CN116882999A - Resource interaction method, device, computer equipment and storage medium - Google Patents

Resource interaction method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN116882999A
CN116882999A CN202310658804.XA CN202310658804A CN116882999A CN 116882999 A CN116882999 A CN 116882999A CN 202310658804 A CN202310658804 A CN 202310658804A CN 116882999 A CN116882999 A CN 116882999A
Authority
CN
China
Prior art keywords
account
resource
interaction
risk period
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310658804.XA
Other languages
Chinese (zh)
Inventor
岑笑影
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202310658804.XA priority Critical patent/CN116882999A/en
Publication of CN116882999A publication Critical patent/CN116882999A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The present disclosure relates to a resource interaction method, apparatus, computer device, storage medium and computer program product. The method is applied to a server, and comprises the following steps: responding to a triggering instruction of the account for resource interaction of a target resource, and acquiring account data of the account; determining a risk period corresponding to the account matched with the account data; and comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining the interactive operation on the target resource according to the comparison result, and executing the resource interaction according to the interactive operation. By adopting the method, the safety and reliability of resource interaction can be improved.

Description

Resource interaction method, device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a resource interaction method, apparatus, computer device, and storage medium.
Background
With the development of information technology, the digital resource interaction mode is widely applied in more and more resource interaction scenes. In a general case, in a resource interaction process, after an account initiates resource interaction through a terminal, a server executes resource interaction operation according to received resource interaction data to realize resource interaction.
However, in some cases, the account may be stolen, and at this time, resource interaction may cause resource loss of the account, the resource of the account cannot be guaranteed, and there is a great hidden danger in the account resource.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a resource interaction method, apparatus, computer device, storage medium, and computer program product that improve the security reliability of resource interaction.
In a first aspect, an embodiment of the present disclosure provides a resource interaction method. The method is applied to a server, and comprises the following steps:
responding to a triggering instruction of the account for resource interaction of a target resource, and acquiring account data of the account;
determining a risk period corresponding to the account matched with the account data;
and comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining the interactive operation on the target resource according to the comparison result, and executing the resource interaction according to the interactive operation.
In one embodiment, the comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining an interaction operation on the target resource according to the comparison result, and executing the resource interaction according to the interaction operation includes:
comparing the sending time corresponding to the trigger instruction with the risk period, determining that the interaction operation on the target resource is sending an authentication instruction to the account when the risk period comprises the sending time, and executing the interaction operation;
and under the condition that a confirmation instruction sent by the account in response to the authentication instruction is received, interacting through the resource.
In one embodiment, after said performing the interaction, further comprising:
and rejecting the resource interaction and sending early warning information to the account under the condition that a confirmation instruction sent by the account in response to the authentication instruction is not received within a preset time period.
In one embodiment, the comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining an interaction operation on the target resource according to the comparison result, and executing the resource interaction according to the interaction operation includes:
and comparing the sending time corresponding to the trigger instruction with the risk period, and under the condition that the risk period does not comprise the sending time, determining the interaction operation on the target resource as the interaction through the resource and executing the interaction operation.
In one embodiment, the determining the risk period corresponding to the account that matches the account data includes:
acquiring a risk period corresponding to a target account under the condition that the target account matched with the account data exists in a preset database, wherein account information and the risk period corresponding to the account are stored in the preset database;
and determining the risk period corresponding to the target account as the risk period of the account.
In a second aspect, the embodiment of the disclosure further provides a resource interaction device. The apparatus is applied to a server, and the apparatus includes:
the acquisition module is used for responding to a triggering instruction of the account on resource interaction of the target resource and acquiring account data of the account;
a determining module, configured to determine a risk period corresponding to the account that matches the account data;
and the comparison module is used for comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining the interactive operation on the target resource according to the comparison result, and executing the resource interaction according to the interactive operation.
In one embodiment, the comparison module includes:
the first comparison sub-module is used for comparing the sending time corresponding to the trigger instruction with the risk period, determining the interaction operation on the target resource as sending the authentication instruction to the account under the condition that the risk period comprises the sending time, and executing the interaction operation;
and the pass module is used for interacting through the resource under the condition that a confirmation instruction sent by the account in response to the authentication instruction is received.
