CN115271972A - Fund transaction clearing method and system - Google Patents

Fund transaction clearing method and system Download PDF

Info

Publication number
CN115271972A
CN115271972A CN202211205231.7A CN202211205231A CN115271972A CN 115271972 A CN115271972 A CN 115271972A CN 202211205231 A CN202211205231 A CN 202211205231A CN 115271972 A CN115271972 A CN 115271972A
Authority
CN
China
Prior art keywords
clearing
request
verification
result
fund transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211205231.7A
Other languages
Chinese (zh)
Other versions
CN115271972B (en
Inventor
杨阳
陈旭
陈泽聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xunce Technology Co ltd
Original Assignee
Shenzhen Xunce Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xunce Technology Co ltd filed Critical Shenzhen Xunce Technology Co ltd
Priority to CN202211205231.7A priority Critical patent/CN115271972B/en
Publication of CN115271972A publication Critical patent/CN115271972A/en
Application granted granted Critical
Publication of CN115271972B publication Critical patent/CN115271972B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The application relates to a fund transaction clearing method and a fund transaction clearing system, wherein the method comprises the steps of responding to an obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object; selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time; selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result; and sending the encrypted clearing result to the request end and the verification end, verifying the clearing result received by the request end through the verification end, and performing clearing after verifying the identity of the request end. The clearing model includes a correct clearing model and a plurality of error clearing models. The fund transaction clearing method and the fund transaction clearing system recognize the truth of the access through multi-party participation and dynamic verification so as to improve the safety in fund clearing.

