Disclosure of Invention
The application provides a fund transaction clearing method and a fund transaction clearing system, which are used for identifying the authenticity of access in a multi-party participation and dynamic verification mode so as to improve the safety in fund clearing.
The above object of the present application is achieved by the following technical solutions:
in a first aspect, the present application provides a fund transaction clearing method, comprising:
responding to the obtained clearing request, and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
performing a clearing after verifying the identity of the requesting end;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
In a possible implementation manner of the first aspect, the number of the verification terminals is multiple;
in the identity authentication process, the clearing result sent by the request end every time points to different authentication ends.
In a possible implementation manner of the first aspect, the total number of verification ends is M, the number of verification ends participating in an authentication process is N, and 1-N-M-s are constructed;
the verification end participating in the identity verification process each time is randomly selected from all verification ends.
In a possible implementation manner of the first aspect, the clearing result received by the authentication end participating in the identity authentication process includes zero, one, and multiple;
in time series, any two adjacent clearing results are respectively sent to two verification ends.
In a possible implementation manner of the first aspect, when the verification end is selected, the pointing address is obtained after the current time is input into the specified calculation model, and the pointing address points to a certain verification end.
In a possible implementation manner of the first aspect, the verifying end includes an open state and a rejection state;
in the process of one-time verification, two or more verification ends are in an open state.
In a possible implementation manner of the first aspect, at least one verifying terminal is in a rejected state.
In a second aspect, the present application provides a fund transaction clearing device comprising:
the first processing unit is used for responding to the acquired clearing request, analyzing the content in the clearing request and obtaining an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
In a third aspect, the present application provides a fund transaction clearing system, comprising:
one or more memories for storing instructions; and
one or more processors configured to call and execute the instructions from the memory, and to execute the method according to the first aspect and any possible implementation manner of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium comprising:
a program for performing the method as described in the first aspect and any possible implementation manner of the first aspect when the program is run by a processor.
In a fifth aspect, the present application provides a computer program product comprising program instructions for executing the method as described in the first aspect and any possible implementation manner of the first aspect, when the program instructions are executed by a computing device.
In a sixth aspect, the present application provides a system on a chip comprising a processor configured to perform the functions recited in the above aspects, such as generating, receiving, sending, or processing data and/or information recited in the above methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices, connected in a wired or wireless manner, or coupled on the same device.
Detailed Description
The technical solution of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, the fund transaction clearing method disclosed in the present application is applied to a fund platform, and the fund platform is composed of a request end, a verification end, a clearing platform and the like, wherein the request end faces a user, the clearing platform is used for clearing according to a request of the request end, and the verification end is used for verifying the request end in cooperation with the clearing platform.
The number of the request ends is multiple, each request end faces a fixed user, and the users can carry out services such as fund learning, inquiring and purchasing through the request ends belonging to the users. The clearing platform is used for clearing according to a clearing request sent by the request end.
Here, the clearing platform may face a plurality of requesters, or it may be understood that the clearing platform is a platform with a certain open function, which is used for clearing computation. For example, if each fund is provided with clearing resources (statically configured), more clearing resources need to be prepared and cannot be scheduled. However, after the clearing platform is used, the clearing platform can perform dynamic scheduling of clearing resources according to actual use requirements.
For example, the total amount of the liquidation resources that can be scheduled by the liquidation platform is one hundred, and liquidation resources of an appropriate size can be collected for fund liquidation aiming at liquidation requests sent by different request terminals, and after the liquidation requests of one request terminal are completed, the liquidation resources can be configured for liquidation requests sent by other request terminals.
It is apparent that dynamic clearing resource scheduling can meet larger scale usage requirements with a smaller number of clearing resources. However, the fund platform with the architecture needs to be designed in a modularized way, the request end and the clearing platform need to be mutually independent and respectively take charge of tasks belonging to the request end and the clearing platform needs to verify the identity of the request end before clearing, so that on one hand, the situation that clearing resources are consumed in disorder and normal clearing requests cannot be processed is avoided, and on the other hand, fund theft caused by false clearing can also be avoided.
For example, in the full electronic flow process, the functional units are modularized, so that each participating functional unit leaves a use trace in a complete process. For a clearing platform, the authenticity of a clearing request is identified in the clearing process, a pseudo clearing request is provided after the identification is successful, and the use trace of the pseudo clearing request cannot be complete.
Referring to fig. 2, a fund transaction clearing method disclosed in the present application includes the following steps:
s101, responding to the obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
s102, selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
s103, selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
s104, sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
s105, performing clearing after the identity of the request end is verified;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
Specifically, in step S101, the request end sends a clearing request to the clearing platform, and after receiving the clearing request, the clearing platform parses the content in the clearing request, where the parsed content includes an account name, clearing initiation time, and a clearing object.
The account name has uniqueness, the subsequent processing content can be marked through the account, the marking can enable data in the processing process to have directionality, and the data belonging to one account name can be grouped together.
The clearing initiation time refers to the time for the request terminal to generate or send out the clearing request, and the clearing platform needs to select to carry out unified clearing at a proper time point according to the clearing initiation time. For example, if the current fund mostly adopts the account arrival time of "T + N", then in a trading day, it can be specified that at an expiration time point (for example, six pm), the clearing request received before the expiration time point is processed on the day, and the clearing request received after the expiration time point is carried forward to the next trading day.
A clearing object refers to funds attributed to an account name, e.g., multiple funds under an account name, and the funds to be cleared are the clearing objects referred to above, including the clearing status of the clearing object (expired clearing, mid-course retirement, special retirement, and contracted retirement).
In step S102, the preprocessing time period corresponding to the clearing request is selected according to the clearing initiation time, that is, the above-mentioned description about the deadline. It should also be noted that there are two trigger conditions, a fixed point in time and a fixed throughput, to be cleared.
The fixed time point refers to a unified clearing after the cutoff time point.
The fixed processing amount refers to that after the clearing requests meeting the number are received before the fixed time point, the clearing requests are cleared uniformly, and the triggering mode of the fixed processing amount can avoid that all the calculations are carried out after the deadline time point.
In step S103, the clearing platform will select a clearing model according to the clearing object, and then use the clearing model to clear the clearing request and obtain the clearing result. The clearing model is prefabricated in the clearing platform in advance, namely at the beginning of the design of each fund, the clearing model is designed aiming at the clearing modes (due clearing, midway withdrawal, special withdrawal and appointment withdrawal) of the fund.
In the subsequent clearing process, the corresponding clearing model is directly called, and clearing can be directly carried out, so that the clearing process does not need manual participation, and data abnormity or fund flow abnormity caused by accidental authorization is avoided. Meanwhile, the method can also shorten the fund clearing process and time.
In step S104, the clearing platform sends the encrypted clearing result to the request end and the verifying end, and verifies the clearing result received by the request end through the verifying end, specifically, the request end sends the received clearing result to the verifying end, the verifying end receives the clearing result sent by the clearing platform after receiving the clearing result sent by the request end, the verifying end compares the two clearing results and sends the comparison result to the clearing platform, the comparison result is consistent, it indicates that the request end is true, otherwise, it indicates that the request end is false.
When the clearing platform selects the clearing model, a correct clearing model and a plurality of error clearing models are selected, wherein the correct clearing model refers to the clearing model which is selected according to the clearing object and corresponds to the clearing object, and the error clearing model refers to the clearing models except the correct clearing model.
These selected correct calculation models are randomly arranged with the error calculation models, for example, the number of the error calculation models is four, and the correct calculation models may be located at any one position (any one of the first position to the fifth position) in the queue as shown in fig. 3.
The clearing platform sends clearing results to the request end in sequence, the request end also sends clearing results to the verification end in sequence, and the verification end only verifies one clearing model each time.
It should be appreciated that the fake requestor may compute the correct result by public information, etc., which is consistent with the result obtained using the correct clearing model. However, the error clearance model cannot know which clearance model is used, and therefore cannot know the specific result.
The addition of the error clearing model defeats the means of calculating the correct result in advance because a plurality of error results need to be calculated in advance in addition to the correct result, but the calculation of the error result requires the error clearing model which is selected from the clearing model library and can not be known in advance.
The discovery process of the false request end is composed of several reference factors:
1. and if the clearing result sent by the request end is not received within the specified time, the request end is judged to be a fake request end.
2. And (4) limiting the times, wherein the verification end only receives the clearing result sent by the request end once, and if the wrong clearing result is received, the request end is judged to be a fake request end.
In addition, the mode of using the verification end to receive the clearing result sent by the request end and the clearing result sent by the clearing platform has the following advantages:
1. for the verification end, various and high-specification encryption modes can be adopted, and the targeted design can be carried out on encryption and verification;
2. the verification end can be opened when in use and closed when not in use, thereby providing better confidentiality;
3. after the verification end is added, the number of nodes needing to be cracked or controlled is increased, so that the difficulty of successful intrusion is increased suddenly;
4. aiming at the clearing result sent by the request end and the clearing result sent by the clearing platform, the two clearing results can use an asymmetric design, namely the clearing result sent by the request end to the verification end and the clearing result sent by the clearing platform to the verification end can be inconsistent, so that an intruder can not obtain the other clearing result by intercepting one of the clearing results.
After the authenticity of the request end is verified, step S105 is executed, in this step, final clearing is executed, the clearing is to remit the fund into the account designated by the user, and there are two clearing ways, the first is that the bank remits the fund into a supervision account or a transit account, and then the fund is remitted into the account designated by the user through the supervision account or the transit account, or the bank remits the fund into the account designated by the user according to the received list.
Referring to fig. 4, as a specific implementation of the fund transaction clearing method provided by the application, the number of the verification ends is increased to be multiple, and in the process of identity verification, the clearing result sent by the request end each time points to different verification ends.
This may further increase the complexity of the authentication, it being understood that if only one authentication peer is used, the likelihood of exposure of the authentication peer during long-term monitoring increases, which increases the potential risk of authentication fraud. After the number of the verification ends is increased, the verification ends can be prevented from being exposed in a long-term monitoring process, and the probability of discovery of the verification ends is increased due to the fact that the multiple verification ends are monitored at the same time.
The selection modes of the verification end are as follows:
first, the clearing result sent to the requesting end includes a key, and the key points to a fixed verifying end. Thus, after receiving the clearing result, the request end needs to analyze the clearing result to which verifying end the clearing result needs to be sent, the process involves decryption and re-encryption of the clearing result, and if an error re-encryption mode is used, the verifying end can find and identify the fake request end.
And secondly, inputting the current time into a specified calculation model to obtain a pointing address, wherein the pointing address points to a determined verification end.
To further increase the complexity of the authentication end usage, the following approach is used:
it is assumed here that the total number of verification ends is M, the number of verification ends participating in the authentication process is N, and 1-N-M-s, and the verification ends participating in the authentication process each time are randomly selected from all the verification ends. If all verification ends are selected to be monitored, the probability of being discovered is suddenly increased. Because the monitoring mode consumes a large amount of resources to carry out all-weather control, the mode is easy to discover and can be monitored by a behavior analysis system and incorporated into a behavior analysis library as a sample.
It is also easy to find a random heuristic that selects a small range, because it was mentioned in the foregoing that the verifying peer only receives the clearing result sent by the requesting peer once, and if a wrong clearing result is received, it is determined that this requesting peer is a fake requesting peer.
The random probing needs to send data to the verification end, and when the clearing result cannot be known or the probing is performed by using the wrong clearing result, the probing is discovered and then is monitored by the behavior analysis system and is included in the behavior analysis library as a sample.
Referring to fig. 5, as a specific embodiment of the fund transaction clearing method provided by the application, the verification end participating in the identity verification process receives zero, one, or multiple clearing results, and in time sequence, any two adjacent clearing results are respectively sent to two verification ends.
Therefore, the probability of discovering the verification end can be further increased, and it should be understood that from the intrusion perspective, the selection mechanism of the verification end can be reversely calculated by monitoring the way that the verification end receives the verification result sent by the request end, because for a fixed algorithm, when the input is fixed, the output is also fixed, and through calculation of the output, the possibility of algorithm cracking exists.
But the probability of the algorithm being broken is reduced after the complexity of receiving the clearing result at the verifier is increased.
Referring to fig. 6, further, the verifying end includes an open state and a rejection state; in the process of one-time verification, two or more verification ends are in an open state. The purpose of this way is to further reduce the possibility of the verification end selection algorithm being cracked.
For example, in one verification process, several verification terminals participate in the verification process at the same time, but some verification terminals process the open state and can receive the data sent by the request terminal, and some verification terminals process the reject state and do not receive the data sent by the request terminal.
However, from the monitoring point of view, only a few verifying terminals can be monitored to participate in the verifying process, but no determination can be made as to whether the verifying terminals are in an open state or a rejection state. If the false data is used for probing, after any verifying terminal receives the false data, the verifying process is directly closed, and an alarm is triggered. In addition, the rejection status and the receipt of zero clearing results are the same from a monitoring perspective, and the difficulty of the determination is further increased.
That is, in such an architecture, the monitoring can only monitor the appearance and disappearance of the verifying side, but it cannot be determined at all whether the appearing verifying side receives data sent by the requesting side. It should be further noted that, for large-batch centralized malicious accesses, a filtering mechanism may be used to filter the accesses, and intercept the malicious accesses, so as to avoid affecting the normal clearing process.
Further, at least one verifying terminal is in a disabled state, which is a further optimization measure, there is a case where the number of verifying terminals in an on state may be the total number of verifying terminals present, and there is also a potential risk when this is always the case.
The mode that the opening state and the rejection state occur simultaneously is used, so that the complexity of the occurrence and the use of the verification end is higher, and the probability of being cracked is lower. The other aspect explains that the verification end appearing in the one-time verification process can be divided into a use verification end and a matching verification end, and the matching verification end is used for shielding the use verification end so that the use verification end is not easy to find. The higher the complexity of the tissue of the partner verification end, the higher the difficulty of identifying it.
In another possible implementation manner, the request end may send the clearing result to the use verification end and the cooperation verification end at the same time, but only the verification end is used to send the verification result to the clearing platform, as shown in fig. 7, or the verification end is used to send the verification result to the clearing platform, and the cooperation verification end sends the blank verification result to the clearing platform, as shown in fig. 8.
The present application further provides a fund transaction clearing device, comprising:
the first processing unit is used for responding to the obtained clearing request and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
In one example, the units in any of the above apparatus may be one or more integrated circuits configured to implement the above method, for example: one or more Application Specific Integrated Circuits (ASICs), or one or more Digital Signal Processors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), or a combination of at least two of these integrated circuit forms.
For another example, when a unit in the apparatus can be implemented in the form of a processing element scheduler, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of calling programs. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Various objects such as various messages/information/devices/network elements/systems/devices/actions/operations/procedures/concepts may be named in the present application, it is to be understood that these specific names do not limit the related objects, and the named names may vary according to the circumstances, the context or the usage habit, and the understanding of the technical meaning of the technical terms in the present application should be mainly determined by the functions and technical effects embodied/performed in the technical solutions.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should also be understood that, in various embodiments of the present application, first, second, etc. are used merely to indicate that a plurality of objects are different. For example, the first time window and the second time window are merely to show different time windows. And should not have any influence on the time window itself, and the above-mentioned first, second, etc. should not impose any limitation on the embodiments of the present application.
It is also to be understood that the terminology and/or the description of the various embodiments herein is consistent and mutually inconsistent if no specific statement or logic conflicts exists, and that the technical features of the various embodiments may be combined to form new embodiments based on their inherent logical relationships.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a computer-readable storage medium, which includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned computer-readable storage medium comprises: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
The present application also provides a computer program product comprising instructions that, when executed, cause the clearing apparatus to perform operations of the clearing apparatus corresponding to the above method.
The present application also provides a fund transaction clearing system, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory to perform the method as described above.
The present application further provides a system on a chip comprising a processor configured to perform the functions recited above, such as generating, receiving, transmitting, or processing data and/or information recited in the above-described methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
The processor mentioned in any of the above may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the program of the method for transmitting feedback information.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices respectively, and connected in a wired or wireless manner to support the system on chip to implement various functions in the foregoing embodiments. Alternatively, the processor and the memory may be coupled to the same device.
Optionally, the computer instructions are stored in a memory.
Alternatively, the memory is a storage unit in the chip, such as a register, a cache, and the like, and the memory may also be a storage unit outside the chip in the terminal, such as a ROM or other types of static storage devices that can store static information and instructions, a RAM, and the like.
It will be appreciated that the memory herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
The non-volatile memory may be ROM, programmable Read Only Memory (PROM), erasable Programmable Read Only Memory (EPROM), electrically Erasable Programmable Read Only Memory (EEPROM), or flash memory.
Volatile memory can be RAM, which acts as external cache memory. There are many different types of RAM, such as Static Random Access Memory (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synclink DRAM (SLDRAM), and direct memory bus RAM.
The embodiments of the present invention are preferred embodiments of the present application, and the scope of protection of the present application is not limited by the embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.