CN116805263A - Two-dimensional code processing method, device, equipment and storage medium - Google Patents

Two-dimensional code processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN116805263A
CN116805263A CN202310809025.5A CN202310809025A CN116805263A CN 116805263 A CN116805263 A CN 116805263A CN 202310809025 A CN202310809025 A CN 202310809025A CN 116805263 A CN116805263 A CN 116805263A
Authority
CN
China
Prior art keywords
client
dimensional code
risk
customer
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310809025.5A
Other languages
Chinese (zh)
Inventor
朱江波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202310809025.5A priority Critical patent/CN116805263A/en
Publication of CN116805263A publication Critical patent/CN116805263A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9035Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides a two-dimensional code processing method, a device, equipment and a storage medium, which can be used in the financial field or other fields. The method comprises the following steps: according to two-dimension code using data in a bank system, a two-dimension code customer set is determined, a plurality of first customer identifications are selected from the two-dimension code customer set, for each first customer, a target two-dimension code corresponding to the first customer and a target two-dimension code duration threshold value are determined according to the two-dimension code using data of the first customer, and for each first customer, the target two-dimension code corresponding to the first customer and the target two-dimension code duration threshold value are sent to terminal equipment used by the first customer. The two-dimension code using data comprise two-dimension codes used by each customer and using time length of each two-dimension code, and the first customer is a customer with transaction risk meeting preset conditions in the two-dimension code customer set.

Description

Two-dimensional code processing method, device, equipment and storage medium
Technical Field
The present application relates to the financial field or other fields, and in particular, to a method, an apparatus, a device, and a storage medium for processing a two-dimensional code.
Background
In recent years, two-dimensional codes have been widely used in application scenarios such as information acquisition, website skipping, advertisement pushing, mobile phone payment, account login and the like because of the characteristics of large storage capacity, high confidentiality, high tracking performance, strong damage resistance, large redundancy, low cost and the like.
Taking a mobile phone payment scene as an example for explanation, when a user pays through a mobile phone on line, the payment software in the mobile phone can be opened, and a payment control in the payment software is clicked, so that the mobile phone displays a two-dimension code for payment. Further, the user needs to place the two-dimensional code displayed by the mobile phone in the acquisition area of the photoelectric scanning device, so that payment is completed.
However, the prior art cannot display the two-dimensional code for payment when the mobile phone is not connected to the network.
Disclosure of Invention
The application provides a two-dimension code processing method, device, equipment and storage medium, which are used for solving the problem that the two-dimension code for payment cannot be displayed when a mobile phone is not connected to a network in the prior art.
In a first aspect, the present application provides a method for processing a two-dimensional code, including:
determining a two-dimensional code client set according to two-dimensional code use data in a banking system, wherein the two-dimensional code use data comprises two-dimensional codes used by each client and use duration of each two-dimensional code, and the two-dimensional code client set comprises identifications of a plurality of clients;
Selecting a plurality of first clients from the two-dimension code client set, wherein the first clients are clients with transaction risks meeting preset conditions in the two-dimension code client set;
for each first customer, determining a target two-dimensional code corresponding to the first customer and a target two-dimensional code duration threshold according to the two-dimensional code usage data of the first customer;
for each first client, a target two-dimensional code corresponding to the first client and a target two-dimensional code duration threshold value are sent to terminal equipment used by the first client, wherein the two-dimensional code duration threshold value is the duration that the terminal equipment can display the target two-dimensional code when not connected with a network.
In a second aspect, the present application provides a processing apparatus for a two-dimensional code, including:
the first processing module is used for determining a two-dimensional code client set according to two-dimensional code use data in a banking system, wherein the two-dimensional code use data comprises two-dimensional codes used by each client and use duration of each two-dimensional code, and the two-dimensional code client set comprises identifiers of a plurality of clients;
the second processing module is used for selecting a plurality of identifiers of first clients from the two-dimensional code client set, wherein the first clients are clients with transaction risks meeting preset conditions in the two-dimensional code client set;
The third processing module is used for determining a target two-dimensional code corresponding to each first customer and a target two-dimensional code duration threshold value according to the two-dimensional code use data of the first customer;
the sending module is used for sending the target two-dimension code corresponding to each first client and a target two-dimension code duration threshold value to terminal equipment used by the first client, wherein the two-dimension code duration threshold value is the duration that the terminal equipment can display the target two-dimension code when not connected with a network.
In a third aspect, the present application provides an electronic device comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method provided by the first aspect and each possible design.
In a fourth aspect, the application provides a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, are adapted to carry out the method provided by the first aspect and each possible design.