Description

Fund transaction clearing method and system
Technical Field
The application relates to the technical field of information security, in particular to a fund transaction clearing method and a fund transaction clearing system.
Background
At the end of the fund seal period, a large number of clearing requests may occur in a centralized time period, which may result in a sudden increase in server access, which may require higher security measures to validate the requests as they relate to fund security.
In case of a sudden increase in access volume and funds involved, the access may be adulterated with false accesses, which may result in a change in the flow of funds, resulting in a loss of customers. The currently common approach is feature determination. The characteristic judgment needs to be supported by mass data to find the suspicious points of the access, but if the access is a new access or the access is invaded by adopting dynamic change, deception means and the like, the judgment can be failed.
Disclosure of Invention
The application provides a fund transaction clearing method and a fund transaction clearing system, which are used for identifying the authenticity of access in a multi-party participation and dynamic verification mode so as to improve the safety in fund clearing.
The above object of the present application is achieved by the following technical solutions:
in a first aspect, the present application provides a fund transaction clearing method, comprising:
responding to the obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
performing a clearing after verifying the identity of the requesting end;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
In a possible implementation manner of the first aspect, the number of the verification terminals is multiple;
in the identity authentication process, the clearing result sent by the request end every time points to different authentication ends.
In a possible implementation manner of the first aspect, the total number of verification ends is M, the number of verification ends participating in an authentication process is N, and 1-N-M-s are constructed;
the verification end participating in the identity verification process each time is randomly selected from all verification ends.
In a possible implementation manner of the first aspect, the clearing result received by the verifying end participating in the identity verification process includes zero, one, and multiple;
in time series, any two adjacent clearing results are respectively sent to two verification ends.
In a possible implementation manner of the first aspect, when the verification end is selected, the pointing address is obtained after the current time is input into the specified calculation model, and the pointing address points to a certain verification end.
In a possible implementation manner of the first aspect, the verifying end includes an open state and a rejection state;
in the process of one-time verification, two or more verification ends are in an open state.
In a possible implementation manner of the first aspect, at least one verifying terminal is in a rejected state.
In a second aspect, the present application provides a fund transaction clearing device comprising:
the first processing unit is used for responding to the acquired clearing request, analyzing the content in the clearing request and obtaining an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for executing clearing after the identity of the request end is verified.
In a third aspect, the present application provides a fund transaction clearing system, comprising:
one or more memories for storing instructions; and
one or more processors configured to invoke and execute the instructions from the memory to perform the method according to the first aspect and any possible implementation manner of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium comprising:
a program for performing a method as described in the first aspect and any possible implementation manner of the first aspect when the program is run by a processor.
In a fifth aspect, the present application provides a computer program product comprising program instructions for executing the method according to the first aspect and any possible implementation manner of the first aspect when the program instructions are executed by a computing device.
In a sixth aspect, the present application provides a system on a chip comprising a processor configured to perform the functions recited in the above aspects, such as generating, receiving, sending, or processing data and/or information recited in the above methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices, connected in a wired or wireless manner, or coupled to the same device.
Drawings
FIG. 1 is a block diagram of a framework for a fund platform architecture provided by the present application.
FIG. 2 is a block diagram illustrating a flow of a fund transaction clearing method provided in the present application.
Fig. 3 is a schematic diagram of a process for sending a clearing result to a verification end according to the present application.
Fig. 4 is a schematic diagram of another process for sending a clearing result to a verification end provided by the present application.
Fig. 5 is a schematic diagram of receiving a clearing result by an authentication end according to the present application.
Fig. 6 is a schematic diagram of another verifying side receiving a clearing result provided by the present application, in which the verifying side is in a rejected state and indicated by a thick line.
FIG. 7 is a schematic diagram of a method of sending a clearing result to a clearing platform as provided by the present application.
FIG. 8 is a schematic illustration of another delivery of a clearing result to a clearing platform as provided herein.
Detailed Description
The technical solution of the present application is further described in detail below with reference to the accompanying drawings.
Referring to fig. 1, the fund transaction clearing method disclosed in the present application is applied to a fund platform, and the fund platform is composed of a request end, a verification end, a clearing platform and the like, wherein the request end faces a user, the clearing platform is used for clearing according to a request of the request end, and the verification end is used for verifying the request end in cooperation with the clearing platform.
The number of the request ends is multiple, each request end faces a fixed user, and the users can carry out services such as fund learning, inquiring and purchasing through the request ends belonging to the users. The clearing platform is used for clearing according to a clearing request sent by the request end.
Here, the clearing platform may face a plurality of requesters, or it may be understood that the clearing platform is a platform with a certain open function, which is used for clearing computation. For example, if each fund is provided with clearing resources (statically configured), more clearing resources need to be prepared and cannot be scheduled. However, after the clearing platform is used, the clearing platform can perform dynamic scheduling of clearing resources according to actual use requirements.
For example, the total amount of the liquidation resources that can be scheduled by the liquidation platform is one hundred, and liquidation resources of an appropriate size can be collected for fund liquidation aiming at liquidation requests sent by different request terminals, and after the liquidation requests of one request terminal are completed, the liquidation resources can be configured for liquidation requests sent by other request terminals.
It is apparent that dynamic clearing resource scheduling can meet larger scale usage requirements with a smaller number of clearing resources. However, the fund platform with the architecture needs to be designed in a modularized way, the request end and the clearing platform need to be mutually independent and respectively take charge of tasks belonging to the request end and the clearing platform needs to verify the identity of the request end before clearing, so that on one hand, the situation that clearing resources are consumed in disorder and normal clearing requests cannot be processed is avoided, and on the other hand, fund theft caused by false clearing can also be avoided.
For example, in the full electronic flow process, the functional units are modularized, so that each participating functional unit leaves a use trace in a complete process. For a clearing platform, the authenticity of a clearing request is identified in the clearing process, a pseudo clearing request is proposed after the identification is successful, and the use trace of the pseudo clearing request cannot be complete.
Referring to fig. 2, a fund transaction clearing method disclosed in the present application includes the following steps:
s101, responding to the obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
s102, selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
s103, selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
s104, sending the encrypted clearing result to the request end and the verification end, and verifying the clearing result received by the request end through the verification end; and
s105, clearing is executed after the identity of the request end is verified;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
Specifically, in step S101, the request end sends a clearing request to the clearing platform, and after receiving the clearing request, the clearing platform parses the content in the clearing request, where the parsed content includes an account name, a clearing initiation time, and a clearing object.
The account name has uniqueness, subsequent processing contents can be marked through the account, the marking can enable data in the processing process to have directionality, and the data belonging to one account name can be grouped together.
The clearing initiating time refers to the time for the request end to generate or send the clearing request, and the clearing platform needs to select a proper time point for unified clearing according to the clearing initiating time. For example, if the current fund mostly adopts the account arrival time of "T + N", then in a trading day, it can be specified that at an expiration time point (for example, six pm), the clearing request received before the expiration time point is processed on the day, and the clearing request received after the expiration time point is carried forward to the next trading day.
The clearing object refers to the fund attributed to the account name, for example, there are a plurality of funds under one account name, and the fund to be cleared is the clearing object mentioned above, and the clearing object simultaneously includes the clearing status (due clearing, mid-course withdrawal, special withdrawal and appointment withdrawal) of the clearing object.
In step S102, the preprocessing time period corresponding to the clearing request is selected according to the clearing initiation time, that is, the above-mentioned description about the deadline. It should also be noted that there are two trigger conditions, a fixed point in time and a fixed throughput, for clearing.
The fixed time point refers to the unified clearing after the deadline time point.
The fixed processing amount refers to that after the clearing requests meeting the number are received before the fixed time point, the clearing requests are cleared uniformly, and the triggering mode of the fixed processing amount can avoid that all the calculations are carried out after the deadline time point.
In step S103, the clearing platform selects a clearing model according to the clearing object, and then uses the clearing model to clear the clearing request and obtain the clearing result. The clearing model is prefabricated in the clearing platform in advance, namely at the beginning of the design of each fund, aiming at the clearing modes (due clearing, midway withdrawal, special withdrawal and appointed withdrawal) of the fund, the clearing model is designed.
In the subsequent clearing process, the corresponding clearing model is directly called, and clearing can be directly carried out, so that the clearing process does not need manual participation, and data abnormity or fund flow abnormity caused by accidental authorization is avoided. Meanwhile, the method can also shorten the fund clearing process and time.
In step S104, the clearing platform sends the encrypted clearing result to the request end and the verifying end, and verifies the clearing result received by the request end through the verifying end, specifically, the request end sends the received clearing result to the verifying end, the verifying end receives the clearing result sent by the clearing platform after receiving the clearing result sent by the request end, the verifying end compares the two clearing results and sends the comparison result to the clearing platform, the comparison result is consistent, it indicates that the request end is true, otherwise, it indicates that the request end is false.
When the clearing platform selects the clearing model, a correct clearing model and a plurality of error clearing models are selected, wherein the correct clearing model refers to the clearing model which is selected according to the clearing object and corresponds to the clearing object, and the error clearing model refers to the clearing models except the correct clearing model.
These selected correct calculation models are randomly arranged with the error calculation models, for example, the number of the error calculation models is four, and the correct calculation models may be located at any one position (any one of the first position to the fifth position) in the queue as shown in fig. 3.
The clearing platform sends clearing results to the request end in sequence, the request end also sends clearing results to the verification end in sequence, and the verification end only verifies one clearing model each time.
It should be appreciated that the fake request end may compute, via public information or the like, the correct result, which is consistent with the result obtained using the correct clearing model. However, the error clearance model cannot know which clearance model is used, and therefore cannot know the specific result.
The addition of the error clearing model defeats the means of calculating the correct result in advance because besides the correct result, a plurality of error results need to be calculated in advance, but the calculation of the error results needs the error clearing model which is selected from the clearing model library and can not be known in advance.
The discovery process of the false request end is composed of several reference factors:
1. and time limitation, namely, illegal decryption requires certain time, so that the receiving time of the verification end is limited, the counting is started after the clearing platform sends a clearing result to the request end, and if the clearing result sent by the request end is not received within the specified time, the request end is judged to be a fake request end.
2. And (4) limiting the times, wherein the verification end only receives the clearing result sent by the request end once, and if the wrong clearing result is received, the request end is judged to be a fake request end.
In addition, the mode of using the verification end to receive the clearing result sent by the request end and the clearing result sent by the clearing platform has the following advantages:
1. for the verification end, various and high-specification encryption modes can be adopted, and the targeted design can be performed on encryption and verification;
2. the verification end can be opened when in use and closed when not in use, thereby providing better confidentiality;
3. after the verification end is added, the number of nodes needing to be cracked or controlled is increased, so that the difficulty of successful intrusion is increased suddenly;
4. aiming at the clearing result sent by the request end and the clearing result sent by the clearing platform, the two clearing results can use an asymmetric design, namely the clearing result sent by the request end to the verification end and the clearing result sent by the clearing platform to the verification end can be inconsistent, so that an intruder can not obtain the other clearing result by intercepting one of the clearing results.
After the authenticity of the request end is verified, step S105 is executed, in this step, final clearing is executed, that is, funds are remitted into an account designated by the user, and there are two clearing ways, the first way is that a bank remits the funds into a supervision account or a transit account, and then the funds are remitted into the account designated by the user through the supervision account or the transit account, or the bank remits the funds into the account designated by the user according to the received list.
Referring to fig. 4, as a specific implementation of the fund transaction clearing method provided by the application, the number of the verification ends is increased to be multiple, and in the process of identity verification, the clearing result sent by the request end each time points to different verification ends.
This may further increase the complexity of the authentication, it being understood that if only one authentication peer is used, the likelihood of exposure of the authentication peer during long-term monitoring increases, which increases the potential risk of authentication fraud. After the number of the verification ends is increased, the verification ends can be prevented from being exposed in a long-term monitoring process, and the probability of being discovered is increased due to the fact that a plurality of verification ends are monitored at the same time.
The selection modes of the verification end are as follows:
first, the clearing result sent to the requesting end includes a key, which points to a fixed verifying end. Thus, after receiving the clearing result, the request end needs to analyze the clearing result to which verifying end the clearing result needs to be sent, the process involves decryption and re-encryption of the clearing result, and if an error re-encryption mode is used, the verifying end can find and identify the fake request end.
And secondly, inputting the current time into a specified calculation model to obtain a pointing address, wherein the pointing address points to a determined verification end.
To further increase the complexity of the authentication end usage, the following approach is used:
it is assumed here that the total number of verification ends is M, the number of verification ends participating in the authentication process is N, and 1-N-M-s, and the verification ends participating in the authentication process each time are randomly selected from all the verification ends. If all verification ends are selected to be monitored, the probability of being discovered is suddenly increased. Because the monitoring mode needs to consume a large amount of resources to perform all-weather control, the mode is easy to discover and can be monitored by a behavior analysis system and incorporated into a behavior analysis library as a sample.
It is also easy to find a random heuristic that selects a small range, because it was mentioned in the foregoing that the verifying peer only receives the clearing result sent by the requesting peer once, and if a wrong clearing result is received, it is determined that this requesting peer is a fake requesting peer.
The random probing needs to send data to the verification end, and when the clearing result cannot be known or the probing is performed by using the wrong clearing result, the probing is discovered and then is monitored by the behavior analysis system and is included in the behavior analysis library as a sample.
Referring to fig. 5, as a specific embodiment of the fund transaction clearing method provided by the application, the verification end participating in the identity verification process receives zero, one, or multiple clearing results, and in time sequence, any two adjacent clearing results are respectively sent to two verification ends.
Therefore, the probability of finding the verification end can be further increased, and it should be understood that from the perspective of intrusion, the selection mechanism of the verification end can be back calculated by monitoring the way that the verification end receives the verification result sent by the request end, because for a fixed algorithm, when the input is fixed, the output is also fixed, and by calculating the output, the possibility of algorithm cracking exists.
But the probability of the algorithm being broken is reduced after the complexity of receiving the clearing result at the verifier is increased.
Referring to fig. 6, further, the verifying end includes an open state and a rejection state; in the process of one-time verification, two or more verification ends are in an open state. The purpose of this way is to further reduce the possibility of the verification end selection algorithm being cracked.
For example, in one verification process, several verification terminals participate in the verification process at the same time, but some verification terminals process the open state and can receive the data sent by the request terminal, and some verification terminals process the reject state and do not receive the data sent by the request terminal.
However, from the monitoring point of view, it can only be monitored that several verifying terminals participate in the verifying process, but it cannot be determined whether the verifying terminal is in the open state or the denial state at all. Because if the false data is used for probing, when any one of the verification terminals receives the false data, the verification process is directly closed, and an alarm is triggered. In addition, the rejection status and the receipt of zero clearing results are the same from a monitoring perspective, and the difficulty of the determination is further increased.
That is, in such an architecture, the monitoring can only monitor the appearance and disappearance of the verifying side, but it cannot be determined at all whether the appearing verifying side receives the data sent by the requesting side. It should be further noted that, for large-batch centralized malicious accesses, a filtering mechanism may be used to filter the accesses, and intercept the malicious accesses, so as to avoid affecting the normal clearing process.
Further, at least one of the verification terminals is in a disabled state, which is a further optimization measure, there is a case where the number of verification terminals in an on state may be the total number of verification terminals present, and there is also a potential risk when this is always the case.
The mode that the opening state and the rejection state occur simultaneously is used, so that the complexity of the occurrence and the use of the verification end is higher, and the probability of being cracked is lower. The other aspect explains that the verification end appearing in the one-time verification process can be divided into a use verification end and a matching verification end, and the matching verification end is used for shielding the use verification end so that the use verification end is not easy to find. The higher the complexity of the tissue of the partner verification end, the higher the difficulty of identifying it.
In another possible implementation manner, the request end may send the clearing result to the use verification end and the cooperation verification end at the same time, but only the verification end is used to send the verification result to the clearing platform, as shown in fig. 7, or the verification end is used to send the verification result to the clearing platform, and the cooperation verification end sends the blank verification result to the clearing platform, as shown in fig. 8.
The present application further provides a fund transaction clearing device, comprising:
the first processing unit is used for responding to the acquired clearing request, analyzing the content in the clearing request and obtaining an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
In one example, the units in any of the above apparatuses may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more Digital Signal Processors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), or a combination of at least two of these integrated circuit forms.
For another example, when a unit in the apparatus can be implemented in the form of a processing element scheduler, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of calling programs. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Various objects such as various messages/information/devices/network elements/systems/devices/actions/operations/procedures/concepts may be named in the present application, it is to be understood that these specific names do not constitute limitations on related objects, and the named names may vary according to circumstances, contexts, or usage habits, and the understanding of the technical meaning of the technical terms in the present application should be mainly determined by the functions and technical effects embodied/performed in the technical solutions.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should also be understood that, in various embodiments of the present application, first, second, etc. are used merely to indicate that a plurality of objects are different. For example, the first time window and the second time window are merely to show different time windows. And should not have any influence on the time window itself, and the above-mentioned first, second, etc. should not impose any limitation on the embodiments of the present application.
It is also to be understood that the terminology and/or the description of the various embodiments herein is consistent and mutually inconsistent if no specific statement or logic conflicts exists, and that the technical features of the various embodiments may be combined to form new embodiments based on their inherent logical relationships.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a computer-readable storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned computer-readable storage media comprise: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present application also provides a computer program product comprising instructions that, when executed, cause the clearing apparatus to perform operations of the clearing apparatus corresponding to the above method.
The present application also provides a fund transaction clearing system, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory to perform the methods described above.
The present application further provides a system on a chip comprising a processor configured to perform the functions recited above, such as generating, receiving, transmitting, or processing data and/or information recited in the above-described methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
The processor mentioned in any of the above may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the program of the method for transmitting feedback information.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices respectively, and connected in a wired or wireless manner to support the system on chip to implement various functions in the foregoing embodiments. Alternatively, the processor and the memory may be coupled to the same device.
Optionally, the computer instructions are stored in a memory.
Alternatively, the memory is a storage unit in the chip, such as a register, a cache, and the like, and the memory may also be a storage unit outside the chip in the terminal, such as a ROM or another type of static storage device that can store static information and instructions, a RAM, and the like.
It will be appreciated that the memory herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
The non-volatile memory may be ROM, programmable Read Only Memory (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), or flash memory.
Volatile memory can be RAM, which acts as external cache memory. There are many different types of RAM, such as Static Random Access Memory (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synclink DRAM (SLDRAM), and direct memory bus RAM.
The embodiments of the present invention are all preferred embodiments of the present application, and the protection scope of the present application is not limited thereby, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (10)

1. A method of clearing a fund transaction, comprising:
responding to the obtained clearing request, and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
performing a clearing after verifying the identity of the requesting end;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
2. A fund transaction settlement method according to claim 1, wherein the number of the verification terminals is plural;
in the identity authentication process, the clearing result sent by the request end every time points to different authentication ends.
3. The fund transaction clearing method according to claim 2, wherein the total number of verification ends is M, the number of verification ends participating in the identity verification process is N, and 1-N-straw M;
the verification end participating in the identity verification process each time is randomly selected from all verification ends.
4. A fund transaction clearing method according to claim 2 or 3, wherein the clearing results received by the verifying end participating in the identity verification process comprise zero, one or more;
in time series, any two adjacent clearing results are respectively sent to two verification ends.
5. A fund transaction clearing method according to claim 2 or 3, wherein when the validating peer is selected, the pointing address is obtained by inputting the current time into the designated calculation model, the pointing address pointing to a certain validating peer.
6. The fund transaction clearing method according to claim 2, wherein the verifying terminal comprises an open state and a refusal state;
in the process of one-time verification, two or more verification ends are in an open state.
7. A fund transaction clearing method according to claim 6 wherein at least one validating terminal is in a denied state.
8. A fund transaction clearing apparatus, comprising:
the first processing unit is used for responding to the obtained clearing request and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
9. A fund transaction clearing system, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory, and to perform the method of any of claims 1 to 7.
10. A computer-readable storage medium, wherein the computer-readable storage medium comprises:
program for performing the method according to any one of claims 1 to 7 when the program is run by a processor.
CN202211205231.7A 2022-09-30 2022-09-30 Fund transaction clearing method and system Active CN115271972B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211205231.7A CN115271972B (en) 2022-09-30 2022-09-30 Fund transaction clearing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211205231.7A CN115271972B (en) 2022-09-30 2022-09-30 Fund transaction clearing method and system

Publications (2)

Publication Number Publication Date
CN115271972A true CN115271972A (en) 2022-11-01
CN115271972B CN115271972B (en) 2023-03-07

Family

ID=83757837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211205231.7A Active CN115271972B (en) 2022-09-30 2022-09-30 Fund transaction clearing method and system

Country Status (1)

Country Link
CN (1) CN115271972B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190228385A1 (en) * 2018-01-22 2019-07-25 Baton Systems, Inc. Clearing systems and methods
CN110458559A (en) * 2019-07-08 2019-11-15 阿里巴巴集团控股有限公司 Transaction data processing method, device, server and storage medium
CN110910134A (en) * 2019-10-25 2020-03-24 网联清算有限公司 Payment processing system and method
US20200272619A1 (en) * 2019-02-21 2020-08-27 Fiducia DLT LTD Method and system for audit and payment clearing of electronic trading systems using blockchain database
CN114422139A (en) * 2021-12-17 2022-04-29 上海浦东发展银行股份有限公司 API gateway request security verification method and device, electronic equipment and computer readable medium
US20220140997A1 (en) * 2020-11-01 2022-05-05 The Toronto-Dominion Bank Validating confidential data using homomorphic computations
CN115082178A (en) * 2022-06-28 2022-09-20 平安银行股份有限公司 Account checking and clearing method, system, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190228385A1 (en) * 2018-01-22 2019-07-25 Baton Systems, Inc. Clearing systems and methods
US20200272619A1 (en) * 2019-02-21 2020-08-27 Fiducia DLT LTD Method and system for audit and payment clearing of electronic trading systems using blockchain database
CN110458559A (en) * 2019-07-08 2019-11-15 阿里巴巴集团控股有限公司 Transaction data processing method, device, server and storage medium
CN110910134A (en) * 2019-10-25 2020-03-24 网联清算有限公司 Payment processing system and method
US20220140997A1 (en) * 2020-11-01 2022-05-05 The Toronto-Dominion Bank Validating confidential data using homomorphic computations
CN114422139A (en) * 2021-12-17 2022-04-29 上海浦东发展银行股份有限公司 API gateway request security verification method and device, electronic equipment and computer readable medium
CN115082178A (en) * 2022-06-28 2022-09-20 平安银行股份有限公司 Account checking and clearing method, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115271972B (en) 2023-03-07

Similar Documents

Publication Publication Date Title
US11341475B2 (en) System and method of notifying mobile devices to complete transactions after additional agent verification
US11695755B2 (en) Identity proofing and portability on blockchain
RU2710889C1 (en) Methods and systems for creation of identification cards, their verification and control
US9888007B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
CN106357612B (en) Authentication record checking method and device based on publicly-owned block chain
US10250583B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score
US10187369B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph
CN109067791B (en) User identity authentication method and device in network
US9852427B2 (en) Systems and methods for sanction screening
US20180240107A1 (en) Systems and methods for personal identification and verification
WO2018136307A1 (en) Detecting electronic intruders via updatable data structures
US20190052661A1 (en) Systems and methods for preventing fraud
AU2018100482A4 (en) Systems and methods for personal identification and verification
US20240048582A1 (en) Blockchain data breach security and cyberattack prevention
Kairaldeen et al. Data integrity time optimization of a blockchain IoT smart home network using different consensus and hash algorithms
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
US11954218B2 (en) Real-time access rules using aggregation of periodic historical outcomes
Kumar et al. Designing a Secure E Voting System Using Blockchain with Efficient Smart Contract and Consensus Mechanism
CN107846393B (en) Real person authentication method and device
CN110084665A (en) It rents a house method of commerce, device, electronic equipment and computer readable storage medium
CA3183183A1 (en) System and method for facilitating transfer of electronic payment information
CN115271972B (en) Fund transaction clearing method and system
Popoola et al. Design of a customer-centric surveillance system for ATM banking transactions using remote certification technique
GB2582270A (en) Transaction verification of distributed ledgers
Sanjay et al. Security and Privacy Trade-Off in Cryptocurrencies: An Implementation of Blockchain Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 518000, C6 Floor, Building 1, Shenzhen Software Industry Base, No. 81, 83, and 85 Gaoxin South Tenth Road, Binhai Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province

Patentee after: Shenzhen Xunce Technology Co.,Ltd.

Country or region after: China

Address before: Room 118a, industry university research building, Hong Kong University of science and technology, 9 Yuexing 1st Road, Gaoxin Park, Yuehai street, Nanshan District, Shenzhen, Guangdong 518000

Patentee before: SHENZHEN XUNCE TECHNOLOGY Co.,Ltd.

Country or region before: China