In one embodiment, after the first comparing sub-module, the method further includes:
and the rejecting module is used for rejecting the resource interaction and sending early warning information to the account under the condition that the confirmation instruction sent by the account in response to the authentication instruction is not received within the preset duration.
In one embodiment, the comparison module includes:
and the second comparison sub-module is used for comparing the sending time corresponding to the trigger instruction with the risk period, determining the interaction operation on the target resource to be the interaction through the resource under the condition that the risk period does not comprise the sending time, and executing the interaction operation.
In one embodiment, the determining module includes:
the acquiring sub-module is used for acquiring a risk period corresponding to the target account under the condition that the target account matched with the account data exists in a preset database, wherein account information and the risk period corresponding to the account are stored in the preset database;
and the determining submodule is used for determining the risk period corresponding to the target account as the risk period of the account.
In a third aspect, embodiments of the present disclosure also provide a computer device. The computer device comprises a memory storing a computer program and a processor implementing the steps of the method of any of the embodiments of the present disclosure when the computer program is executed.
In a fourth aspect, embodiments of the present disclosure also provide a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the method of any of the embodiments of the present disclosure.
In a fifth aspect, embodiments of the present disclosure also provide a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of the method according to any of the embodiments of the present disclosure.
The embodiment of the disclosure provides a resource interaction method applied to a server, when performing resource interaction, account data of an account is obtained in response to a triggering instruction of the account on resource interaction of a target resource, a risk period corresponding to the account is determined based on the account data, interactive operation on the target resource is determined according to a comparison result of a sending time corresponding to the triggering instruction and the risk period, the resource interaction is performed according to the determined interactive operation, whether the time when the resource interaction is triggered belongs to the risk period or not can be determined according to the risk period obtained by the account data, and the corresponding interactive operation is performed, so that the risk of stealing the account in the risk period is reduced, the safety and the reliability of the account resource are effectively improved, and the experience of a user is improved.
Drawings
FIG. 1 is a flow diagram of a resource interaction method in one embodiment;
FIG. 2 is a flow diagram of a resource interaction method in one embodiment;
FIG. 3 is a flow diagram of a resource interaction method in one embodiment;
FIG. 4 is a flow diagram of a resource interaction method in one embodiment;
FIG. 5 is a flow diagram of a resource interaction method in one embodiment;
FIG. 6 is a block diagram of a resource interaction device in one embodiment;
fig. 7 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the embodiments of the present disclosure will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the disclosed embodiments and are not intended to limit the disclosed embodiments.
In one embodiment, as shown in fig. 1, there is provided a resource interaction method, which is applied to a server, the method including:
step S110, responding to a triggering instruction of the account for resource interaction of a target resource, and acquiring account data of the account;
in the embodiment of the disclosure, when a user needs to perform resource interaction, a triggering instruction of resource interaction on a target resource is sent through an account, where the user may send the triggering instruction of resource interaction on the target resource through the account at a terminal, for example, when the method described in the embodiment is applied to an entity card resource interaction scene, one entity card corresponds to one account, and the user sends the triggering instruction of resource interaction on the target resource through the account at the corresponding terminal through the entity card. Typically, one account corresponds to one user, and one user may correspond to one or more accounts. And responding to a triggering instruction of the account on the resource interaction of the target resource to acquire account data of the account, wherein the account data can be data stored in a preset storage area in advance or can be obtained by determining according to historical resource interaction data of the account, and the method is not limited. In one example, the account data may include, but is not limited to, account attribute data, identification data of a user to whom the account belongs, and the like.
Step S120, determining a risk period corresponding to the account matched with the account data;
in the embodiment of the disclosure, after account data is acquired, determining a risk period corresponding to an account matched with the account data, wherein the risk period corresponding to the account includes a risk period corresponding to a user to which the account belongs, a corresponding relationship exists between the risk period and the user, and in one example, the association relationship between the risk period and the user can be acquired through a preset database, and user information and the corresponding risk period are stored in the preset database. In one possible implementation manner, the user to whom the account belongs may be determined according to the acquired account data, and the risk period corresponding to the account is determined based on the user to whom the account belongs. In one example, after the account data is obtained, determining whether the account data corresponds to a risk period, and if so, determining the corresponding risk period; if not, determining that the risk period is not.
Step S130, comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining the interactive operation on the target resource according to the comparison result, and executing the resource interaction according to the interactive operation.
In the embodiment of the disclosure, after determining the risk period corresponding to the account, the sending time corresponding to the trigger instruction is compared with the risk period. When a user sends a trigger instruction corresponding to resource interaction through an account, the sending time corresponding to the trigger instruction is recorded, and after the risk period is acquired, the sending time is compared with the risk period. In one example, the comparison result is obtained by comparing whether the risk period includes the transmission time according to the acquired transmission time and the risk period. In one example, the risk period may be determined based on the behavior capability of the user, when the behavior capability of the user is limited in a preset period, the probability of the user performing resource interaction through the account is low, the risk of the resource interaction is high, and the preset period may be determined as the risk period of the account corresponding to the user. In this embodiment, the risk of resource interaction of the account in the risk period is relatively high, so that according to a comparison result between the sending time and the risk period, an interaction operation on the target resource is determined, and resource interaction is performed, wherein different comparison results correspond to different interaction operations, and according to the comparison result, the risk of current resource interaction can be determined, and in one example, when the current resource interaction risk is relatively high, the interaction operation can be determined to be further verified or refused; determining that the current resource interaction risk is low may determine that the interaction operation is a low-intensity verification or through resource interaction.
The embodiment of the disclosure provides a resource interaction method applied to a server, when performing resource interaction, account data of an account is obtained in response to a triggering instruction of the account on resource interaction of a target resource, a risk period corresponding to the account is determined based on the account data, interactive operation on the target resource is determined according to a comparison result of a sending time corresponding to the triggering instruction and the risk period, the resource interaction is performed according to the determined interactive operation, whether the time when the resource interaction is triggered belongs to the risk period or not can be determined according to the risk period obtained by the account data, and the corresponding interactive operation is performed, so that the risk of stealing the account in the risk period is reduced, the safety and the reliability of the account resource are effectively improved, and the experience of a user is improved.
In one embodiment, as shown in fig. 2, the comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining an interaction operation on the target resource according to the comparison result, and executing the resource interaction according to the interaction operation includes:
step S131, comparing the sending time corresponding to the trigger instruction with the risk period, and when the risk period includes the sending time, determining that the interaction operation on the target resource is to send an authentication instruction to the account, and executing the interaction operation;
step S132, under the condition that a confirmation instruction sent by the account in response to the authentication instruction is received, the account is interacted through the resource.
In the embodiment of the disclosure, the sending time corresponding to the trigger instruction is compared with the risk period, when the risk period includes the sending time, the resource interaction can be considered to be sent out in the risk period, the resource interaction has a large risk, in order to ensure the safety and reliability of the resource, the interaction operation on the target resource at the moment is determined to be sending the authentication instruction to the account, and the interaction operation is executed. The sending form of the authentication indication to the account may include, but is not limited to, text, image, sound, and the like, and in one example, the authentication indication, such as a short message, may be sent to a mobile terminal of the user to which the account belongs. The authentication indication is used to instruct the user to further authenticate the resource interaction. And under the condition that a confirmation instruction sent by the account in response to the authentication instruction is received, the resource interaction is indicated to be further confirmed by the user, and the resource interaction is safe and can be realized through the resource interaction. In one example, when the account responds to the authentication instruction to send the confirmation instruction, the user who sends the confirmation instruction is determined to be the user to which the account belongs through authentication, so that the authentication effectiveness is further improved.
According to the embodiment of the disclosure, when the triggering instruction is sent in the risk period, the resource interaction is further authenticated through the authentication instruction, and after the confirmation instruction is received, the security of account resources is ensured, meanwhile, the special condition that the user performs the resource interaction in the risk period is considered, the method and the device are suitable for more application scenes, and the experience of the user is improved.
In one embodiment, as shown in fig. 3, after the performing the interaction, the method further includes:
step S133, refusing the resource interaction and sending early warning information to the account under the condition that the confirmation instruction sent by the account in response to the authentication instruction is not received within the preset time.