According to the two-dimension code processing method, the device, the equipment and the storage medium, a two-dimension code client set is determined according to two-dimension code use data in a bank system, the identifications of a plurality of first clients are selected from the two-dimension code client set, for each first client, a target two-dimension code corresponding to the first client and a target two-dimension code duration threshold value are determined according to the two-dimension code use data of the first client, and for each first client, the target two-dimension code corresponding to the first client and the target two-dimension code duration threshold value are sent to terminal equipment used by the first client. The two-dimensional code using data comprise two-dimensional codes used by each customer and using duration of each two-dimensional code, and the two-dimensional code customer set comprises identifications of a plurality of customers; the first client is a client with transaction risks meeting preset conditions in the two-dimension code client set; the two-dimension code duration threshold is the duration that the terminal equipment can display the target two-dimension code when the terminal equipment is not connected with the network. According to the technical scheme, the two-dimension code customer set using the two-dimension codes is screened through the two-dimension code use data stored when the bank system interacts with the terminal equipment of each customer in history, the first customer with lower transaction risk, the corresponding target two-dimension code and the target two-dimension code duration threshold value are determined according to the transaction risk of each customer in the two-dimension code customer set, the target two-dimension code and the target two-dimension code duration threshold value are sent to the terminal equipment of the corresponding first customer, so that each terminal equipment can call the target two-dimension code when disconnected from the network, the transaction is carried out in the target two-dimension code duration threshold value, and the transaction safety is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic diagram of a graphical user interface provided by an embodiment of the present application;
fig. 2 is a schematic flow chart of a first embodiment of a two-dimensional code processing method according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a second embodiment of a two-dimensional code processing method according to the embodiment of the present application;
fig. 4 is a schematic flow chart of a third embodiment of a two-dimensional code processing method according to the embodiment of the present application;
fig. 5 is a schematic structural diagram of a two-dimensional code processing device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Specific embodiments of the present application have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
The processing method, the device, the equipment and the storage medium of the two-dimensional code can be used in the financial field and can also be used in any field except the financial field, and the application fields of the processing method, the device, the equipment and the storage medium of the two-dimensional code are not limited.
Next, a specific application scenario of the present application will be described.
With the development of internet technology, the user can go out without carrying cash, and when the user needs to pay, the user only needs to open payment software in the mobile phone, and the payment can be completed by scanning the two-dimension code of the merchant or showing the two-dimension code of the payment to the merchant, so that great convenience is provided for the life of the user.
Fig. 1 is a schematic diagram of a graphical user interface according to an embodiment of the present application. As shown in fig. 1, the graphical user interface is displayed by payment software in the terminal device of the user, and the graphical user interface includes a plurality of controls, respectively: sweep, collect payments, transfer accounts, account transfers, my financing, telephone charges, financing, hot activities, deposit management, loans, and more. When a user needs to pay, the user can click the one-sweep control, the terminal equipment responds to the click operation of the user on the one-sweep control, the camera of the terminal equipment is called to collect the payment two-dimensional code of the merchant, and a password input interface is displayed, so that after the user inputs a correct password, the payment is completed. The user can click the receipt and payment control, and the terminal equipment responds to the click operation of the user on the receipt and payment control to display the payment two-dimensional code of the user. The user can place the payment two-dimensional code in the acquisition area of the photoelectric scanning device, so that payment is completed.
However, when the user clicks the control of the graphical user interface, the terminal device needs to respond to the clicking operation of the user on the control, and send a related instruction to the server so as to acquire the information returned by the server. For example, when the user clicks the pay-and-receive control, the terminal device sends a payment two-dimension code acquisition request to the server in response to the click operation of the user on the pay-and-receive control. The server receives a payment two-dimension code acquisition request sent by the terminal equipment, generates a payment two-dimension code and sends the payment two-dimension code to the terminal equipment. And the terminal equipment receives the payment two-dimensional code returned by the server and displays the payment two-dimensional code through a touch screen of the terminal equipment. That is, in the prior art, the payment two-dimension code can be acquired only when the terminal device is connected to the network, and the terminal device cannot acquire and display the payment two-dimension code when the terminal device is not connected to the network.
Based on the technical problems, the application provides a two-dimensional code processing method, a device, equipment and a storage medium, which can analyze two-dimensional code use data stored in a banking system and determine a plurality of users with lower transaction risks. Further, according to the two-dimension code using data of the users, determining the two-dimension codes and the two-dimension code duration thresholds of the users, and sending the two-dimension codes and the two-dimension code duration thresholds to the terminal equipment of the corresponding clients for storage. Therefore, when the terminal equipment of the client cannot be networked, the two-dimension code stored locally can be acquired, the maximum time allowed by the client is the threshold value of the two-dimension code time, the terminal equipment of the client can be ensured to display the two-dimension code when the terminal equipment of the client is not accessed to a website, and the use safety of the two-dimension code is effectively ensured.
The application provides a data transmission method, which aims to solve the technical problems in the prior art.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a first embodiment of a two-dimensional code processing method according to an embodiment of the present application. As shown in fig. 2, the processing method of the two-dimensional code may include the following steps:
s201, determining a two-dimension code client set according to two-dimension code use data in a banking system.
The execution body of the embodiment of the application can be electronic equipment or a processing device of the two-dimensional code arranged in the electronic equipment. The processing device of the two-dimensional code can be realized by software or by combination of software and hardware. For ease of understanding, hereinafter, an execution body will be described as an example of an electronic device.
In the embodiment of the application, in order to solve the problem that the two-dimension code cannot be acquired and displayed when the terminal equipment of the user is not connected to the network in the prior art, the corresponding two-dimension code needs to be sent to the terminal equipment in advance so that the terminal equipment stores the two-dimension code, and when the terminal equipment is not connected to the network, the locally stored two-dimension code can be called for displaying.
In this step, in order to send the two-dimensional code to the terminal device of the user, it is first necessary to determine which users in the banking system have a need to use the two-dimensional code.
Because the user needs to operate the related control (such as the receipt and payment control of fig. 1) of the terminal device when paying by using the two-dimension code each time, the terminal device responds to the operation of the related control by the user and interacts with the banking system, thereby obtaining the two-dimension code generated by the banking system. And the bank system stores two-dimension code use data in the interaction process with the terminal equipment, wherein the two-dimension code use data comprises two-dimension codes used by each customer and the use duration of each two-dimension code.
In one possible implementation manner, two-dimensional code usage data in a banking system is analyzed, identifications of clients contained in the two-dimensional code usage data are extracted, and the extracted identifications of the clients are determined to be a two-dimensional code client set. That is, the two-dimensional code client set includes identifications of a plurality of clients.
S202, selecting a plurality of first customer identifiers from a two-dimension code customer set.
In this step, the risk of the two-dimensional code being stolen is large due to the customer with the large transaction risk. Therefore, in order to further ensure the use safety of the two-dimension code, it is necessary to reject the customer with larger transaction risk in the two-dimension code customer set, reserve the customer with smaller transaction risk, determine the reserved customer as the first customer, and acquire the identification of the first customer. Therefore, the corresponding two-dimensional code and the two-dimensional code duration threshold value are only sent to the first customer, so that the use safety of the two-dimensional code is further ensured.
The transaction risk of the client is judged to be mainly achieved through preset conditions, the transaction risk of the client meeting the preset conditions is small, and on the contrary, the transaction risk of the client not meeting the preset conditions is large. That is, the first client is a client whose transaction risk satisfies a preset condition in the two-dimensional code client set.
In one possible implementation manner, a client risk rule set may be obtained, and a two-dimensional code client risk map corresponding to the two-dimensional code client set is determined according to the client risk map; and determining the identifiers of the plurality of first clients from the two-dimension code client set according to the two-dimension code client risk graph.
It should be understood that the implementation principle and process of S202 will be specifically described in the embodiment shown in fig. 3, and will not be repeated here.
S203, for each first customer, determining a target two-dimensional code corresponding to the first customer and a target two-dimensional code duration threshold according to the two-dimensional code usage data of the first customer.
In this step, after the first client is determined, the two-dimensional code used by the first client needs to be determined, so as to be subsequently transmitted to the terminal device of the first client. After receiving the two-dimension code, the terminal equipment needs to store the two-dimension code so as to directly call the two-dimension code when the terminal equipment is not connected to the network, and the problem that the two-dimension code is stolen when the terminal equipment is used for a long time is solved. Therefore, the electronic device needs to further determine the two-dimension code duration threshold, the two-dimension code duration threshold is the maximum duration of allowing the terminal device to use the two-dimension code, after the duration exceeds the two-dimension code duration threshold, the two-dimension code can fail, that is, a user can not pay through the two-dimension code any more, and the use safety of the two-dimension code is effectively improved.
In one possible implementation manner, a corresponding relationship between a two-dimension code duration threshold and risk entropy can be obtained, for each first client, a target two-dimension code and a two-dimension code duration range of the first client are determined according to two-dimension code usage data of the first client, and the target two-dimension code duration threshold of the first client is determined according to the two-dimension code duration range and the corresponding relationship of the first client.
It should be understood that the implementation principle and process of S203 will be specifically described in the embodiment shown in fig. 4, and will not be described herein.
S204, for each first client, the target two-dimensional code corresponding to the first client and the target two-dimensional code duration threshold value are sent to terminal equipment used by the first client.
In the step, after the target two-dimension code and the target two-dimension code duration threshold value which can be used by each first customer are determined, the target two-dimension code and the target two-dimension code duration threshold value can be sent to terminal equipment used by each first customer, so that the terminal equipment stores the target two-dimension code and the target two-dimension code duration threshold value after receiving the target two-dimension code and calls the target two-dimension code under the condition that the terminal equipment is disconnected, and the purpose of supporting the transaction of the first customer in the two-dimension code duration threshold value is achieved. That is, the two-dimension code duration threshold is the duration that the terminal device can display the target two-dimension code when the terminal device is not connected to the network.
It is understood that after the duration of displaying the target two-dimensional code by the terminal device exceeds the two-dimensional code duration threshold, the two-dimensional code fails, that is, the two-dimensional code does not support the transaction of the first customer at the moment.
According to the two-dimensional code processing method provided by the embodiment of the application, a two-dimensional code client set is determined according to the two-dimensional code use data in a banking system, the identifiers of a plurality of first clients are selected from the two-dimensional code client set, the target two-dimensional code corresponding to the first clients and the target two-dimensional code duration threshold value are determined according to the two-dimensional code use data of the first clients for each first client, and the target two-dimensional code corresponding to the first clients and the target two-dimensional code duration threshold value are sent to terminal equipment used by the first clients for each first client. The two-dimensional code using data comprise two-dimensional codes used by each customer and using duration of each two-dimensional code, and the two-dimensional code customer set comprises identifications of a plurality of customers; the first client is a client with transaction risks meeting preset conditions in the two-dimension code client set; the two-dimension code duration threshold is the duration that the terminal equipment can display the target two-dimension code when the terminal equipment is not connected with the network. According to the technical scheme, the two-dimension code customer set using the two-dimension codes is screened through the two-dimension code use data stored when the bank system interacts with the terminal equipment of each customer in history, the first customer with lower transaction risk, the corresponding target two-dimension code and the target two-dimension code duration threshold value are determined according to the transaction risk of each customer in the two-dimension code customer set, the target two-dimension code and the target two-dimension code duration threshold value are sent to the terminal equipment of the corresponding first customer, so that each terminal equipment can call the target two-dimension code when disconnected from the network, the transaction is carried out in the target two-dimension code duration threshold value, and the transaction safety is improved.
Based on the embodiment shown in fig. 2, S202 will be explained in detail.
Fig. 3 is a schematic flow chart of a second embodiment of a two-dimensional code processing method according to the embodiment of the present application. As shown in fig. 3, S202 may include the steps of:
s301, acquiring a customer risk map of a banking system.
In this step, each node in the customer risk graph corresponds to a customer of the bank system one by one, each directed edge of the customer risk graph is used to connect two nodes, and the transaction risk of the customer corresponding to the head node of any directed edge is higher than the transaction risk of the customer corresponding to the tail node of any directed edge. Therefore, the customer risk graph of the banking system can be obtained, so that the transaction risk relationship of each customer in the two-dimensional code customer set can be determined later according to the customer risk graph.
In one possible implementation manner, S301 may be implemented by the following steps (1) to (3):
and (1) acquiring a client risk rule set.
Alternatively, a plurality of customer relative data may be obtained, and a customer risk rule set is determined from the plurality of customer relative data. Specifically, the method can be realized by the following steps 1 to 2.4:
step 1, determining a plurality of client attribute combinations according to client relative data, wherein each client attribute combination comprises a plurality of client attributes;
Step 2, initializing a client sample data set into a set composed of a plurality of client relative data, and then circularly executing the following steps 2.1 to 2.4 until the client sample data set is empty:
step 2.1, selecting a client relative data from a client sample data set;
step 2.2 for each customer attribute combination, the following steps 2.2.1 to 2.2.2 are performed:
step 2.2.1, setting a rule head and a rule body according to the client relative data and the value corresponding to the client attribute combination, setting a client risk rule corresponding to the client attribute combination by the client relative data, and adding the client risk rule to a potential client risk rule corresponding to the client relative data;
step 2.2.2, selecting the client relative data meeting the client risk rule from the client sample data set, and taking the selected client relative data as the potential client relative data of the client attribute combination corresponding to the client relative data;
step 2.3, selecting a customer attribute combination from all the customer attribute combinations according to the potential customer relative data of the customer attribute combinations corresponding to the customer relative data;
step 2.4, adding the client risk rule of the client attribute combination selected by the client relative data in the potential client risk rules corresponding to the client relative data to a client risk rule set; and deleting the potential customer relative data of the customer attribute combination selected corresponding to the customer relative data from the customer sample dataset.
Wherein the client relative data comprises a binary relationship of attribute values of two clients with respect to respective client attributes and a relative magnitude relationship of transaction risk. Each client attribute corresponds to an attribute value relative relationship, and the attribute value relative relationship of the two clients with respect to the attribute value of the client attribute is determined by the attribute value relative relationship of the client attribute.
For example, assuming that there are a client a and a client B, the client attribute includes an attribute s1, an attribute value relative relationship of the client a and the client B with respect to the client attribute s1 may be that an attribute value of the client a with respect to the attribute s1 is greater than an attribute value of the client B with respect to the attribute s1, and an attribute value relative relationship of the client a and the client B with respect to the client attribute s2 may be that an attribute value of the client a with respect to the attribute s2 is greater than an attribute value of the client B with respect to the attribute s 2. The relative magnitude relationship of the transaction risk of client a and client B may be that the transaction risk of client a is less than the transaction risk of client B.
The client risk rule set comprises a plurality of rules, each rule comprises a rule body and a rule head, each rule corresponds to two variables, each variable corresponds to one client, the rule body of each rule comprises attribute value relative relations which are met by attribute values of client attributes corresponding to the two variables, and the rule head comprises relative magnitude relations of transaction risks between the clients corresponding to the two variables.
For example, assuming that clients corresponding to two variables are client X and client Y, respectively, the corresponding rule body may be that the attribute value of the variable X with respect to the attribute s1 is greater than the attribute value of the variable Y with respect to the attribute s1, and the attribute value of the variable X with respect to the attribute s2 is greater than the attribute value of the variable Y with respect to the attribute s 2; the corresponding rule header may be that the risk of transaction for variable X is less than the risk of transaction for variable Y.
And (2) determining the size relation of transaction risks of any two clients according to the client risk rule set.
And (3) determining a customer risk map according to the size relation of transaction risks of any two customers.
S302, determining a two-dimensional code customer risk map corresponding to the two-dimensional code customer set according to the customer risk map.
In this step, since a part of clients corresponding to the nodes in the client risk graph are clients in the two-dimensional code client set, the other part is clients in the non-two-dimensional code client set. In order to clearly determine the transaction risk of each client in the two-dimensional code client set, part of clients in the non-two-dimensional code client set in the client risk graph needs to be screened out, so that the two-dimensional code client risk graph corresponding to the two-dimensional code client set is determined, and the clients corresponding to each node of the two-dimensional code client risk graph belong to the two-dimensional code client set.
In one possible implementation manner, S302 may be implemented through steps (4) to (6):
and (4) determining a first node corresponding to the client corresponding to the two-dimensional code client set in the client risk graph.
And (5) constructing a second node corresponding to any first node in the two-dimensional code client risk graph, wherein the client corresponding to the second node is the client corresponding to any first node.
And (6) if a directed edge exists between any two first nodes, constructing the directed edge between the second nodes corresponding to any two first nodes in the two-dimensional code customer risk graph, wherein the direction of the directed edge between the second nodes is consistent with that of the directed edge between the corresponding first nodes.
S303, according to the two-dimension code client risk graph, determining the identifiers of a plurality of first clients from the two-dimension code client set.
In this step, since the directed edges of each node in the two-dimensional code client risk graph can indicate the transaction risk of the two corresponding clients, after the two-dimensional code client risk graph is determined, the first client with smaller transaction risk can be determined from the two-dimensional code client set according to the two-dimensional code client risk graph, and the identification of the first client is obtained.
In one possible implementation, S303 may be implemented by steps (7) to (9):
and (7) determining a directed edge corresponding to each node in the two-dimensional code customer risk graph aiming at each node in the two-dimensional code customer risk graph.
And (8) if any node in the two-dimensional code client risk graph is the tail node of all the directed edges corresponding to any node, determining the client corresponding to any node as a second client.
And (9) determining the identification of the plurality of first clients according to the plurality of second clients.
Specifically, for each second client, determining a risk entropy corresponding to the second client according to the transaction data of the second client; determining a risk entropy threshold according to the risk entropy corresponding to each second client (for example, taking the minimum value of the risk entropy corresponding to each second client as the risk entropy threshold); for each client of the two-dimension code client set, determining risk entropy of the client according to transaction data of the client; and determining a first client according to the risk entropy and the risk entropy threshold value of each client, and determining the client in the two-dimensional code client set with the risk entropy smaller than the risk entropy threshold value as the first client by way of example. That is, the preset condition is that the risk entropy is smaller than the risk entropy threshold.
In the above embodiment, the customer risk map of the banking system is obtained, the two-dimensional code customer risk map corresponding to the two-dimensional code customer set is determined according to the customer risk map, and the identifiers of the plurality of first customers are determined from the two-dimensional code customer set according to the two-dimensional code customer risk map. According to the technical scheme, the transaction risk relation among the clients in the two-dimension code client set can be intuitively determined by constructing the two-dimension code client risk graph, and the processing efficiency is improved.
Based on the embodiment shown in fig. 2 or 3, S203 will be explained in detail.
Fig. 4 is a schematic flow chart of a third embodiment of a two-dimensional code processing method according to the embodiment of the present application. As shown in fig. 4, S203 may include the steps of:
s401, acquiring a corresponding relation between a two-dimensional code duration threshold and risk entropy.
In this step, since the risk entropy is used to represent the information amount about the risk when the two-dimensional code is used under the corresponding two-dimensional code duration threshold, and the transaction risk is closely related to the two-dimensional code duration threshold, the larger the two-dimensional code duration threshold is, the larger the transaction risk is. Therefore, the corresponding relation between the two-dimension code duration threshold and the risk entropy can be obtained, so that the corresponding two-dimension code duration threshold can be determined later.
In one possible implementation, S401 may be implemented by steps (10) to (12):
and (10) according to each preset time length value, determining the two-dimensional code using data with the using time length smaller than or equal to the preset time length value in the two-dimensional code using data as the two-dimensional code using data corresponding to the preset time length value.
Optionally, a plurality of time length values (i.e., preset time length values) may be preset, and then two-dimensional code usage data in the banking system may be acquired, and the usage time length of each two-dimensional code may be determined. For each preset time length value, selecting two-dimensional code use data with the use time length smaller than or equal to the preset time length value from the two-dimensional code use data of the bank, and determining the selected two-dimensional code use data as two-dimensional code use data corresponding to the preset time length value.
And (11) determining risk entropy corresponding to the preset time length value according to the two-dimensional code use data corresponding to each preset time length value.
For each preset duration value, selecting risk use data corresponding to the preset duration value from two-dimensional code use data corresponding to the preset duration value; for each risk dimension, selecting the risk use data corresponding to the risk dimension from the risk use data corresponding to the preset time length value; determining the probability corresponding to the risk dimension according to the risk use data corresponding to the risk dimension, wherein the ratio of the transaction number contained in the risk use data corresponding to the risk dimension to the transaction number contained in the two-dimensional code use data corresponding to the preset duration value is used as the probability corresponding to the risk dimension; determining the safety probability corresponding to the preset time length value according to the probability corresponding to each risk dimension, specifically determining the sum of the probabilities corresponding to each risk dimension, and taking the difference between 1 and the determined sum as the safety probability corresponding to the preset time length value; according to the probability corresponding to each risk dimension and the safety probability corresponding to the preset time length value, determining the risk entropy corresponding to the preset time length value according to the following formula:
S is the risk entropy corresponding to the preset duration value, p j The probability corresponding to the j-th risk dimension, and q is the safety probability corresponding to the preset duration value.
And (12) determining the corresponding relation between the two-dimensional code duration threshold and the risk entropy according to the risk entropy corresponding to each preset duration value.
S402, for each first client, determining a target two-dimensional code and a two-dimensional code duration range of the first client according to the two-dimensional code use data of the first client.
In this step, since the two-dimensional code used by the first customer at each payment is the same, after determining the first customer, the target two-dimensional code of the first customer needs to be obtained according to the two-dimensional code usage data of the first customer. Further, as the corresponding relation between the two-dimension code duration threshold and the risk entropy is obtained, the target two-dimension code duration threshold of the target two-dimension code is determined according to the corresponding relation between the two-dimension code duration threshold and the risk entropy. The time length range of the two-dimensional code also needs to be determined, so that the time length of each time of using the two-dimensional code in the two-dimensional code using data needs to be determined.
S403, for each first client, determining a target two-dimensional code duration threshold of the first client according to the two-dimensional code duration ranges and the corresponding relation of the first clients.
In this step, after determining the duration range of the target two-dimensional code, the possible range of the target two-dimensional code duration threshold of the first client may be defined according to the duration range of the target two-dimensional code, so as to determine the target two-dimensional code duration threshold of the first client according to the corresponding relationship.
In one possible implementation manner, determining a duration range of a first client about a corresponding relation according to a corresponding relation between a two-dimensional code duration threshold and risk entropy and the two-dimensional code duration range of the first client; determining a plurality of minimum value points corresponding to the corresponding relationship between the two-dimension code duration threshold and the risk entropy in the duration range of the first customer about the corresponding relationship according to the corresponding relationship between the two-dimension code duration threshold and the risk entropy; and determining a two-dimensional code duration threshold of the first client according to the determined minimum value points and the risk entropy corresponding to the extreme value points in the corresponding relation.
The corresponding relation between the two-dimensional code duration threshold and the risk entropy is regarded as a function, the two-dimensional code duration threshold is an independent variable, and the risk entropy is a function value. The minimum value point is the concept of the minimum value point in mathematics: and (3) one field of the two-dimensional code duration threshold corresponding to the minimum value point exists, and the minimum risk entropy corresponding to the extreme point is satisfied in all risk entropy corresponding to the field of the corresponding relation.
In the above embodiment, by acquiring the correspondence between the two-dimensional code duration threshold and the risk entropy, for each first customer, the target two-dimensional code and the two-dimensional code duration range of the first customer are determined according to the two-dimensional code usage data of the first customer, and for each first customer, the target two-dimensional code duration threshold of the first customer is determined according to the two-dimensional code duration range and the correspondence of the first customer. According to the technical scheme, the target two-dimensional code duration threshold corresponding to the target two-dimensional code of the first client is determined according to the corresponding relation between the two-dimensional code duration threshold and the risk entropy and the two-dimensional code duration range of the first client, and the target two-dimensional code duration threshold is the maximum display duration of the target two-dimensional code in the terminal equipment, so that the use safety of the two-dimensional code can be effectively guaranteed.
The following are examples of the apparatus of the present application that may be used to perform the method embodiments of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the method of the present application.
Fig. 5 is a schematic structural diagram of a two-dimensional code processing device according to an embodiment of the present application. As shown in fig. 5, the processing device 500 for two-dimensional code includes:
The first processing module 501 is configured to determine a two-dimensional code customer set according to two-dimensional code usage data in a banking system, where the two-dimensional code usage data includes two-dimensional codes used by each customer and a usage time length of each two-dimensional code, and the two-dimensional code customer set includes identifiers of a plurality of customers.
The second processing module 502 is configured to select a plurality of identifiers of a first client from the two-dimensional code client set, where the first client is a client whose transaction risk in the two-dimensional code client set meets a preset condition.
The third processing module 503 is configured to determine, for each first customer, a target two-dimensional code corresponding to the first customer and a target two-dimensional code duration threshold according to the two-dimensional code usage data of the first customer.
The sending module 504 is configured to send, for each first client, a target two-dimensional code corresponding to the first client and a target two-dimensional code duration threshold to a terminal device used by the first client, where the two-dimensional code duration threshold is a duration that the terminal device can display the target two-dimensional code when the terminal device is not connected to the network.
In one possible implementation, the second processing module 502 is specifically configured to:
the method comprises the steps of obtaining a client risk graph of a banking system, wherein each node in the client risk graph corresponds to a client of the banking system one by one, each directed edge of the client risk graph is used for connecting two nodes, and the transaction risk of the client corresponding to the head node of any directed edge is higher than the transaction risk of the client corresponding to the tail node of any directed edge.
And determining a two-dimensional code customer risk map corresponding to the two-dimensional code customer set according to the customer risk map, wherein the customers corresponding to each node of the two-dimensional code customer risk map belong to the two-dimensional code customer set.
And determining the identifiers of the plurality of first clients from the two-dimension code client set according to the two-dimension code client risk graph.
In one possible implementation, the second processing module 502 is specifically configured to:
the method comprises the steps of obtaining a client risk rule set, wherein the client risk rule set comprises a plurality of rules, each rule comprises a rule body and a rule head, the rule body of each rule corresponds to two variables, each variable corresponds to one client, the rule head of each rule comprises an attribute value relative relation which is met by attribute values of client attributes corresponding to the two variables, and the risk relative relation is used for describing the size relation of transaction risks between the clients corresponding to the two variables.
And determining the size relation of transaction risks of any two clients according to the client risk rule set.
And determining a customer risk map according to the size relation of transaction risks of any two customers.
In one possible implementation, the second processing module 502 is specifically configured to:
and determining a first node corresponding to the client corresponding to the two-dimensional code client set in the client risk graph.
And constructing a second node corresponding to any first node in the two-dimensional code client risk graph, wherein the client corresponding to the second node is the client corresponding to any first node.
If a directed edge exists between any two first nodes, the directed edge between the second nodes corresponding to the any two first nodes is constructed in the two-dimensional code client risk graph, and the direction of the directed edge between the second nodes is consistent with that of the directed edge between the corresponding first nodes.
In one possible implementation, the second processing module 502 is specifically configured to:
aiming at each node in the two-dimensional code customer risk graph, determining the corresponding directed edge of the node in the two-dimensional code customer risk graph,
if any node in the two-dimensional code client risk graph is the tail node of all the directed edges corresponding to any node, determining the client corresponding to any node as a second client.
And determining the identification of the plurality of first clients according to the plurality of second clients.
In one possible implementation, the third processing module 503 is specifically configured to:
and acquiring a corresponding relation between the two-dimension code duration threshold and risk entropy, wherein the risk entropy is used for representing information quantity related to risks when the two-dimension code is used under the corresponding two-dimension code duration threshold.
For each first customer, determining a target two-dimension code and a two-dimension code duration range of the first customer according to the two-dimension code use data of the first customer.
For each first client, determining a target two-dimension code duration threshold of the first client according to the two-dimension code duration range and the corresponding relation of the first client.
In one possible implementation, the third processing module 503 is specifically configured to:
and according to each preset time length value, determining the two-dimensional code use data with the use time length smaller than or equal to the preset time length value in the two-dimensional code use data as the two-dimensional code use data corresponding to the preset time length value.
And determining the risk entropy corresponding to the preset time length value according to the two-dimensional code use data corresponding to each preset time length value.
And determining the corresponding relation between the two-dimensional code duration threshold and the risk entropy according to the risk entropy corresponding to each preset duration value.
The processing device for the two-dimensional code provided by the embodiment of the application can be used for executing the processing method for the two-dimensional code in any embodiment, and the implementation principle and the technical effect are similar, and are not repeated here.
It should be noted that, it should be understood that the division of the modules of the above apparatus is merely a division of a logic function, and may be fully or partially integrated into a physical entity or may be physically separated. And these modules may all be implemented in software in the form of calls by the processing element; or can be realized in hardware; the method can also be realized in a form of calling software by a processing element, and the method can be realized in a form of hardware by a part of modules. In addition, all or part of the modules may be integrated together or may be implemented independently. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in a software form.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 6, the electronic device 600 may include: the processing method for the two-dimensional code provided by any one of the foregoing embodiments is implemented when the processor 601 executes the computer program instructions.
Alternatively, the above-mentioned devices of the electronic apparatus 600 may be connected by a system bus.
The memory 602 may be a separate memory unit or may be a memory unit integrated into the processor. The number of processors is one or more.
Optionally, the electronic device 600 may also include interfaces to interact with other devices.
It is to be appreciated that the processor 601 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution.
The system bus may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The system bus may be classified into an address bus, a data bus, a control bus, and the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus. The memory may include random access memory (random access memory, RAM) and may also include non-volatile memory (NVM), such as at least one disk memory.
All or part of the steps for implementing the method embodiments described above may be performed by hardware associated with program instructions. The foregoing program may be stored in a readable memory. The program, when executed, performs steps including the method embodiments described above. And the aforementioned memory (storage medium) includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape, floppy disk, optical disk (optical disc), and any combination thereof.
The electronic device 600 provided in the embodiment of the present application may be used to execute the processing method of the two-dimensional code provided in any of the above method embodiments, and its implementation principle and technical effect are similar, and are not described herein again.
The embodiment of the application provides a computer readable storage medium, wherein computer execution instructions are stored in the computer readable storage medium, and when the computer execution instructions run on a computer, the computer is caused to execute the processing method of the two-dimensional code.
The computer readable storage medium described above may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as static random access memory, electrically erasable programmable read-only memory, magnetic memory, flash memory, magnetic disk or optical disk. A readable storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.
In the alternative, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. In the alternative, the readable storage medium may be integral to the processor. The processor and the readable storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuits, ASIC). The processor and the readable storage medium may reside as discrete components in a device.
The embodiment of the application also provides a computer program product, which comprises a computer program, wherein the computer program is stored in a computer readable storage medium, the computer program can be read from the computer readable storage medium by at least one processor, and the processing method of the two-dimensional code can be realized when the computer program is executed by the at least one processor.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. The two-dimensional code processing method is characterized by comprising the following steps of:
determining a two-dimensional code client set according to two-dimensional code use data in a banking system, wherein the two-dimensional code use data comprises two-dimensional codes used by each client and use duration of each two-dimensional code, and the two-dimensional code client set comprises identifications of a plurality of clients;
selecting a plurality of first clients from the two-dimension code client set, wherein the first clients are clients with transaction risks meeting preset conditions in the two-dimension code client set;
for each first customer, determining a target two-dimensional code corresponding to the first customer and a target two-dimensional code duration threshold according to the two-dimensional code usage data of the first customer;
for each first client, a target two-dimensional code corresponding to the first client and a target two-dimensional code duration threshold value are sent to terminal equipment used by the first client, wherein the two-dimensional code duration threshold value is the duration that the terminal equipment can display the target two-dimensional code when not connected with a network.
2. The method of claim 1, wherein selecting the plurality of first customer identities from the set of two-dimensional code customers comprises:
Acquiring a client risk graph of the banking system, wherein each node in the client risk graph corresponds to a client of the banking system one by one, each directed edge of the client risk graph is used for connecting two nodes, and the transaction risk of the client corresponding to the head node of any directed edge is higher than the transaction risk of the client corresponding to the tail node of any directed edge;
determining a two-dimensional code customer risk graph corresponding to the two-dimensional code customer set according to the customer risk graph, wherein customers corresponding to each node of the two-dimensional code customer risk graph belong to the two-dimensional code customer set;
and determining the identifications of a plurality of first clients from the two-dimensional code client set according to the two-dimensional code client risk graph.
3. The method of claim 2, wherein the obtaining a customer risk profile of the banking system comprises:
acquiring a client risk rule set, wherein the client risk rule set comprises a plurality of rules, each rule comprises a rule body and a rule head, the rule body of each rule corresponds to two variables, each variable corresponds to one client, the rule head of each rule comprises an attribute value relative relation which is met by attribute values of client attributes corresponding to the two variables, and the risk relative relation is used for describing the size relation of transaction risks between the clients corresponding to the two variables;
Determining the size relation of transaction risks of any two clients according to the client risk rule set;
and determining the client risk graph according to the size relation of the transaction risks of any two clients.
4. The method according to claim 2 or 3, wherein the determining, according to the client risk map, a two-dimensional code client risk map corresponding to the two-dimensional code client set includes:
determining a first node corresponding to a client corresponding to a two-dimensional code client set in the client risk graph;
constructing a second node corresponding to any first node in the two-dimensional code client risk graph, wherein a client corresponding to the second node is a client corresponding to any first node;
if a directed edge exists between any two first nodes, constructing the directed edge between second nodes corresponding to the any two first nodes in the two-dimensional code client risk graph, wherein the direction of the directed edge between the second nodes is consistent with that of the directed edge between the corresponding first nodes.
5. A method according to claim 2 or 3, wherein the determining, according to the two-dimensional code client risk map, the identities of the plurality of first clients from the two-dimensional code client set includes:
Aiming at each node in the two-dimensional code customer risk graph, determining a directed edge corresponding to the node in the two-dimensional code customer risk graph;
if any node in the two-dimensional code client risk graph is the tail node of all the directed edges corresponding to any node, determining the client corresponding to any node as a second client;
and determining the identification of the plurality of first clients according to the plurality of second clients.
6. The method according to claim 1, wherein the determining, for each first client, the target two-dimensional code corresponding to the first client and the target two-dimensional code duration threshold according to the two-dimensional code usage data of the first client includes:
acquiring a corresponding relation between a two-dimension code duration threshold and a risk entropy, wherein the risk entropy is used for representing information quantity related to risks when the two-dimension code is used under the corresponding two-dimension code duration threshold;
for each first client, determining a target two-dimensional code and a two-dimensional code duration range of the first client according to the two-dimensional code use data of the first client;
for each first client, determining a target two-dimension code duration threshold of the first client according to the two-dimension code duration range of the first client and the corresponding relation.
7. The method of claim 6, wherein the obtaining the correspondence between the two-dimensional code duration threshold and the risk entropy comprises:
according to each preset duration value, determining two-dimensional code use data with the use time length smaller than or equal to the preset duration value in the two-dimensional code use data as two-dimensional code use data corresponding to the preset duration value;
determining a risk entropy corresponding to each preset duration value according to two-dimensional code use data corresponding to each preset duration value;
and determining the corresponding relation between the two-dimensional code duration threshold and the risk entropy according to the risk entropy corresponding to each preset duration value.
8. The utility model provides a processing apparatus of two-dimensional code which characterized in that includes:
the first processing module is used for determining a two-dimensional code client set according to two-dimensional code use data in a banking system, wherein the two-dimensional code use data comprises two-dimensional codes used by each client and use duration of each two-dimensional code, and the two-dimensional code client set comprises identifiers of a plurality of clients;
the second processing module is used for selecting a plurality of identifiers of first clients from the two-dimensional code client set, wherein the first clients are clients with transaction risks meeting preset conditions in the two-dimensional code client set;
The third processing module is used for determining a target two-dimensional code corresponding to each first customer and a target two-dimensional code duration threshold value according to the two-dimensional code use data of the first customer;
the sending module is used for sending the target two-dimension code corresponding to each first client and a target two-dimension code duration threshold value to terminal equipment used by the first client, wherein the two-dimension code duration threshold value is the duration that the terminal equipment can display the target two-dimension code when not connected with a network.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1 to 7.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to carry out the method of any one of claims 1 to 7.
CN202310809025.5A 2023-07-03 2023-07-03 Two-dimensional code processing method, device, equipment and storage medium Pending CN116805263A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310809025.5A CN116805263A (en) 2023-07-03 2023-07-03 Two-dimensional code processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310809025.5A CN116805263A (en) 2023-07-03 2023-07-03 Two-dimensional code processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116805263A true CN116805263A (en) 2023-09-26

Family

ID=88080661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310809025.5A Pending CN116805263A (en) 2023-07-03 2023-07-03 Two-dimensional code processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116805263A (en)

Similar Documents

Publication Publication Date Title
CN113034274A (en) Supply chain financial service system and method based on block chain and terminal equipment
CN105046482A (en) Mobile terminal payment method, device, and system
US8626612B2 (en) Consolidating leads into a lead group
JP7430816B2 (en) Abnormal behavior detection method, device, electronic device and computer program
CN109615384B (en) Method, device and server for generating timeliness check rule
US20230139364A1 (en) Generating user interfaces comprising dynamic base limit value user interface elements determined from a base limit value model
CN113312259B (en) Interface testing method and device
CN110610365A (en) Method and device for identifying transaction request
US11379191B2 (en) Presentation oriented rules-based technical architecture display framework
CN110278241B (en) Registration request processing method and device
CN112035676A (en) User operation behavior knowledge graph construction method and device
CN110827142A (en) User credit evaluation method, system, server and storage medium
CN111539730A (en) Data processing method and device based on block chain and electronic equipment
CN116805263A (en) Two-dimensional code processing method, device, equipment and storage medium
CN111105238A (en) Transaction risk control method and device
CN108156206B (en) Data transfer method, server, client and system
CN111429125B (en) Account management method and device, storage medium and electronic equipment
CN110969518B (en) Clearing account configuration method and device, server and storage medium
CN113159937A (en) Method and device for identifying risks and electronic equipment
US10992701B2 (en) Systems and methods for dynamic targeting of secure repurposed cross-channel electronic communications
CN117010902A (en) Bank customer payment method, equipment and storage medium
US9741059B1 (en) System and method for managing website scripts
US20100169198A1 (en) Billing a lister for leads received from potential renters within a lead threshold
US20240169336A1 (en) Systems and methods for dynamically switching payment mechanisms for outgoing payments
US11922491B1 (en) Generating dynamic base limit value user interface elements determined from a base limit value model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination