion is increased suddenly;
4. aiming at the clearing result sent by the request end and the clearing result sent by the clearing platform, the two clearing results can use an asymmetric design, namely the clearing result sent by the request end to the verification end and the clearing result sent by the clearing platform to the verification end can be inconsistent, so that an intruder can not obtain the other clearing result by intercepting one of the clearing results.
After the authenticity of the request end is verified, step S105 is executed, in this step, final clearing is executed, that is, funds are remitted into an account designated by the user, and there are two clearing ways, the first way is that a bank remits the funds into a supervision account or a transit account, and then the funds are remitted into the account designated by the user through the supervision account or the transit account, or the bank remits the funds into the account designated by the user according to the received list.
Referring to fig. 4, as a specific implementation of the fund transaction clearing method provided by the application, the number of the verification ends is increased to be multiple, and in the process of identity verification, the clearing result sent by the request end each time points to different verification ends.
This may further increase the complexity of the authentication, it being understood that if only one authentication peer is used, the likelihood of exposure of the authentication peer during long-term monitoring increases, which increases the potential risk of authentication fraud. After the number of the verification ends is increased, the verification ends can be prevented from being exposed in a long-term monitoring process, and the probability of being discovered is increased due to the fact that a plurality of verification ends are monitored at the same time.
The selection modes of the verification end are as follows:
first, the clearing result sent to the requesting end includes a key, which points to a fixed verifying end. Thus, after receiving the clearing result, the request end needs to analyze the clearing result to which verifying end the clearing result needs to be sent, the process involves decryption and re-encryption of the clearing result, and if an error re-encryption mode is used, the verifying end can find and identify the fake request end.
And secondly, inputting the current time into a specified calculation model to obtain a pointing address, wherein the pointing address points to a determined verification end.
To further increase the complexity of the authentication end usage, the following approach is used:
it is assumed here that the total number of verification ends is M, the number of verification ends participating in the authentication process is N, and 1-N-M-s, and the verification ends participating in the authentication process each time are randomly selected from all the verification ends. If all verification ends are selected to be monitored, the probability of being discovered is suddenly increased. Because the monitoring mode needs to consume a large amount of resources to perform all-weather control, the mode is easy to discover and can be monitored by a behavior analysis system and incorporated into a behavior analysis library as a sample.
It is also easy to find a random heuristic that selects a small range, because it was mentioned in the foregoing that the verifying peer only receives the clearing result sent by the requesting peer once, and if a wrong clearing result is received, it is determined that this requesting peer is a fake requesting peer.
The random probing needs to send data to the verification end, and when the clearing result cannot be known or the probing is performed by using the wrong clearing result, the probing is discovered and then is monitored by the behavior analysis system and is included in the behavior analysis library as a sample.
Referring to fig. 5, as a specific embodiment of the fund transaction clearing method provided by the application, the verification end participating in the identity verification process receives zero, one, or multiple clearing results, and in time sequence, any two adjacent clearing results are respectively sent to two verification ends.
Therefore, the probability of finding the verification end can be further increased, and it should be understood that from the perspective of intrusion, the selection mechanism of the verification end can be back calculated by monitoring the way that the verification end receives the verification result sent by the request end, because for a fixed algorithm, when the input is fixed, the output is also fixed, and by calculating the output, the possibility of algorithm cracking exists.
But the probability of the algorithm being broken is reduced after the complexity of receiving the clearing result at the verifier is increased.
Referring to fig. 6, further, the verifying end includes an open state and a rejection state; in the process of one-time verification, two or more verification ends are in an open state. The purpose of this way is to further reduce the possibility of the verification end selection algorithm being cracked.
For example, in one verification process, several verification terminals participate in the verification process at the same time, but some verification terminals process the open state and can receive the data sent by the request terminal, and some verification terminals process the reject state and do not receive the data sent by the request terminal.
However, from the monitoring point of view, it can only be monitored that several verifying terminals participate in the verifying process, but it cannot be determined whether the verifying terminal is in the open state or the denial state at all. Because if the false data is used for probing, when any one of the verification terminals receives the false data, the verification process is directly closed, and an alarm is triggered. In addition, the rejection status and the receipt of zero clearing results are the same from a monitoring perspective, and the difficulty of the determination is further increased.
That is, in such an architecture, the monitoring can only monitor the appearance and disappearance of the verifying side, but it cannot be determined at all whether the appearing verifying side receives the data sent by the requesting side. It should be further noted that, for large-batch centralized malicious accesses, a filtering mechanism may be used to filter the accesses, and intercept the malicious accesses, so as to avoid affecting the normal clearing process.
Further, at least one of the verification terminals is in a disabled state, which is a further optimization measure, there is a case where the number of verification terminals in an on state may be the total number of verification terminals present, and there is also a potential risk when this is always the case.
The mode that the opening state and the rejection state occur simultaneously is used, so that the complexity of the occurrence and the use of the verification end is higher, and the probability of being cracked is lower. The other aspect explains that the verification end appearing in the one-time verification process can be divided into a use verification end and a matching verification end, and the matching verification end is used for shielding the use verification end so that the use verification end is not easy to find. The higher the complexity of the tissue of the partner verification end, the higher the difficulty of identifying it.
In another possible implementation manner, the request end may send the clearing result to the use verification end and the cooperation verification end at the same time, but only the verification end is used to send the verification result to the clearing platform, as shown in fig. 7, or the verification end is used to send the verification result to the clearing platform, and the cooperation verification end sends the blank verification result to the clearing platform, as shown in fig. 8.
The present application further provides a fund transaction clearing device, comprising:
the first processing unit is used for responding to the acquired clearing request, analyzing the content in the clearing request and obtaining an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
In one example, the units in any of the above apparatuses may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more Digital Signal Processors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), or a combination of at least two of these integrated circuit forms.
For another example, when a unit in the apparatus can be implemented in the form of a processing element scheduler, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of calling programs. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Various objects such as various messages/information/devices/network elements/systems/devices/actions/operations/procedures/concepts may be named in the present application, it is to be understood that these specific names do not constitute limitations on related objects, and the named names may vary according to circumstances, contexts, or usage habits, and the understanding of the technical meaning of the technical terms in the present application should be mainly determined by the functions and technical effects embodied/performed in the technical solutions.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should also be understood that, in various embodiments of the present application, first, second, etc. are used merely to indicate that a plurality of objects are different. For example, the first time window and the second time window are merely to show different time windows. And should not have any influence on the time window itself, and the above-mentioned first, second, etc. should not impose any limitation on the embodiments of the present application.
It is also to be understood that the terminology and/or the description of the various embodiments herein is consistent and mutually inconsistent if no specific statement or logic conflicts exists, and that the technical features of the various embodiments may be combined to form new embodiments based on their inherent logical relationships.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a computer-readable storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned computer-readable storage media comprise: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present application also provides a computer program product comprising instructions that, when executed, cause the clearing apparatus to perform operations of the clearing apparatus corresponding to the above method.
The present application also provides a fund transaction clearing system, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory to perform the methods described above.
The present application further provides a system on a chip comprising a processor configured to perform the functions recited above, such as generating, receiving, transmitting, or processing data and/or information recited in the above-described methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
The processor mentioned in any of the above may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the program of the method for transmitting feedback information.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices respectively, and connected in a wired or wireless manner to support the system on chip to implement various functions in the foregoing embodiments. Alternatively, the processor and the memory may be coupled to the same device.
Optionally, the computer instructions are stored in a memory.
Alternatively, the memory is a storage unit in the chip, such as a register, a cache, and the like, and the memory may also be a storage unit outside the chip in the terminal, such as a ROM or another type of static storage device that can store static information and instructions, a RAM, and the like.
It will be appreciated that the memory herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
The non-volatile memory may be ROM, programmable Read Only Memory (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), or flash memory.
Volatile memory can be RAM, which acts as external cache memory. There are many different types of RAM, such as Static Random Access Memory (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synclink DRAM (SLDRAM), and direct memory bus RAM.
The embodiments of the present invention are all preferred embodiments of the present application, and the protection scope of the present application is not limited thereby, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.