In the embodiment of the disclosure, after the authentication instruction is sent, when a confirmation instruction of the account in response to the authentication instruction is not received within a preset time, the user to which the account belongs is indicated that the user does not further confirm the resource interaction at this time, and therefore, the resource interaction is rejected and early warning information is sent to the account, where in an example, the early warning information may include, but is not limited to, a sending time of a triggering instruction of the resource interaction, a sending address, an interaction amount of the resource interaction, and the like. In an example, the preset duration may be determined in advance according to an actual application scenario, and when the confirmation instruction of the account is not received within the preset duration, an operation of rejecting the resource interaction may be performed, without continuing to wait for the confirmation instruction of the account.
According to the embodiment of the disclosure, when the confirmation instruction of the account is not received within the preset time, the risk of the account being stolen is considered to be high, the resource interaction is refused and early warning is carried out, and the safety and reliability of the account resource are ensured; the user to which the account belongs can timely acquire the account abnormal information by sending the early warning information, so that risk hidden danger is eliminated, the safety of account resources is further ensured, and the experience of the user is improved.
In one embodiment, as shown in fig. 4, the comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining an interaction operation on the target resource according to the comparison result, and executing the resource interaction according to the interaction operation includes:
step S134, comparing the sending time corresponding to the trigger instruction with the risk period, and determining that the interaction operation on the target resource is to be performed through the resource interaction and executing the interaction operation if the risk period does not include the sending time.
In the embodiment of the disclosure, the sending time corresponding to the trigger instruction is compared with the risk period, when the risk period does not include the sending time, the trigger instruction of the resource interaction is not sent out in the risk period, the risk of the resource interaction is low, the interaction operation on the target resource is determined to be through the resource interaction, the interaction operation is executed, and the current resource interaction is performed. In one example, when the risk period is absent, the corresponding comparison results are that the risk period does not include the transmission time, indicating that the risk of resource interaction is always low at this time. In one example, the interaction may also be determined to continue with other conventional verification processes through which the resource interacted.
According to the embodiment of the disclosure, when the triggering instruction is not sent in the risk period, the interactive operation is determined to be the interaction through the resource and the interactive operation is executed, so that the security of account resources is ensured, the resource interaction flow is simplified, the resource interaction efficiency is improved, the operability of resource interaction verification is improved, the method and the device are suitable for more application scenes, and the experience of users is improved.
In one embodiment, as shown in fig. 5, the determining the risk period corresponding to the account matched with the account data includes:
step S121, acquiring a risk period corresponding to a target account under the condition that the target account matched with the account data exists in a preset database, wherein account information and the risk period corresponding to the account are stored in the preset database;
step S122, determining the risk period corresponding to the target account as the risk period of the account.
In the embodiment of the disclosure, the risk period corresponding to the account can be determined based on a preset database. Specifically, under the condition that a target account matched with account data exists in a preset database, acquiring a risk period of the target account. In one example, according to the account data, a user to which the account belongs can be determined, whether a target account corresponding to the user to which the account belongs exists in a preset database is searched, and if so, a risk period corresponding to the target account is acquired. In this embodiment, account information of a database account and a risk period corresponding to the account are stored in a preset database, the corresponding risk period is determined according to a target account, and the risk period corresponding to the target account is determined as the risk period of the account. In one example, the accounts in the preset database are database accounts, which are different from the accounts for resource interactions, and typically, one user may correspond to one or more accounts for resource interactions, and one user corresponds to one database account. In one example, the risk period in the preset database may be determined based on the user's behavioral capabilities, e.g., a period in which the user's behavioral capabilities are limited may be determined as its corresponding risk period.
According to the embodiment of the disclosure, the risk period corresponding to the account can be acquired through the preset database, and in the resource interaction process, the risk of the resource interaction is judged by combining the data in the database, so that the method and the device are suitable for more application scenes, the safety and the reliability of the resource interaction are ensured, and the experience of a user is improved.
