CN115271972B - Fund transaction clearing method and system - Google Patents

Fund transaction clearing method and system Download PDF

Info

Publication number
CN115271972B
CN115271972B CN202211205231.7A CN202211205231A CN115271972B CN 115271972 B CN115271972 B CN 115271972B CN 202211205231 A CN202211205231 A CN 202211205231A CN 115271972 B CN115271972 B CN 115271972B
Authority
CN
China
Prior art keywords
clearing
verification
request
result
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211205231.7A
Other languages
Chinese (zh)
Other versions
CN115271972A (en
Inventor
杨阳
陈旭
陈泽聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xunce Technology Co ltd
Original Assignee
Shenzhen Xunce Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xunce Technology Co ltd filed Critical Shenzhen Xunce Technology Co ltd
Priority to CN202211205231.7A priority Critical patent/CN115271972B/en
Publication of CN115271972A publication Critical patent/CN115271972A/en
Application granted granted Critical
Publication of CN115271972B publication Critical patent/CN115271972B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a fund transaction clearing method and a fund transaction clearing system, wherein the method comprises the steps of responding to an obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object; selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time; selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result; and sending the encrypted clearing result to the request end and the verification end, verifying the clearing result received by the request end through the verification end, and performing clearing after verifying the identity of the request end. The clearing model includes a correct clearing model and a plurality of error clearing models. The fund transaction clearing method and the fund transaction clearing system recognize the truth of the access through multi-party participation and dynamic verification so as to improve the safety in fund clearing.

Description

Fund transaction clearing method and system
Technical Field
The application relates to the technical field of information security, in particular to a fund transaction clearing method and a fund transaction clearing system.
Background
At the end of the fund seal period, a large number of clearing requests may occur in a centralized time period, which may result in a sudden increase in server access, which may require higher security measures to validate the requests as they relate to fund security.
In case of a sudden increase in access volume and funds involved, the access may be adulterated with false accesses, which may result in a change in the flow of funds, resulting in a loss of customers. The currently common approach is feature determination. The characteristic judgment needs to be supported by mass data to find the suspicious points of the access, but if the access is a new access or the access is invaded by adopting dynamic change, deception means and the like, the judgment can be failed.
Disclosure of Invention
The application provides a fund transaction clearing method and a fund transaction clearing system, which are used for identifying the authenticity of access in a multi-party participation and dynamic verification mode so as to improve the safety in fund clearing.
The above object of the present application is achieved by the following technical solutions:
in a first aspect, the present application provides a fund transaction clearing method, comprising:
responding to the obtained clearing request, and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
performing a clearing after verifying the identity of the requesting end;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
In a possible implementation manner of the first aspect, the number of the verification terminals is multiple;
in the identity authentication process, the clearing result sent by the request end every time points to different authentication ends.
In a possible implementation manner of the first aspect, the total number of verification ends is M, the number of verification ends participating in an authentication process is N, and 1-N-M-s are constructed;
the verification end participating in the identity verification process each time is randomly selected from all verification ends.
In a possible implementation manner of the first aspect, the clearing result received by the authentication end participating in the identity authentication process includes zero, one, and multiple;
in time series, any two adjacent clearing results are respectively sent to two verification ends.
In a possible implementation manner of the first aspect, when the verification end is selected, the pointing address is obtained after the current time is input into the specified calculation model, and the pointing address points to a certain verification end.
In a possible implementation manner of the first aspect, the verifying end includes an open state and a rejection state;
in the process of one-time verification, two or more verification ends are in an open state.
In a possible implementation manner of the first aspect, at least one verifying terminal is in a rejected state.
In a second aspect, the present application provides a fund transaction clearing device comprising:
the first processing unit is used for responding to the acquired clearing request, analyzing the content in the clearing request and obtaining an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
In a third aspect, the present application provides a fund transaction clearing system, comprising:
one or more memories for storing instructions; and
one or more processors configured to call and execute the instructions from the memory, and to execute the method according to the first aspect and any possible implementation manner of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium comprising:
a program for performing the method as described in the first aspect and any possible implementation manner of the first aspect when the program is run by a processor.
In a fifth aspect, the present application provides a computer program product comprising program instructions for executing the method as described in the first aspect and any possible implementation manner of the first aspect, when the program instructions are executed by a computing device.
In a sixth aspect, the present application provides a system on a chip comprising a processor configured to perform the functions recited in the above aspects, such as generating, receiving, sending, or processing data and/or information recited in the above methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices, connected in a wired or wireless manner, or coupled on the same device.
Drawings
FIG. 1 is a block diagram of a framework for a fund platform architecture provided by the present application.
FIG. 2 is a block schematic flow diagram of a method of fund transaction clearing provided herein.
Fig. 3 is a schematic diagram of a process for sending a clearing result to a verification end according to the present application.
Fig. 4 is a schematic diagram of another process for sending a clearing result to a verification end according to the present application.
Fig. 5 is a schematic diagram of receiving a clearing result by an authentication end according to the present application.
Fig. 6 is a schematic diagram of another verifying side receiving a clearing result provided by the present application, in which the verifying side is in a rejected state and indicated by a thick line.
FIG. 7 is a schematic diagram of a clearing result sent to a clearing platform as provided herein.
FIG. 8 is a schematic illustration of another delivery of clearing results to a clearing platform as provided herein.
Detailed Description
The technical solution of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, the fund transaction clearing method disclosed in the present application is applied to a fund platform, and the fund platform is composed of a request end, a verification end, a clearing platform and the like, wherein the request end faces a user, the clearing platform is used for clearing according to a request of the request end, and the verification end is used for verifying the request end in cooperation with the clearing platform.
The number of the request ends is multiple, each request end faces a fixed user, and the users can carry out services such as fund learning, inquiring and purchasing through the request ends belonging to the users. The clearing platform is used for clearing according to a clearing request sent by the request end.
Here, the clearing platform may face a plurality of requesters, or it may be understood that the clearing platform is a platform with a certain open function, which is used for clearing computation. For example, if each fund is provided with clearing resources (statically configured), more clearing resources need to be prepared and cannot be scheduled. However, after the clearing platform is used, the clearing platform can perform dynamic scheduling of clearing resources according to actual use requirements.
For example, the total amount of the liquidation resources that can be scheduled by the liquidation platform is one hundred, and liquidation resources of an appropriate size can be collected for fund liquidation aiming at liquidation requests sent by different request terminals, and after the liquidation requests of one request terminal are completed, the liquidation resources can be configured for liquidation requests sent by other request terminals.
It is apparent that dynamic clearing resource scheduling can meet larger scale usage requirements with a smaller number of clearing resources. However, the fund platform with the architecture needs to be designed in a modularized way, the request end and the clearing platform need to be mutually independent and respectively take charge of tasks belonging to the request end and the clearing platform needs to verify the identity of the request end before clearing, so that on one hand, the situation that clearing resources are consumed in disorder and normal clearing requests cannot be processed is avoided, and on the other hand, fund theft caused by false clearing can also be avoided.
For example, in the full electronic flow process, the functional units are modularized, so that each participating functional unit leaves a use trace in a complete process. For a clearing platform, the authenticity of a clearing request is identified in the clearing process, a pseudo clearing request is provided after the identification is successful, and the use trace of the pseudo clearing request cannot be complete.
Referring to fig. 2, a fund transaction clearing method disclosed in the present application includes the following steps:
s101, responding to the obtained clearing request, analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
s102, selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
s103, selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
s104, sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
s105, performing clearing after the identity of the request end is verified;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged.
Specifically, in step S101, the request end sends a clearing request to the clearing platform, and after receiving the clearing request, the clearing platform parses the content in the clearing request, where the parsed content includes an account name, clearing initiation time, and a clearing object.
The account name has uniqueness, the subsequent processing content can be marked through the account, the marking can enable data in the processing process to have directionality, and the data belonging to one account name can be grouped together.
The clearing initiation time refers to the time for the request terminal to generate or send out the clearing request, and the clearing platform needs to select to carry out unified clearing at a proper time point according to the clearing initiation time. For example, if the current fund mostly adopts the account arrival time of "T + N", then in a trading day, it can be specified that at an expiration time point (for example, six pm), the clearing request received before the expiration time point is processed on the day, and the clearing request received after the expiration time point is carried forward to the next trading day.
A clearing object refers to funds attributed to an account name, e.g., multiple funds under an account name, and the funds to be cleared are the clearing objects referred to above, including the clearing status of the clearing object (expired clearing, mid-course retirement, special retirement, and contracted retirement).
In step S102, the preprocessing time period corresponding to the clearing request is selected according to the clearing initiation time, that is, the above-mentioned description about the deadline. It should also be noted that there are two trigger conditions, a fixed point in time and a fixed throughput, to be cleared.
The fixed time point refers to a unified clearing after the cutoff time point.
The fixed processing amount refers to that after the clearing requests meeting the number are received before the fixed time point, the clearing requests are cleared uniformly, and the triggering mode of the fixed processing amount can avoid that all the calculations are carried out after the deadline time point.
In step S103, the clearing platform will select a clearing model according to the clearing object, and then use the clearing model to clear the clearing request and obtain the clearing result. The clearing model is prefabricated in the clearing platform in advance, namely at the beginning of the design of each fund, the clearing model is designed aiming at the clearing modes (due clearing, midway withdrawal, special withdrawal and appointment withdrawal) of the fund.
In the subsequent clearing process, the corresponding clearing model is directly called, and clearing can be directly carried out, so that the clearing process does not need manual participation, and data abnormity or fund flow abnormity caused by accidental authorization is avoided. Meanwhile, the method can also shorten the fund clearing process and time.
In step S104, the clearing platform sends the encrypted clearing result to the request end and the verifying end, and verifies the clearing result received by the request end through the verifying end, specifically, the request end sends the received clearing result to the verifying end, the verifying end receives the clearing result sent by the clearing platform after receiving the clearing result sent by the request end, the verifying end compares the two clearing results and sends the comparison result to the clearing platform, the comparison result is consistent, it indicates that the request end is true, otherwise, it indicates that the request end is false.
When the clearing platform selects the clearing model, a correct clearing model and a plurality of error clearing models are selected, wherein the correct clearing model refers to the clearing model which is selected according to the clearing object and corresponds to the clearing object, and the error clearing model refers to the clearing models except the correct clearing model.
These selected correct calculation models are randomly arranged with the error calculation models, for example, the number of the error calculation models is four, and the correct calculation models may be located at any one position (any one of the first position to the fifth position) in the queue as shown in fig. 3.
The clearing platform sends clearing results to the request end in sequence, the request end also sends clearing results to the verification end in sequence, and the verification end only verifies one clearing model each time.
It should be appreciated that the fake requestor may compute the correct result by public information, etc., which is consistent with the result obtained using the correct clearing model. However, the error clearance model cannot know which clearance model is used, and therefore cannot know the specific result.
The addition of the error clearing model defeats the means of calculating the correct result in advance because a plurality of error results need to be calculated in advance in addition to the correct result, but the calculation of the error result requires the error clearing model which is selected from the clearing model library and can not be known in advance.
The discovery process of the false request end is composed of several reference factors:
1. and if the clearing result sent by the request end is not received within the specified time, the request end is judged to be a fake request end.
2. And (4) limiting the times, wherein the verification end only receives the clearing result sent by the request end once, and if the wrong clearing result is received, the request end is judged to be a fake request end.
In addition, the mode of using the verification end to receive the clearing result sent by the request end and the clearing result sent by the clearing platform has the following advantages:
1. for the verification end, various and high-specification encryption modes can be adopted, and the targeted design can be carried out on encryption and verification;
2. the verification end can be opened when in use and closed when not in use, thereby providing better confidentiality;
3. after the verification end is added, the number of nodes needing to be cracked or controlled is increased, so that the difficulty of successful intrusion is increased suddenly;
4. aiming at the clearing result sent by the request end and the clearing result sent by the clearing platform, the two clearing results can use an asymmetric design, namely the clearing result sent by the request end to the verification end and the clearing result sent by the clearing platform to the verification end can be inconsistent, so that an intruder can not obtain the other clearing result by intercepting one of the clearing results.
After the authenticity of the request end is verified, step S105 is executed, in this step, final clearing is executed, the clearing is to remit the fund into the account designated by the user, and there are two clearing ways, the first is that the bank remits the fund into a supervision account or a transit account, and then the fund is remitted into the account designated by the user through the supervision account or the transit account, or the bank remits the fund into the account designated by the user according to the received list.
Referring to fig. 4, as a specific implementation of the fund transaction clearing method provided by the application, the number of the verification ends is increased to be multiple, and in the process of identity verification, the clearing result sent by the request end each time points to different verification ends.
This may further increase the complexity of the authentication, it being understood that if only one authentication peer is used, the likelihood of exposure of the authentication peer during long-term monitoring increases, which increases the potential risk of authentication fraud. After the number of the verification ends is increased, the verification ends can be prevented from being exposed in a long-term monitoring process, and the probability of discovery of the verification ends is increased due to the fact that the multiple verification ends are monitored at the same time.
The selection modes of the verification end are as follows:
first, the clearing result sent to the requesting end includes a key, and the key points to a fixed verifying end. Thus, after receiving the clearing result, the request end needs to analyze the clearing result to which verifying end the clearing result needs to be sent, the process involves decryption and re-encryption of the clearing result, and if an error re-encryption mode is used, the verifying end can find and identify the fake request end.
And secondly, inputting the current time into a specified calculation model to obtain a pointing address, wherein the pointing address points to a determined verification end.
To further increase the complexity of the authentication end usage, the following approach is used:
it is assumed here that the total number of verification ends is M, the number of verification ends participating in the authentication process is N, and 1-N-M-s, and the verification ends participating in the authentication process each time are randomly selected from all the verification ends. If all verification ends are selected to be monitored, the probability of being discovered is suddenly increased. Because the monitoring mode consumes a large amount of resources to carry out all-weather control, the mode is easy to discover and can be monitored by a behavior analysis system and incorporated into a behavior analysis library as a sample.
It is also easy to find a random heuristic that selects a small range, because it was mentioned in the foregoing that the verifying peer only receives the clearing result sent by the requesting peer once, and if a wrong clearing result is received, it is determined that this requesting peer is a fake requesting peer.
The random probing needs to send data to the verification end, and when the clearing result cannot be known or the probing is performed by using the wrong clearing result, the probing is discovered and then is monitored by the behavior analysis system and is included in the behavior analysis library as a sample.
Referring to fig. 5, as a specific embodiment of the fund transaction clearing method provided by the application, the verification end participating in the identity verification process receives zero, one, or multiple clearing results, and in time sequence, any two adjacent clearing results are respectively sent to two verification ends.
Therefore, the probability of discovering the verification end can be further increased, and it should be understood that from the intrusion perspective, the selection mechanism of the verification end can be reversely calculated by monitoring the way that the verification end receives the verification result sent by the request end, because for a fixed algorithm, when the input is fixed, the output is also fixed, and through calculation of the output, the possibility of algorithm cracking exists.
But the probability of the algorithm being broken is reduced after the complexity of receiving the clearing result at the verifier is increased.
Referring to fig. 6, further, the verifying end includes an open state and a rejection state; in the process of one-time verification, two or more verification ends are in an open state. The purpose of this way is to further reduce the possibility of the verification end selection algorithm being cracked.
For example, in one verification process, several verification terminals participate in the verification process at the same time, but some verification terminals process the open state and can receive the data sent by the request terminal, and some verification terminals process the reject state and do not receive the data sent by the request terminal.
However, from the monitoring point of view, only a few verifying terminals can be monitored to participate in the verifying process, but no determination can be made as to whether the verifying terminals are in an open state or a rejection state. If the false data is used for probing, after any verifying terminal receives the false data, the verifying process is directly closed, and an alarm is triggered. In addition, the rejection status and the receipt of zero clearing results are the same from a monitoring perspective, and the difficulty of the determination is further increased.
That is, in such an architecture, the monitoring can only monitor the appearance and disappearance of the verifying side, but it cannot be determined at all whether the appearing verifying side receives data sent by the requesting side. It should be further noted that, for large-batch centralized malicious accesses, a filtering mechanism may be used to filter the accesses, and intercept the malicious accesses, so as to avoid affecting the normal clearing process.
Further, at least one verifying terminal is in a disabled state, which is a further optimization measure, there is a case where the number of verifying terminals in an on state may be the total number of verifying terminals present, and there is also a potential risk when this is always the case.
The mode that the opening state and the rejection state occur simultaneously is used, so that the complexity of the occurrence and the use of the verification end is higher, and the probability of being cracked is lower. The other aspect explains that the verification end appearing in the one-time verification process can be divided into a use verification end and a matching verification end, and the matching verification end is used for shielding the use verification end so that the use verification end is not easy to find. The higher the complexity of the tissue of the partner verification end, the higher the difficulty of identifying it.
In another possible implementation manner, the request end may send the clearing result to the use verification end and the cooperation verification end at the same time, but only the verification end is used to send the verification result to the clearing platform, as shown in fig. 7, or the verification end is used to send the verification result to the clearing platform, and the cooperation verification end sends the blank verification result to the clearing platform, as shown in fig. 8.
The present application further provides a fund transaction clearing device, comprising:
the first processing unit is used for responding to the obtained clearing request and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiating time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
In one example, the units in any of the above apparatus may be one or more integrated circuits configured to implement the above method, for example: one or more Application Specific Integrated Circuits (ASICs), or one or more Digital Signal Processors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), or a combination of at least two of these integrated circuit forms.
For another example, when a unit in the apparatus can be implemented in the form of a processing element scheduler, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of calling programs. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Various objects such as various messages/information/devices/network elements/systems/devices/actions/operations/procedures/concepts may be named in the present application, it is to be understood that these specific names do not limit the related objects, and the named names may vary according to the circumstances, the context or the usage habit, and the understanding of the technical meaning of the technical terms in the present application should be mainly determined by the functions and technical effects embodied/performed in the technical solutions.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should also be understood that, in various embodiments of the present application, first, second, etc. are used merely to indicate that a plurality of objects are different. For example, the first time window and the second time window are merely to show different time windows. And should not have any influence on the time window itself, and the above-mentioned first, second, etc. should not impose any limitation on the embodiments of the present application.
It is also to be understood that the terminology and/or the description of the various embodiments herein is consistent and mutually inconsistent if no specific statement or logic conflicts exists, and that the technical features of the various embodiments may be combined to form new embodiments based on their inherent logical relationships.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a computer-readable storage medium, which includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned computer-readable storage medium comprises: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
The present application also provides a computer program product comprising instructions that, when executed, cause the clearing apparatus to perform operations of the clearing apparatus corresponding to the above method.
The present application also provides a fund transaction clearing system, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory to perform the method as described above.
The present application further provides a system on a chip comprising a processor configured to perform the functions recited above, such as generating, receiving, transmitting, or processing data and/or information recited in the above-described methods.
The chip system may be formed by a chip, or may include a chip and other discrete devices.
The processor mentioned in any of the above may be a CPU, a microprocessor, an ASIC, or one or more integrated circuits for controlling the execution of the program of the method for transmitting feedback information.
In one possible design, the system-on-chip further includes a memory for storing necessary program instructions and data. The processor and the memory may be decoupled, disposed on different devices respectively, and connected in a wired or wireless manner to support the system on chip to implement various functions in the foregoing embodiments. Alternatively, the processor and the memory may be coupled to the same device.
Optionally, the computer instructions are stored in a memory.
Alternatively, the memory is a storage unit in the chip, such as a register, a cache, and the like, and the memory may also be a storage unit outside the chip in the terminal, such as a ROM or other types of static storage devices that can store static information and instructions, a RAM, and the like.
It will be appreciated that the memory herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
The non-volatile memory may be ROM, programmable Read Only Memory (PROM), erasable Programmable Read Only Memory (EPROM), electrically Erasable Programmable Read Only Memory (EEPROM), or flash memory.
Volatile memory can be RAM, which acts as external cache memory. There are many different types of RAM, such as Static Random Access Memory (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synclink DRAM (SLDRAM), and direct memory bus RAM.
The embodiments of the present invention are preferred embodiments of the present application, and the scope of protection of the present application is not limited by the embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (7)

1. A method of clearing a fund transaction, comprising:
responding to the obtained clearing request, and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result;
sending the encrypted clearing result to a request end and a verification end, and verifying the clearing result received by the request end through the verification end; and
performing a clearing after verifying the identity of the requesting end;
the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are arranged randomly;
the number of the verification ends is multiple; in the identity authentication process, the clearing result sent by the request end each time points to different authentication ends;
the total number of verification ends is M, the number of verification ends participating in the identity verification process is N, and 1-N-M are constructed;
the verification end participating in the identity verification process each time is randomly selected from all verification ends;
when a verification end is selected, the current time is input into the specified calculation model to obtain a pointing address, and the pointing address points to a determined verification end.
2. A fund transaction settlement method according to claim 1, wherein the settlement results received by the verifying side participating in the authentication process comprise zero, one or more;
in time series, any two adjacent clearing results are respectively sent to two verification ends.
3. The fund transaction clearing method according to claim 1, wherein the verifying terminal comprises an open state and a refusal state;
in one verification process, two or more verification ends are in an open state.
4. A method of closing a fund transaction according to claim 3, wherein at least one of the verification terminals is in a refusal state.
5. A fund transaction clearing apparatus, comprising:
the first processing unit is used for responding to the obtained clearing request and analyzing the content in the clearing request to obtain an account name, clearing initiating time and a clearing object;
the second processing unit is used for selecting a preprocessing time period corresponding to the clearing request according to the clearing initiation time;
the third processing unit is used for selecting a clearing model according to the clearing object and clearing the clearing request to obtain a clearing result, wherein the clearing model comprises a correct clearing model and a plurality of error clearing models, and the correct clearing model and the error clearing models are randomly arranged;
a verification unit for transmitting the encrypted clearing result to the request terminal and the verification terminal, and verifying the clearing result received by the request terminal through the verification terminal, an
And the clearing unit is used for performing clearing after the identity of the request end is verified.
6. A fund transaction clearing system, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to retrieve and execute the instructions from the memory, and to perform the method of any of claims 1 to 4.
7. A computer-readable storage medium, wherein the computer-readable storage medium comprises:
program for performing the method according to any one of claims 1 to 4 when the program is run by a processor.
CN202211205231.7A 2022-09-30 2022-09-30 Fund transaction clearing method and system Active CN115271972B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211205231.7A CN115271972B (en) 2022-09-30 2022-09-30 Fund transaction clearing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211205231.7A CN115271972B (en) 2022-09-30 2022-09-30 Fund transaction clearing method and system

Publications (2)

Publication Number Publication Date
CN115271972A CN115271972A (en) 2022-11-01
CN115271972B true CN115271972B (en) 2023-03-07

Family

ID=83757837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211205231.7A Active CN115271972B (en) 2022-09-30 2022-09-30 Fund transaction clearing method and system

Country Status (1)

Country Link
CN (1) CN115271972B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458559A (en) * 2019-07-08 2019-11-15 阿里巴巴集团控股有限公司 Transaction data processing method, device, server and storage medium
CN114422139A (en) * 2021-12-17 2022-04-29 上海浦东发展银行股份有限公司 API gateway request security verification method and device, electronic equipment and computer readable medium
CN115082178A (en) * 2022-06-28 2022-09-20 平安银行股份有限公司 Account checking and clearing method, system, electronic equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3743874A1 (en) * 2018-01-22 2020-12-02 Baton Systems, Inc. Clearing systems and methods
US20200272619A1 (en) * 2019-02-21 2020-08-27 Fiducia DLT LTD Method and system for audit and payment clearing of electronic trading systems using blockchain database
CN110910134B (en) * 2019-10-25 2021-08-27 网联清算有限公司 Payment processing system and method
US11588617B2 (en) * 2020-11-01 2023-02-21 The Toronto-Dominion Bank Validating confidential data using homomorphic computations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458559A (en) * 2019-07-08 2019-11-15 阿里巴巴集团控股有限公司 Transaction data processing method, device, server and storage medium
CN114422139A (en) * 2021-12-17 2022-04-29 上海浦东发展银行股份有限公司 API gateway request security verification method and device, electronic equipment and computer readable medium
CN115082178A (en) * 2022-06-28 2022-09-20 平安银行股份有限公司 Account checking and clearing method, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115271972A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
US20220038446A1 (en) Identity Proofing and Portability on Blockchain
US9888007B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
US10250583B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score
CN106357612B (en) Authentication record checking method and device based on publicly-owned block chain
US9852427B2 (en) Systems and methods for sanction screening
CN109067791B (en) User identity authentication method and device in network
US9818116B2 (en) Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud
EP3571620A1 (en) Detecting electronic intruders via updatable data structures
US20180033010A1 (en) System and method of identifying suspicious user behavior in a user's interaction with various banking services
US9235840B2 (en) Electronic transaction notification system and method
ES2917749T3 (en) Computer method and product and methods for the generation and selection of access rules
AU2018100482A4 (en) Systems and methods for personal identification and verification
KR102286473B1 (en) Virtual asset verification module, virtual asset transaction system including the same, and method thereof
US10826891B1 (en) Contextual and time sensitive out of band transactional signing
US11354669B2 (en) Collaborative analytics for fraud detection through a shared public ledger
CN111767578A (en) Data inspection method, device and equipment
CN111899100B (en) Service control method, device and equipment and computer storage medium
US20240048582A1 (en) Blockchain data breach security and cyberattack prevention
Kairaldeen et al. Data integrity time optimization of a blockchain IoT smart home network using different consensus and hash algorithms
US11954218B2 (en) Real-time access rules using aggregation of periodic historical outcomes
CN110084665A (en) It rents a house method of commerce, device, electronic equipment and computer readable storage medium
CN115271972B (en) Fund transaction clearing method and system
Song et al. Trade Dependence, Uncertainty Expectations, and Sino–US Political Relations
US20210081961A1 (en) Computer-implemented methods of evaluating task networks
CN111080084A (en) Credit investigation management method, device and storage medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 518000, C6 Floor, Building 1, Shenzhen Software Industry Base, No. 81, 83, and 85 Gaoxin South Tenth Road, Binhai Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province

Patentee after: Shenzhen Xunce Technology Co.,Ltd.

Country or region after: China

Address before: Room 118a, industry university research building, Hong Kong University of science and technology, 9 Yuexing 1st Road, Gaoxin Park, Yuehai street, Nanshan District, Shenzhen, Guangdong 518000

Patentee before: SHENZHEN XUNCE TECHNOLOGY Co.,Ltd.

Country or region before: China