In one embodiment, the method described in this embodiment may be applied to an entity card resource interaction scenario. Specifically, the entity card corresponds to an account, a user initiates resource interaction at a preset terminal through the entity card, when a triggering instruction of the resource interaction is received, a risk period corresponding to the account is determined from a preset database according to account data of the account corresponding to the entity card, the sending time of the triggering instruction of the resource interaction is compared with the risk period, if the risk period comprises the sending time, further confirmation is needed, an authentication instruction is sent to the account, and after a confirmation instruction corresponding to the authentication instruction is received, other conventional verification processes are continued to complete the resource interaction; and refusing the resource interaction and sending the early warning information when the confirmation instruction is not received. If the risk period does not include the sending time, continuing other conventional verification processes to complete resource interaction. In one example, the authentication indication may be sent to a mobile terminal corresponding to the user to whom the account belongs, and the user to which the account belongs may send the confirmation instruction through the account after passing the authentication on the mobile terminal. In one example, the operation of invoking the preset database is performed after a user authorization in advance. By the method, the risk of embezzling the entity card is effectively reduced, the safety and the reliability of account resources are guaranteed, and the authentication indication is combined, so that the resource interaction under special conditions is considered, and the experience of a user is improved.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least a portion of the steps in the figures may include steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the disclosure also provides a resource interaction device for implementing the above related resource interaction method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more resource interaction devices provided below may refer to the limitation of the resource interaction method hereinabove, and will not be repeated herein.
In one embodiment, as shown in fig. 6, there is provided a resource interaction device 600, the device being applied to a server, the device comprising:
an obtaining module 610, configured to obtain account data of an account in response to a triggering instruction of the account for resource interaction of a target resource;
a determining module 620, configured to determine a risk period corresponding to the account that matches the account data;
and the comparison module 630 is configured to compare the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determine an interaction operation on the target resource according to the comparison result, and execute the resource interaction according to the interaction operation.
In one embodiment, the comparison module comprises:
the first comparison sub-module is used for comparing the sending time corresponding to the trigger instruction with the risk period, determining the interaction operation on the target resource as sending the authentication instruction to the account under the condition that the risk period comprises the sending time, and executing the interaction operation;
and the pass module is used for interacting through the resource under the condition that a confirmation instruction sent by the account in response to the authentication instruction is received.
In one embodiment, after the first comparing sub-module, further comprising:
and the rejecting module is used for rejecting the resource interaction and sending early warning information to the account under the condition that the confirmation instruction sent by the account in response to the authentication instruction is not received within the preset duration.
In one embodiment, the comparison module comprises:
and the second comparison sub-module is used for comparing the sending time corresponding to the trigger instruction with the risk period, determining the interaction operation on the target resource to be the interaction through the resource under the condition that the risk period does not comprise the sending time, and executing the interaction operation.
In one embodiment, the determining module includes:
the acquiring sub-module is used for acquiring a risk period corresponding to the target account under the condition that the target account matched with the account data exists in a preset database, wherein account information and the risk period corresponding to the account are stored in the preset database;
and the determining submodule is used for determining the risk period corresponding to the target account as the risk period of the account.
The modules in the resource interaction device may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing account data, risk period data and the like, which are related to the method in this embodiment. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a resource interaction method.
It will be appreciated by those skilled in the art that the structure shown in fig. 7 is merely a block diagram of a portion of the structure associated with an embodiment of the present disclosure and is not limiting of the computer device to which an embodiment of the present disclosure may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) according to the embodiments of the present disclosure are information and data authorized by the user or sufficiently authorized by each party.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided by the present disclosure may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided by the present disclosure may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided in the present disclosure may be general-purpose processors, central processing units, graphic processors, digital signal processors, programmable logic units, data processing logic units based on quantum computing, and the like, without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few implementations of the disclosed embodiments, which are described in more detail and are not to be construed as limiting the scope of the disclosed embodiments. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made to the disclosed embodiments without departing from the spirit of the disclosed embodiments. Accordingly, the scope of the disclosed embodiments should be determined from the following claims.

Claims (10)

1. A method of resource interaction, the method being applied to a server, the method comprising:
responding to a triggering instruction of the account for resource interaction of a target resource, and acquiring account data of the account;
determining a risk period corresponding to the account matched with the account data;
and comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining the interactive operation on the target resource according to the comparison result, and executing the resource interaction according to the interactive operation.
2. The method according to claim 1, wherein the comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining an interaction operation on the target resource according to the comparison result, and executing the resource interaction according to the interaction operation includes:
comparing the sending time corresponding to the trigger instruction with the risk period, determining that the interaction operation on the target resource is sending an authentication instruction to the account when the risk period comprises the sending time, and executing the interaction operation;
and under the condition that a confirmation instruction sent by the account in response to the authentication instruction is received, interacting through the resource.
3. The method of claim 2, further comprising, after said performing said interoperation:
and rejecting the resource interaction and sending early warning information to the account under the condition that a confirmation instruction sent by the account in response to the authentication instruction is not received within a preset time period.
4. The method according to claim 1, wherein the comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining an interaction operation on the target resource according to the comparison result, and executing the resource interaction according to the interaction operation includes:
and comparing the sending time corresponding to the trigger instruction with the risk period, and under the condition that the risk period does not comprise the sending time, determining the interaction operation on the target resource as the interaction through the resource and executing the interaction operation.
5. The method of claim 1, wherein the determining a risk period corresponding to the account that matches the account data comprises:
acquiring a risk period corresponding to a target account under the condition that the target account matched with the account data exists in a preset database, wherein account information and the risk period corresponding to the account are stored in the preset database;
and determining the risk period corresponding to the target account as the risk period of the account.
6. A resource interaction device, the device being applied to a server, the device comprising:
the acquisition module is used for responding to a triggering instruction of the account on resource interaction of the target resource and acquiring account data of the account;
a determining module, configured to determine a risk period corresponding to the account that matches the account data;
and the comparison module is used for comparing the sending time corresponding to the trigger instruction with the risk period to obtain a comparison result, determining the interactive operation on the target resource according to the comparison result, and executing the resource interaction according to the interactive operation.
7. The apparatus of claim 6, wherein the comparison module comprises:
the first comparison sub-module is used for comparing the sending time corresponding to the trigger instruction with the risk period, determining the interaction operation on the target resource as sending the authentication instruction to the account under the condition that the risk period comprises the sending time, and executing the interaction operation;
and the pass module is used for interacting through the resource under the condition that a confirmation instruction sent by the account in response to the authentication instruction is received.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the resource interaction method of any of claims 1 to 5 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the resource interaction method of any of claims 1 to 5.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the resource interaction method of any of claims 1 to 5.
CN202310658804.XA 2023-06-05 2023-06-05 Resource interaction method, device, computer equipment and storage medium Pending CN116882999A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310658804.XA CN116882999A (en) 2023-06-05 2023-06-05 Resource interaction method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310658804.XA CN116882999A (en) 2023-06-05 2023-06-05 Resource interaction method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116882999A true CN116882999A (en) 2023-10-13

Family

ID=88268762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310658804.XA Pending CN116882999A (en) 2023-06-05 2023-06-05 Resource interaction method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116882999A (en)

Similar Documents

Publication Publication Date Title
JP6783923B2 (en) Methods and devices for managing service operation risk
CN108182581B (en) Accounting method and device for block chain
EP3780541B1 (en) Identity information identification method and device
EP3468134B1 (en) Method and device for identity authentication
US20180359245A1 (en) Communication Method and Apparatus
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN110309661B (en) Sensitive data use authority management method and device based on control flow
WO2019140739A1 (en) Method for determining return visits to client, and electronic apparatus and computer-readable storage medium
CN108366132B (en) Method and device for managing service between servers, computer equipment and storage medium
CN116882999A (en) Resource interaction method, device, computer equipment and storage medium
CN116010926A (en) Login authentication method, login authentication device, computer equipment and storage medium
CN115935414A (en) Block chain based data verification method and device, electronic equipment and storage medium
CN116910731A (en) Resource interaction method, device, computer equipment and storage medium
US9600508B1 (en) Data layer service availability
CN117195175A (en) Application access method, apparatus, computer device, storage medium, and program product
US11874752B1 (en) Methods and systems for facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations
CN117879926A (en) Webpage login security verification method and device and computer equipment
CN116911854A (en) Resource interaction method, device, computer equipment and storage medium
CN117390625A (en) File verification method, device, computer equipment and storage medium
CN116846655A (en) Security detection method and device for login behavior, computer equipment and storage medium
CN115222411A (en) Emergency stop resource transfer method, device, computer equipment and storage medium
CN113791707A (en) Screen capturing method and device of instant messaging system
CN114329515A (en) Data verification method for preventing process jump
CN117081782A (en) Network access method, system, computer equipment and storage medium
CN117034244A (en) Account security authentication method, account security authentication device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination