CN116957588A - Authorization task control method and device, storage medium and electronic device - Google Patents

Authorization task control method and device, storage medium and electronic device Download PDF

Info

Publication number
CN116957588A
CN116957588A CN202310939503.4A CN202310939503A CN116957588A CN 116957588 A CN116957588 A CN 116957588A CN 202310939503 A CN202310939503 A CN 202310939503A CN 116957588 A CN116957588 A CN 116957588A
Authority
CN
China
Prior art keywords
task
authorized
target
target account
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310939503.4A
Other languages
Chinese (zh)
Inventor
王萍
陆晓寅
王斌斌
尹文键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310939503.4A priority Critical patent/CN116957588A/en
Publication of CN116957588A publication Critical patent/CN116957588A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a control method and a device for an authorized task, a storage medium and an electronic device, and relates to the field of financial science and technology, wherein the method comprises the following steps: acquiring task parameters of an authorized task of a target account in a first time period; setting a task set corresponding to a target account to be in a state of prohibiting execution and acquiring a confirmation result of the target account under the condition that a preset target matching condition is met between the task parameter and a preset task parameter threshold; and canceling the execution of the authorized task which is not executed in the first time period under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account number. The application solves the problem of lower safety of task execution in the related technology.

Description

Authorization task control method and device, storage medium and electronic device
Technical Field
The present application relates to the field of financial science and technology, and in particular, to a method and apparatus for controlling an authorization task, a storage medium, and an electronic apparatus.
Background
With the vigorous development of financial services, a plurality of convenient consumption modes are provided for people, such as: swiping cards is a common consumption way in people's daily lives, but swiping cards may not be safe, such as: leakage, theft, etc. of user information occur in the process of swiping cards, and the theft and swiping may occur.
In the related art, to prevent theft, suspicious services are often identified through custom rules, such as: and adopting a list control mode to reject tasks (such as authorization tasks) initiated by the accounts recorded in the list, and controlling tasks initiated by the accounts which are not recorded in the list. In this way, the account initiated tasks that are not recorded in the list cannot be revoked.
Aiming at the problem of lower safety of task execution in the related technology, no effective solution is proposed at present.
Disclosure of Invention
The application mainly aims to provide a control method and device for authorizing tasks, a storage medium and an electronic device, so as to solve the problem of low safety of task execution in the related technology.
In order to achieve the above object, according to one aspect of the present application, there is provided a control method of an authorized task. The method comprises the following steps: acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for indicating the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account; setting a task set corresponding to the target account to be in a state of prohibiting execution and acquiring a confirmation result of the target account under the condition that a preset target matching condition is met between the task parameter and a preset task parameter threshold, wherein the task set comprises the authorized task and/or the target task; and canceling executing the authorized task which is not executed in the first time period under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account number.
Optionally, the acquiring the task parameter of the authorized task of the target account in the first period includes: acquiring the times of the target account number initiating the authorization task in the first time period; or acquiring the times of the associated account requesting to execute the authorized task in the first time period.
Optionally, when the task parameter and a preset task parameter threshold meet a preset target matching condition, setting a task set corresponding to the target account to be in a state of prohibiting execution, where the task set includes one of the following: setting the authorized task initiated by the target account to be in a state of prohibiting execution when a preset first matching condition is met between a first number of times and a preset first number of times threshold, wherein the first number of times is the number of times the target account initiates the authorized task in the first time period, the task parameter threshold comprises the first number of times threshold, the target matching condition comprises the first matching condition, the first matching condition comprises that the first number of times is greater than or equal to the first number of times threshold, or the difference value between the first number of times threshold and the first number of times threshold is smaller than a preset first difference value threshold, and the task parameter threshold comprises the first difference value; and setting the authorized task requested to be executed by the associated account to be in a state of prohibiting the execution under the condition that a preset second matching condition is met between a second time and a preset second time threshold, wherein the second time is the time of the associated account requesting to execute the authorized task in the first time period, the task parameter threshold comprises the second time threshold, the target matching condition comprises the second matching condition, and the second matching condition is used for indicating that the second time is greater than or equal to the second time threshold, or the difference value between the second time threshold and the second time threshold is smaller than a preset second difference value threshold, and the task parameter threshold comprises the second difference value.
Optionally, the setting the authorization task initiated by the target account to be in a state of prohibiting execution includes: setting a temporary lock for the authorized task initiated by the target account, wherein the authorized task provided with the temporary lock is in a state of prohibiting execution.
Optionally, the obtaining the confirmation result of the target account includes: the method comprises the steps of sending information to be confirmed to a terminal where a target application logged in by a target account is located, wherein the information to be confirmed is used for confirming whether an authorized task is a task initiated by the target account or not to the target account, and the information to be confirmed carries an identification of the authorized task, initiation time of the authorized task and an application identification of an application requesting to execute the authorized task; and acquiring the confirmation result returned by the target account in response to the information to be confirmed, wherein the confirmation result carries information which is confirmed by the target account and used for indicating whether the authorized task is a task initiated by the target account or not, or the confirmation result is blank.
Optionally, in the case that the confirmation result is used to indicate that the authorized task is not the task initiated by the target account, cancelling execution of the authorized task that has not been executed in the first period of time includes: when the confirmation result is used for indicating that the authorized task is not the task initiated by the target account or the confirmation result is null, maintaining a temporary lock set for the task in the task set, and acquiring a candidate authorized task set which is initiated by the target account within a target duration of the first time period and is not executed yet, wherein the task provided with the temporary lock is in a state of prohibiting execution; acquiring a target authorized task set from the candidate authorized task set, wherein the target authorized task set is used for recording authorized tasks confirmed by the target account in the candidate authorized task set and not initiated by the target account; canceling executing the authorized tasks in the target authorized task set.
Optionally, the method further comprises: and under the condition that the confirmation result is used for indicating that the authorized task is initiated by the target account, releasing the temporary lock set for the task in the task set, allowing the authorized task to be executed, and allowing the target task to be executed after the authorized task is executed by a second time period.
In order to achieve the above object, according to another aspect of the present application, there is provided a control device for authorizing a task. The device comprises: the acquisition module is used for acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for representing the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account; the processing module is used for setting a task set corresponding to the target account to be in a state of prohibiting execution and acquiring a confirmation result of the target account under the condition that a preset target matching condition is met between the task parameter and a preset task parameter threshold, wherein the task set comprises the authorized task and/or the target task; and the cancellation execution module is used for canceling the execution of the authorized task which is not executed in the first time period under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account.
According to the application, the following steps are adopted: acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for indicating the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account; setting a task set corresponding to a target account to be in a state of prohibiting execution and acquiring a confirmation result of the target account under the condition that a preset target matching condition is met between a task parameter and a preset task parameter threshold, wherein the task set comprises an authorized task and/or a target task; under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account, canceling the execution of the authorized task which is not executed in the first time period, namely under the condition that the task parameter and the preset task parameter threshold meet the preset target matching condition, the authorized task can be indicated to be possibly not initiated by the target account, at the moment, the task in the task set corresponding to the target account is set to be in a state of prohibiting the execution, and the user is confirmed, if the task is confirmed not to be the task initiated by the user, the authorized task which is not executed in the first time period is canceled, and loss is avoided. The problem of low safety of task execution in the related technology is solved. Thereby achieving the effect of improving the safety of task execution.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
fig. 1 is a schematic view of an application scenario of an alternative method for controlling an authorized task according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for controlling an authorized task provided in accordance with an embodiment of the present application;
FIG. 3 is a schematic diagram of an alternative determination of whether a target match condition is met in accordance with an embodiment of the application;
FIG. 4 is a schematic diagram of an alternative method for obtaining a confirmation result of a target account according to an embodiment of the present application;
FIG. 5 is a flowchart of an alternative method for obtaining confirmation of a target account number according to an embodiment of the present application;
FIG. 6 is a schematic diagram of an alternative method of controlling an authorized task according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a control device authorizing a task in accordance with an embodiment of the application;
fig. 8 is a schematic diagram of an alternative electronic device according to an embodiment of the application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In order to explain the application scenario of the authorization task control method in the embodiment of the present application, the following description and description of the application scenario of the authorization task control method in the embodiment of the present application may be applicable to the embodiment of the present application, but not limited to the embodiment of the present application.
Fig. 1 is a schematic application scenario of an alternative method for controlling an authorization task in an embodiment of the present application, as shown in fig. 1, in a normal case, if a target account wants an associated account to execute the target task, the target account may, but is not limited to, initiate an authorization task, and the authorization task may, but is not, in fact, be initiated by the target account, that is, an abnormality occurs, and in such a case, it may, but is not limited to, determine whether the authorization task is initiated by the target account by:
step S101, acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for indicating the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account;
Step S102, setting a task set corresponding to a target account to be in a state of prohibiting execution and obtaining a confirmation result of the target account under the condition that a preset target matching condition is met between a task parameter and a preset task parameter threshold, wherein the task set comprises an authorized task and/or a target task;
in step S103, in the case that the confirmation result is used to indicate that the authorized task is not the task initiated by the target account, the authorized task that has not been executed in the first period of time is canceled.
Through the steps, under the condition that the preset target matching condition is met between the task parameter and the preset task parameter threshold, the fact that the authorized task is possibly not initiated by the target account number can be indicated, at the moment, the task in the task set corresponding to the target account number is set to be in a state of prohibiting execution, and the task is confirmed to the user, if the task is confirmed not to be initiated by the user, the authorized task which is not executed in the first time period is cancelled, and loss is avoided. The problem of low safety of task execution in the related technology is solved. Thereby achieving the effect of improving the safety of task execution.
It should be noted that, related information (including, but not limited to, user equipment information, user personal information, etc.) and data (including, but not limited to, data for presentation, analyzed data, etc.) related to the present disclosure are information and data authorized by a user or sufficiently authorized by each party. For example, an interface is provided between the system and the relevant user or institution, before acquiring the relevant information, the system needs to send an acquisition request to the user or institution through the interface, and acquire the relevant information after receiving the consent information fed back by the user or institution.
The present application will be described with reference to preferred implementation steps, and fig. 2 is a flowchart of a method for controlling an authorized task according to an embodiment of the present application, as shown in fig. 2, where the method includes the following steps:
step S201, acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for representing the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account;
step S202, setting a task set corresponding to the target account to be in a state of prohibiting execution and obtaining a confirmation result of the target account under the condition that a preset target matching condition is met between the task parameter and a preset task parameter threshold, wherein the task set comprises the authorized task and/or the target task;
in step S203, in the case where the confirmation result is used to indicate that the authorized task is not the task initiated by the target account, the authorized task that has not been executed in the first period of time is canceled to be executed.
In the technical solution provided in step S201, the target account may be, but not limited to, an account of the user in the logged-in application, for example: an account number logged in by a user in a payment application (such as a mobile banking application, etc.), or an account number corresponding to a banking card used for payment by the user, etc.
Optionally, in the method for controlling the authorization task provided by the embodiment of the present application, the associated account may be, but not limited to, an account for requesting to execute the target task, where the target account wishes to transfer virtual resources of the target account, the authorization task may be initiated by the target account, the associated account is authorized, and where the authorization is completed, it may be indicated that the associated account is allowed to execute the target task, and where the associated account transfers virtual resources of the target account.
Optionally, in the method for controlling the authorized tasks provided by the embodiment of the present application, the task parameter may be, but not limited to, a trigger number of authorized tasks in a first period, may be, but not limited to, a task parameter of an authorized task of a target account in the first period may be obtained once every first period, and the first period may be, but not limited to, 1 hour, or 30 minutes, or 1 day, etc., by which the method of the present application is not limited.
In one exemplary embodiment, the task parameters of the authorized tasks for the target account number over the first period of time may be, but are not limited to, obtained by: acquiring the times of the target account number initiating the authorization task in the first time period; or acquiring the times of the associated account requesting to execute the authorized task in the first time period.
Optionally, in the method for controlling an authorized task provided by the embodiment of the present application, task parameters of the authorized task of the target account in the first period may be obtained by: and acquiring the number of times of initiating the authorized task by the target account in the first time period, and determining the ratio of the number of times of initiating the authorized task by the target account in the first time period to the duration of the first time period as a task parameter.
Optionally, in the method for controlling an authorized task provided by the embodiment of the present application, task parameters of the authorized task of the target account in the first period may be obtained by: and acquiring the number of times of requesting to execute the authorized task by the associated account in the first time period, and determining the ratio of the number of times of requesting to execute the authorized task by the associated account in the first time period to the duration of the first time period as a task parameter.
In the technical solution provided in step S202, the authorization task requested in the first period may not be requested by the target account, i.e., the authorization task requested in the first period may be requested by other accounts except the target account, which may indicate that the related information of the target account may leak, so that other accounts except the target account attempt to transfer virtual resources of the target account, and in such a case, it is required to determine whether the authorization task is initiated by the target account according to the acquired task parameters in time, so as to avoid causing the other accounts to transfer virtual resources of the target account and loss.
Optionally, in the method for controlling authorized tasks provided in the embodiment of the present application, when a preset target matching condition is satisfied between a task parameter and a preset task parameter threshold, it may be indicated that a target account requests a large number of authorized tasks in a short time, but the number of times of triggering authorized tasks of a normal account is often not increased, that is, the authorized tasks may not be initiated by the target account, where in this case, a task set corresponding to the target account may be set to a state where execution is prohibited, and a task set corresponding to the target account may include, but is not limited to, tasks that allow the target account to request or execute, for example: authorizing tasks, transferring virtual resources of the target account, and the like, in such a way, the situation that other accounts except the target account impersonate the target account to request or execute the tasks is avoided, and the security of the virtual resources of the target account is improved.
Optionally, in the method for controlling an authorized task provided by the embodiment of the present application, while a task set corresponding to a target account is set to a state in which execution is prohibited, a confirmation result of the target account may be obtained, for example: the user with the target account confirms whether the authorized tasks in the first time period are initiated by the user, and the confirmation result of the user is quite reliable, so that the authorized tasks normally initiated by the target account are prevented from being cancelled by mistake, and the accuracy of canceling the authorized tasks is improved.
In an exemplary embodiment, in a case that a preset target matching condition is satisfied between a task parameter and a preset task parameter threshold, the task set corresponding to the target account is set to be in a state of prohibiting execution, which may include, but is not limited to, one of the following cases:
in a first case, under the condition that a preset first matching condition is met between a first number of times and a preset first number of times threshold, the authorized task initiated by the target account is set to be in a state of prohibiting execution, wherein the first number of times is the number of times that the target account initiates the authorized task in the first time period, the task parameter threshold comprises the first number of times threshold, the target matching condition comprises the first matching condition, the first matching condition comprises that the first number of times is greater than or equal to the first number of times threshold, or the difference value between the first number of times threshold and the first number of times threshold is smaller than a preset first difference value threshold, and the task parameter threshold comprises the first difference value.
Optionally, in the method for controlling an authorization task provided by the embodiment of the present application, the method may be, but not limited to, when the number of times that the target account initiates the authorization task in the first period is greater than or equal to the first time threshold, indicating that the authorization task initiated by the target account in the first period is more frequent; alternatively, the difference between the number of times the target account initiates the authorized tasks within the first time period and the first time threshold is less than the first difference threshold, and it may be appreciated that the number of times the target account initiates the authorized tasks within the first time period is already very close to the first time threshold, in which case it may be indicated that the target account initiates the authorized tasks more frequently within the first time period.
And secondly, setting the authorized task requested to be executed by the associated account to be in a state of prohibiting the execution under the condition that a preset second matching condition is met between a second time and a preset second time threshold, wherein the second time is the time of the associated account requesting to execute the authorized task in the first time period, the task parameter threshold comprises the second time threshold, the target matching condition comprises the second matching condition, and the second matching condition is used for indicating that the second time is greater than or equal to the second time threshold, or the difference value between the second time threshold and the second time threshold is smaller than a preset second difference value threshold, and the task parameter threshold comprises the second difference value.
Optionally, in the method for controlling an authorization task provided by the embodiment of the present application, the method may be, but not limited to, when the number of times that the associated account requests to perform the authorization task in the first period is greater than or equal to the second number of times threshold, indicating that the associated account requests to perform the authorization task more frequently in the first period; alternatively, where the difference between the number of times the associated account requests to perform the authorized task within the first time period and the second time threshold is less than the second difference threshold, it may be appreciated that the number of times the associated account requests to perform the authorized task within the first time period is already very close to the second time threshold, in which case it may be indicated that the associated account requests to perform the authorized task within the first time period more frequently.
In order to better understand how to determine that a task parameter and a preset task parameter threshold meet a preset target matching condition in the control method of an authorized task in the embodiment of the present application, a process of determining that the task parameter meets the target matching condition in the embodiment of the present application is explained and described below in conjunction with an optional embodiment.
Fig. 3 is a schematic diagram of an alternative determination of whether a target matching condition is satisfied according to an embodiment of the present application, and as shown in fig. 3, it may be determined whether the target matching condition is satisfied by, but not limited to, the following steps S301 to S304, or steps S306 to S309, or steps S310 to S313.
Step S301, parse the authorization task.
In step S302, the number of times in the first period is counted, and in detail, the number of times of the authorized tasks of the target account in the first period is counted.
In step S303, it is determined whether the number of times is greater than or equal to m1, specifically, whether the number of times of the authorized tasks of the target account in the first period is greater than or equal to m1, where m1 is equal to the first time threshold, if it is determined that the number of times of the authorized tasks of the target account in the first period is greater than or equal to m1, for example: counting the times of 'authorized tasks' in a first time period when a card issuing bank receives the 'authorized' task of a cardholder, and if the times exceed a threshold value m1, considering that the cardholder frequently initiates the authorized task, namely: a suspicious authorization task, characterized as a risk, in which case step S304 is performed; in the case where it is determined that the number of authorized tasks of the target account number in the first period is less than m1, step S305 is performed.
Step S304, determining as suspicious task.
Step S305, task release.
In step S306, statistics of different terminals of the same associated account number in the period t2, specifically, statistics of the number of times that the associated account number requests to execute the authorization task through the terminal (e.g., POS machine) in the period t 2.
In step S307, it is determined whether the number of times is greater than or equal to m3, specifically, whether the number of times the associated account requests to execute the authorized task through the terminal in the t2 period is greater than or equal to m3, and in the case that the number of times the associated account requests to execute the authorized task in the t2 period is greater than or equal to m3, for example: if the same associated account number and the same terminal request to execute the authorization task for a plurality of times within the period of t2, the suspicious authorization task is determined, and in this case, step S308 is executed; in the case where it is determined that the number of authorized tasks of the target account number in the first period is less than m3, step S309 is performed.
Step S308, determining as suspicious task.
Step S309, the task is released.
In step S310, statistics of different terminals of the same associated account number in the period t1, specifically, statistics of the number of times that the associated account number requests to execute the authorization task in the period t 2.
Step S311, determining whether the number of times is greater than or equal to m2, specifically, determining whether the number of times the associated account performs the authorized task within the t2 time period is greater than or equal to m2, where m2 is equal to a second number of times threshold, and executing step S312 if it is determined that the number of times the associated account requests the authorized task to be performed within the t2 time period is greater than or equal to m 2; in case it is determined that the number of authorized tasks of the target account number in the first period is smaller than m2, step S313 is performed.
Step S312, determine as suspicious task.
Step S313, task release.
In such a way, whether the suspicious authorized task exists or not is determined on the dimension of the authorized task which is respectively initiated from the target account, the authorized task which is requested to be executed by the associated account or the authorized task which is requested to be executed by the associated account through the terminal, and in such a way, the accuracy of determining the suspicious authorized task is improved.
In one exemplary embodiment, the authorization task initiated by the target account number may be set to be in a state of prohibiting execution by, but not limited to: setting a temporary lock for the authorized task initiated by the target account, wherein the authorized task provided with the temporary lock is in a state of prohibiting execution.
Optionally, in the method for controlling authorized tasks provided by the embodiment of the present application, temporary locks may be set for each task in a task set corresponding to a target account, where each task in the task set with the temporary locks is in a state of prohibiting execution.
Optionally, in the method for controlling an authorization task provided by the embodiment of the present application, although the authorization task has been initiated, it is monitored that the authorization task initiated by the target account may be stolen by other accounts, and in such a case, a temporary lock is set for the authorization task initiated by the target account, which is not limited to the setting, execution of the authorization task is prohibited, and further, the associated account is prohibited from transferring virtual resources of the target account.
In one exemplary embodiment, the validation of the target account number may be obtained, but is not limited to, by: the method comprises the steps of sending information to be confirmed to a terminal where a target application logged in by a target account is located, wherein the information to be confirmed is used for confirming whether an authorized task is a task initiated by the target account or not to the target account, and the information to be confirmed carries an identification of the authorized task, initiation time of the authorized task and an application identification of an application requesting to execute the authorized task; and acquiring the confirmation result returned by the target account in response to the information to be confirmed, wherein the confirmation result carries information which is confirmed by the target account and used for indicating whether the authorized task is a task initiated by the target account or not, or the confirmation result is blank.
Optionally, in the method for controlling the authorization task provided by the embodiment of the present application, the associated account may, but is not limited to, execute the target task by using a payment application (such as a mobile banking application, etc.) logged in by the associated account, or a payment device (such as a POS (Point of Sale Machine, point-of-sale terminal) device, etc.), and transfer virtual resources of the target account.
Optionally, in the method for controlling an authorization task provided in the embodiment of the present application, in the case that the target account requests a large number of authorization tasks in a short time, the method may, but is not limited to, set a temporary lock for the authorization task initiated by the target account, and send information to be confirmed to a terminal (such as a mobile terminal (mobile phone, PAD, etc.), a personal computer, etc.) where a target application (such as a bank application, a payment application, etc.) logged in by the target account is located, or send information to be confirmed to the target application logged in by the target account, where the information to be confirmed carries an identification of the authorization task (such as a name, a code number, or a serial number of the authorization task, etc.), an initiation time of the authorization task, and an application identification of the application requesting to execute the authorization task (such as a name, a code number, etc. of the payment application, or a name, a code number, etc. of the payment device.
Fig. 4 is a schematic diagram of an alternative method for obtaining a confirmation result of a target account, as shown in fig. 4, where to send information to be confirmed to a terminal 102 where a target application logged in by the target account is located, where the information to be confirmed may include, but is not limited to: "the user who is respected is good, you have initiated the authorization task B through POS machine A in xxx time, ask you to confirm whether the above-mentioned task is initiated by oneself, it is that oneself initiates reply 1, not oneself initiates reply 0, does not reply defaults and is not oneself initiated. The to-be-confirmed information carries the identifier of the authorized task B, the initiating time of the authorized task B and the identifier of the POS machine a requesting to execute the authorized task B, and the user having the target account may, but is not limited to, reply or not reply under the condition that the to-be-confirmed information is received, for example: user reply 0 indicates that the authorized task B was not self-initiated, user reply 1 indicates that the authorized task B was self-initiated, the user does not reply or the content of the reply is empty, and indicates that the authorized task B was not self-initiated. Only the case of user reply 0 is shown in fig. 4.
By means of the method, the target account is clearly known about the authorized task initiated by the user, and it can be understood that the confirmation result of the target account is quite reliable, so that the credibility of the confirmation result is improved, the false cancellation of the authorized task initiated by the user is avoided, and the accuracy of canceling the authorized task is improved.
FIG. 5 is a flowchart of an alternative method for obtaining a confirmation result of a target account, as shown in FIG. 5, where a suspicious authorization task is obtained, it may be determined, but not limited to, by the following steps, whether the authorization task is initiated by the target account:
step S501, a suspicious authorization task triggers the setting of a temporary lock;
step S502, a mobile phone verification code is sent to a target account;
step S503 of determining whether the verification is passed, and in the case of passing the verification, performing steps S504 to S505, and in the case of not passing the verification, performing steps S506 to S507;
step S504, releasing the temporary lock;
step S505, task release;
step S506, the authorization task fails;
step S507, a suspicious theft brush event is registered.
In the technical solution provided in step S203, in the case where the confirmation result is used to indicate that the authorization task is not a task initiated by the target account, it may indicate that the related information of the target account has been leaked, and at this time, other accounts except the target account attempt to transfer the virtual resource of the target account.
Optionally, in the method for controlling authorized tasks provided in the embodiment of the present application, when the confirmation result is used to indicate that the authorized tasks in the first period are tasks initiated by the target account, it may be indicated that the authorized tasks are all initiated by the target account, where in this case, the authorized tasks that have not been executed in the first period may be allowed to be executed, but are not limited to the authorized tasks that have not been executed in the first period.
In one exemplary embodiment, authorized tasks that have not been performed within the first period of time may be canceled by, but are not limited to,: when the confirmation result is used for indicating that the authorized task is not the task initiated by the target account or the confirmation result is null, maintaining a temporary lock set for the task in the task set, and acquiring a candidate authorized task set which is initiated by the target account within a target duration of the first time period and is not executed yet, wherein the task provided with the temporary lock is in a state of prohibiting execution; acquiring a target authorized task set from the candidate authorized task set, wherein the target authorized task set is used for recording authorized tasks confirmed by the target account in the candidate authorized task set and not initiated by the target account; canceling the authorized tasks of the target authorized task set.
Optionally, in the method for controlling an authorized task provided by the embodiment of the present application, when the confirmation result is used to indicate that the authorized task is not a task initiated by the target account, or the confirmation result is null, for example: the confirmation result of the reply of the target account is not received, or the confirmation result of the reply of the target account is null, for example: without carrying any content, in such a case, the set of candidate authorized tasks that have not been performed and that are initiated by the target account number for a target duration of time of 13:00 to 14:00 may be obtained, but not limited to, the target duration may be, but is not limited to, one entire day of the date of 13:00 to 14:00.
Optionally, in the method for controlling authorized tasks provided by the embodiment of the present application, whether the authorized task in the candidate authorized task set is initiated by the target account may be confirmed by the target account, for example: the method comprises the steps of sending information to be confirmed to a terminal where a target application logged in by a target account is located or sending information to be confirmed to the target application logged in by the target account, sending information to be confirmed of all authorization tasks in a candidate authorization task set to the terminal where the target application logged in by the target account is located or to the target application logged in by the target account at one time, sending information to be confirmed of one authorization task in the candidate authorization task set to the terminal where the target application logged in by the target account is located or sending information to be confirmed of at least part of authorization tasks in the candidate authorization task set to the target application logged in by the target account at one time, wherein the information to be confirmed is used for confirming whether the authorization tasks in the candidate authorization task set are tasks initiated by the target account or not, and carrying identification of the authorization tasks, initiation time of the authorization tasks and application identification of the application requesting to execute the authorization tasks in the information to be confirmed; and acquiring a confirmation result returned by the target account in response to the information to be confirmed, wherein the confirmation result carries whether the authorized task in the candidate authorized task set confirmed by the target account is a task initiated by the target account or not or whether the confirmation result is null. For example: the confirmation result of each reply of the target account number carries the confirmation results of all the authorized tasks in the candidate authorized task set, or the confirmation result of each reply of the target account number carries the confirmation result of each authorized task in the candidate authorized task set, or the confirmation result of each reply of the target account number carries the confirmation result of at least the authorized task in the candidate authorized task set. And according to a confirmation result returned by the target account, confirming whether the authorization task in the candidate authorization task set is cancelled.
Such as: in the case of sending to-be-confirmed information of one task in the candidate authorized task set to the terminal where the target application logged in to the target account is located or to the target application logged in to the target account each time, the to-be-confirmed information may include, but is not limited to: "esteem user you good, you at xxx time, initiated authorized task 2 through POS 1, ask you to confirm whether the task was initiated by himself, is that the principal initiates the reply 1, not that the principal initiates the reply 0, and not that the non-reply defaults to the principal initiation. The to-be-confirmed information carries the identifier of the authorized task 2, the initiating time of the authorized task 2 and the identifier of the POS machine 1 requesting to execute the authorized task 2, and the user having the target account may, but is not limited to, reply or not reply under the condition that the to-be-confirmed information is received, for example: user reply 0, indicating that the authorized task 1 was not self-initiated, user reply 1, indicating that the authorized task 2 was self-initiated, the user does not reply or the content of the reply is empty, indicating that the authorized task 2 was not self-initiated, such as: and when the confirmation result of the task 2 is that the task 2 is not initiated by the user, sending the information to be confirmed of the task 3 in the candidate authorized task set to the terminal where the target application logged in by the target account is located or the target application logged in by the target account until the confirmation results of all the tasks in the candidate authorized task set are obtained.
In order to better understand the method for controlling the authorized tasks in the embodiment of the present application, the method for controlling the authorized tasks in the embodiment of the present application is explained and described below with reference to the alternative embodiment, which can be applied to the embodiment of the present application but is not limited to the embodiment of the present application.
Fig. 6 is a schematic diagram of an alternative authorization task control method according to an embodiment of the present application, and as shown in fig. 6, for a case in which a suspicious authorization task is detected and a client refuses authentication, it is basically determined that a piracy event occurs. At this time, the method triggers and checks the total authorized tasks (the tasks which are not yet executed) and the total consumption tasks (such as deduction tasks) in the target duration of the first time period, and after collecting the task information, the method can inform the clients of the confirmation by a phone in a stroke-by-stroke way but not limited to the method. And for the task of confirming the theft brushing, performing authorized task revocation in a small batch mode. According to the characteristics of the authorized task cancellation task, the cancelled authorized task cannot be subjected to the authorized task to complete the target task (such as being unable to deduct money), and in detail, the method can be realized by the following steps:
step S601, scanning suspicious brushing events;
step S602, checking a current day full-quantity authorization task and a consumption type deduction task;
Step S603, summarizing the checking result;
step S604, notifying the customer to confirm each time by telephone;
step S605, the client confirms whether the client is a theft brush, and if the client confirms that the client is a theft brush, the steps S606 to S608 are executed, and if the client confirms that the client is not a theft brush, the steps S609 to S611 are executed;
step S606, registering the confirmation result to the event table;
step S607, traversing the theft brushing event record;
step S608, the system initiates an authorized task revocation;
step S609, releasing the temporary lock;
step S610, registering the confirmation result to the event table;
in step S611, the client retries.
In an exemplary embodiment, the above method further comprises: and under the condition that the confirmation result is used for indicating that the authorized task is initiated by the target account, releasing the temporary lock set for the task in the task set, allowing the authorized task to be executed, and allowing the target task to be executed at a second time interval after the authorized task is executed.
Optionally, in the method for controlling an authorized task provided in the embodiment of the present application, when the confirmation result is used to indicate that the authorized task is initiated by the target account, the temporary lock set for the task in the task set is released, and the authorized task is allowed to be executed, where the time interval between the execution times of the authorized task and the target task may be set to a preset second time period, for example: 1 hour, or 2 hours or 1 day, etc. By the method, the situation that the associated account can be immediately authorized to execute the target task under the condition that the related information of the target account is leaked is avoided, and the probability of loss of virtual resources of the target account is reduced.
According to the method for controlling the authorized tasks, provided by the embodiment of the application, under the condition that the preset target matching condition is met between the task parameter and the preset task parameter threshold, the authorized tasks are possibly not initiated by the target account, at the moment, the tasks in the task set corresponding to the target account are set to be in a state of forbidden execution, and the tasks are confirmed to the user, if the tasks are confirmed not to be initiated by the user, the authorized tasks which are not executed in the first time period are cancelled, so that the loss is avoided. The problem of low safety of task execution in the related technology is solved. Thereby achieving the effect of improving the safety of task execution.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
The embodiment of the application also provides a device for controlling the authorized task, and the device for controlling the authorized task can be used for executing the method for controlling the authorized task. The following describes a control device for authorizing tasks provided by an embodiment of the present application.
Fig. 7 is a schematic diagram of a control device for authorizing tasks according to an embodiment of the application. As shown in fig. 7, the apparatus includes:
the obtaining module 702 is configured to obtain a task parameter of an authorized task of a target account in a first time period, where the task parameter is used to indicate a trigger number of the authorized task in the first time period, the authorized task is used to authorize an associated account to execute a target task corresponding to the target account, and the target task is used to transfer virtual resources of the target account to the associated account;
a processing module 704, configured to set a task set corresponding to the target account to be in a state of prohibiting execution and obtain a confirmation result of the target account when a preset target matching condition is satisfied between the task parameter and a preset task parameter threshold, where the task set includes the authorized task and/or the target task;
and a cancel execution module 706, configured to cancel execution of the authorized task that has not been executed within the first period of time, if the confirmation result is used to indicate that the authorized task is not a task initiated by the target account.
Optionally, in the device for controlling an authorized task provided by the embodiment of the present application, the obtaining module includes: the first acquisition unit is used for acquiring the times of the target account number for initiating the authorization task in the first time period; or the second obtaining unit is used for obtaining the times of the associated account requesting to execute the authorized task in the first time period.
Optionally, in the device for controlling an authorized task provided by the embodiment of the present application, the processing module includes one of the following: a first setting unit, configured to set the authorized task initiated by the target account to be in a state where execution is prohibited if a preset first matching condition is satisfied between a first number and a preset first number threshold, where the first number is a number of times the target account initiates the authorized task in the first period, the task parameter threshold includes the first number threshold, the target matching condition includes the first matching condition, the first matching condition includes that the first number is greater than or equal to the first number threshold, or a difference between the first number threshold and the first number threshold is smaller than a preset first difference threshold, and the task parameter threshold includes the first difference threshold; a second setting unit, configured to set the authorized task requested to be executed by the associated account to be in a state of prohibiting execution if a preset second matching condition is satisfied between a second number of times and a preset second number of times threshold, where the second number of times is a number of times the associated account requests to execute the authorized task in the first period of time, the task parameter threshold includes the second number of times threshold, the target matching condition includes the second matching condition, and the second matching condition is used to indicate that the second number of times is greater than or equal to the second number of times threshold, or a difference value between the second number of times threshold and the second number of times threshold is smaller than a preset second difference value threshold, and the task parameter threshold includes the second difference value.
Optionally, in the device for controlling an authorized task provided in the embodiment of the present application, the first setting unit is configured to: setting a temporary lock for the authorized task initiated by the target account, wherein the authorized task provided with the temporary lock is in a state of prohibiting execution.
Optionally, in the device for controlling an authorized task provided by the embodiment of the present application, the processing module includes: the sending unit is used for sending information to be confirmed to a terminal where a target application logged in by the target account is located, wherein the information to be confirmed is used for confirming whether the authorized task is a task initiated by the target account or not to the target account, and the information to be confirmed carries an identifier of the authorized task, an initiation time of the authorized task and an application identifier of an application requesting to execute the authorized task; and the third acquisition unit is used for acquiring the confirmation result returned by the target account in response to the information to be confirmed, wherein the confirmation result carries information which is confirmed by the target account and used for indicating whether the authorized task is a task initiated by the target account or not, or the confirmation result is null.
Optionally, in the device for controlling an authorized task provided by the embodiment of the present application, the cancellation execution module includes: the holding unit is used for holding a temporary lock set for a task in the task set and acquiring a candidate authorized task set which is initiated by the target account in a target time period of the first time period and is not executed yet when the confirmation result is used for indicating that the authorized task is not the task initiated by the target account or the confirmation result is empty, wherein the task provided with the temporary lock is in a state of prohibiting execution; a fourth obtaining unit, configured to obtain a target authorized task set from the candidate authorized task set, where the target authorized task set is configured to record an authorized task that is confirmed by the target account in the candidate authorized task set and is not initiated by the target account; and the cancellation execution unit is used for canceling and executing the authorized tasks in the target authorized task set.
Optionally, in the device for controlling an authorized task provided by the embodiment of the present application, the device further includes: and the releasing module is used for releasing the temporary lock set for the task in the task set and allowing the authorized task to be executed when the confirmation result is used for indicating that the authorized task is initiated by the target account, and allowing the target task to be executed at a second time interval after the authorized task is executed.
According to the control device for the authorized tasks, provided by the embodiment of the application, under the condition that the preset target matching condition is met between the task parameter and the preset task parameter threshold, the authorized tasks are possibly not initiated by the target account, at the moment, the tasks in the task set corresponding to the target account are set to be in a state of forbidden execution, and the tasks are confirmed to the user, if the tasks are confirmed not to be initiated by the user, the authorized tasks which are not executed in the first time period are cancelled, so that the loss is avoided. The problem of low safety of task execution in the related technology is solved. Thereby achieving the effect of improving the safety of task execution.
The control device for authorizing tasks comprises a processor and a memory, wherein the units are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel may be provided with one or more kernel parameters to enhance the security of task execution (object of the present application).
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
The embodiment of the application provides a computer readable storage medium, on which a program is stored, which when executed by a processor, implements a control method for the authorization task.
The embodiment of the application provides a processor which is used for running a program, wherein the program runs a control method for executing the authorization task.
Fig. 8 is a schematic diagram of an alternative electronic device according to an embodiment of the present application, and as shown in fig. 8, an embodiment of the present application provides an electronic device, where the apparatus includes a processor, a memory, and a program stored on the memory and executable on the processor, and the processor implements the following steps when executing the program: acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for indicating the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account; setting a task set corresponding to the target account to be in a state of prohibiting execution and acquiring a confirmation result of the target account under the condition that a preset target matching condition is met between the task parameter and a preset task parameter threshold, wherein the task set comprises the authorized task and/or the target task; and canceling executing the authorized task which is not executed in the first time period under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account number.
Optionally, the following steps may be implemented when the above processor executes a program: acquiring the times of the target account number initiating the authorization task in the first time period; or acquiring the times of the associated account requesting to execute the authorized task in the first time period.
Optionally, the following steps may be implemented when the above processor executes a program: setting the authorized task initiated by the target account to be in a state of prohibiting execution when a preset first matching condition is met between a first number of times and a preset first number of times threshold, wherein the first number of times is the number of times the target account initiates the authorized task in the first time period, the task parameter threshold comprises the first number of times threshold, the target matching condition comprises the first matching condition, the first matching condition comprises that the first number of times is greater than or equal to the first number of times threshold, or the difference value between the first number of times threshold and the first number of times threshold is smaller than a preset first difference value threshold, and the task parameter threshold comprises the first difference value; and setting the authorized task requested to be executed by the associated account to be in a state of prohibiting the execution under the condition that a preset second matching condition is met between a second time and a preset second time threshold, wherein the second time is the time of the associated account requesting to execute the authorized task in the first time period, the task parameter threshold comprises the second time threshold, the target matching condition comprises the second matching condition, and the second matching condition is used for indicating that the second time is greater than or equal to the second time threshold, or the difference value between the second time threshold and the second time threshold is smaller than a preset second difference value threshold, and the task parameter threshold comprises the second difference value.
Optionally, the following steps may be implemented when the above processor executes a program: setting a temporary lock for the authorized task initiated by the target account, wherein the authorized task provided with the temporary lock is in a state of prohibiting execution.
Optionally, the following steps may be implemented when the above processor executes a program: the method comprises the steps of sending information to be confirmed to a terminal where a target application logged in by a target account is located, wherein the information to be confirmed is used for confirming whether an authorized task is a task initiated by the target account or not to the target account, and the information to be confirmed carries an identification of the authorized task, initiation time of the authorized task and an application identification of an application requesting to execute the authorized task; and acquiring the confirmation result returned by the target account in response to the information to be confirmed, wherein the confirmation result carries information which is confirmed by the target account and used for indicating whether the authorized task is a task initiated by the target account or not, or the confirmation result is blank.
Optionally, the following steps may be implemented when the above processor executes a program: when the confirmation result is used for indicating that the authorized task is not the task initiated by the target account or the confirmation result is null, maintaining a temporary lock set for the task in the task set, and acquiring a candidate authorized task set which is initiated by the target account within a target duration of the first time period and is not executed yet, wherein the task provided with the temporary lock is in a state of prohibiting execution; acquiring a target authorized task set from the candidate authorized task set, wherein the target authorized task set is used for recording authorized tasks confirmed by the target account in the candidate authorized task set and not initiated by the target account; canceling executing the authorized tasks in the target authorized task set.
Optionally, the following steps may be implemented when the above processor executes a program: and under the condition that the confirmation result is used for indicating that the authorized task is initiated by the target account, releasing the temporary lock set for the task in the task set, allowing the authorized task to be executed, and allowing the target task to be executed after the authorized task is executed by a second time period.
The device herein may be a server, PC, PAD, cell phone, etc.
The application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with the method steps of: acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for indicating the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account; setting the task set corresponding to the target account to be in a state of prohibiting execution under the condition that the task parameter and a preset task parameter threshold meet a preset target matching condition, the confirmation result of the target account is obtained, wherein the task set comprises the authorized task and/or the target task; and canceling executing the authorized task which is not executed in the first time period under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account number.
Optionally, the computer program product mentioned above, when executed on a data processing device, is adapted to perform a program initialized with the method steps of: acquiring the times of the target account number initiating the authorization task in the first time period; or acquiring the times of the associated account requesting to execute the authorized task in the first time period.
Optionally, the computer program product mentioned above, when executed on a data processing device, is adapted to perform a program initialized with the method steps of: setting the authorized task initiated by the target account to be in a state of prohibiting execution when a preset first matching condition is met between a first number of times and a preset first number of times threshold, wherein the first number of times is the number of times the target account initiates the authorized task in the first time period, the task parameter threshold comprises the first number of times threshold, the target matching condition comprises the first matching condition, the first matching condition comprises that the first number of times is greater than or equal to the first number of times threshold, or the difference value between the first number of times threshold and the first number of times threshold is smaller than a preset first difference value threshold, and the task parameter threshold comprises the first difference value; and setting the authorized task requested to be executed by the associated account to be in a state of prohibiting the execution under the condition that a preset second matching condition is met between a second time and a preset second time threshold, wherein the second time is the time of the associated account requesting to execute the authorized task in the first time period, the task parameter threshold comprises the second time threshold, the target matching condition comprises the second matching condition, and the second matching condition is used for indicating that the second time is greater than or equal to the second time threshold, or the difference value between the second time threshold and the second time threshold is smaller than a preset second difference value threshold, and the task parameter threshold comprises the second difference value.
Optionally, the computer program product mentioned above, when executed on a data processing device, is adapted to perform a program initialized with the method steps of: setting a temporary lock for the authorized task initiated by the target account, wherein the authorized task provided with the temporary lock is in a state of prohibiting execution.
Optionally, the computer program product mentioned above, when executed on a data processing device, is adapted to perform a program initialized with the method steps of: the method comprises the steps of sending information to be confirmed to a terminal where a target application logged in by a target account is located, wherein the information to be confirmed is used for confirming whether an authorized task is a task initiated by the target account or not to the target account, and the information to be confirmed carries an identification of the authorized task, initiation time of the authorized task and an application identification of an application requesting to execute the authorized task; and acquiring the confirmation result returned by the target account in response to the information to be confirmed, wherein the confirmation result carries information which is confirmed by the target account and used for indicating whether the authorized task is a task initiated by the target account or not, or the confirmation result is blank.
Optionally, the computer program product mentioned above, when executed on a data processing device, is adapted to perform a program initialized with the method steps of: when the confirmation result is used for indicating that the authorized task is not the task initiated by the target account or the confirmation result is null, maintaining a temporary lock set for the task in the task set, and acquiring a candidate authorized task set which is initiated by the target account within a target duration of the first time period and is not executed yet, wherein the task provided with the temporary lock is in a state of prohibiting execution; acquiring a target authorized task set from the candidate authorized task set, wherein the target authorized task set is used for recording authorized tasks confirmed by the target account in the candidate authorized task set and not initiated by the target account; canceling executing the authorized tasks in the target authorized task set.
Optionally, the computer program product mentioned above, when executed on a data processing device, is adapted to perform a program initialized with the method steps of: and under the condition that the confirmation result is used for indicating that the authorized task is initiated by the target account, releasing the temporary lock set for the task in the task set, allowing the authorized task to be executed, and allowing the target task to be executed after the authorized task is executed by a second time period.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (10)

1. A method for controlling an authorized task, comprising:
acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for indicating the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account;
Setting a task set corresponding to the target account to be in a state of prohibiting execution and acquiring a confirmation result of the target account under the condition that a preset target matching condition is met between the task parameter and a preset task parameter threshold, wherein the task set comprises the authorized task and/or the target task;
and canceling executing the authorized task which is not executed in the first time period under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account number.
2. The method of claim 1, wherein the obtaining task parameters of the authorized task for the target account number over the first period of time comprises:
acquiring the times of the target account number initiating the authorization task in the first time period; or alternatively
And acquiring the times of the associated account requesting to execute the authorized task in the first time period.
3. The method according to claim 1, wherein the setting the task set corresponding to the target account number to be in a state of prohibiting execution when a preset target matching condition is satisfied between the task parameter and a preset task parameter threshold value includes one of:
Setting the authorized task initiated by the target account to be in a state of prohibiting execution when a preset first matching condition is met between a first number of times and a preset first number of times threshold, wherein the first number of times is the number of times the target account initiates the authorized task in the first time period, the task parameter threshold comprises the first number of times threshold, the target matching condition comprises the first matching condition, the first matching condition comprises that the first number of times is greater than or equal to the first number of times threshold, or the difference value between the first number of times threshold and the first number of times threshold is smaller than a preset first difference value threshold, and the task parameter threshold comprises the first difference value;
and setting the authorized task requested to be executed by the associated account to be in a state of prohibiting the execution under the condition that a preset second matching condition is met between a second time and a preset second time threshold, wherein the second time is the time of the associated account requesting to execute the authorized task in the first time period, the task parameter threshold comprises the second time threshold, the target matching condition comprises the second matching condition, and the second matching condition is used for indicating that the second time is greater than or equal to the second time threshold, or the difference value between the second time threshold and the second time threshold is smaller than a preset second difference value threshold, and the task parameter threshold comprises the second difference value.
4. A method according to claim 3, wherein said setting the authorized task initiated by the target account to be in a state of prohibited execution comprises:
setting a temporary lock for the authorized task initiated by the target account, wherein the authorized task provided with the temporary lock is in a state of prohibiting execution.
5. The method according to claim 4, wherein the obtaining the confirmation result of the target account number includes:
the method comprises the steps of sending information to be confirmed to a terminal where a target application logged in by a target account is located, wherein the information to be confirmed is used for confirming whether an authorized task is a task initiated by the target account or not to the target account, and the information to be confirmed carries an identification of the authorized task, initiation time of the authorized task and an application identification of an application requesting to execute the authorized task;
and acquiring the confirmation result returned by the target account in response to the information to be confirmed, wherein the confirmation result carries information which is confirmed by the target account and used for indicating whether the authorized task is a task initiated by the target account or not, or the confirmation result is blank.
6. The method according to claim 1, wherein, in the case where the confirmation result is used to indicate that the authorized task is not the task initiated by the target account, canceling the execution of the authorized task that has not been executed in the first period of time includes:
when the confirmation result is used for indicating that the authorized task is not the task initiated by the target account or the confirmation result is null, maintaining a temporary lock set for the task in the task set, and acquiring a candidate authorized task set which is initiated by the target account within a target duration of the first time period and is not executed yet, wherein the task provided with the temporary lock is in a state of prohibiting execution;
acquiring a target authorized task set from the candidate authorized task set, wherein the target authorized task set is used for recording authorized tasks confirmed by the target account in the candidate authorized task set and not initiated by the target account;
canceling executing the authorized tasks in the target authorized task set.
7. The method of claim 6, wherein the method further comprises:
And under the condition that the confirmation result is used for indicating that the authorized task is initiated by the target account, releasing the temporary lock set for the task in the task set, allowing the authorized task to be executed, and allowing the target task to be executed after the authorized task is executed by a second time period.
8. A control device for authorizing a task, comprising:
the acquisition module is used for acquiring task parameters of an authorized task of a target account in a first time period, wherein the task parameters are used for representing the triggering times of the authorized task in the first time period, the authorized task is used for authorizing an associated account to execute a target task corresponding to the target account, and the target task is used for transferring virtual resources of the target account to the associated account;
the processing module is used for setting a task set corresponding to the target account to be in a state of prohibiting execution and acquiring a confirmation result of the target account under the condition that a preset target matching condition is met between the task parameter and a preset task parameter threshold, wherein the task set comprises the authorized task and/or the target task;
And the cancellation execution module is used for canceling the execution of the authorized task which is not executed in the first time period under the condition that the confirmation result is used for indicating that the authorized task is not the task initiated by the target account.
9. A processor, characterized in that the processor is adapted to run a program, wherein the program when run performs the control method of an authorized task according to any one of claims 1 to 7.
10. An electronic device comprising one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-7.
CN202310939503.4A 2023-07-27 2023-07-27 Authorization task control method and device, storage medium and electronic device Pending CN116957588A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310939503.4A CN116957588A (en) 2023-07-27 2023-07-27 Authorization task control method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310939503.4A CN116957588A (en) 2023-07-27 2023-07-27 Authorization task control method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN116957588A true CN116957588A (en) 2023-10-27

Family

ID=88454505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310939503.4A Pending CN116957588A (en) 2023-07-27 2023-07-27 Authorization task control method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN116957588A (en)

Similar Documents

Publication Publication Date Title
CN107645482B (en) Risk control method and device for business operation
CA3061783C (en) Resource transfer method, fund payment method, and electronic device
US8370913B2 (en) Policy-based auditing of identity credential disclosure by a secure token service
EP1947611B1 (en) Settlement terminal and IC card
US20210406909A1 (en) Authorizing transactions using negative pin messages
CN116957588A (en) Authorization task control method and device, storage medium and electronic device
CN116451280A (en) Asset management method and device based on blockchain
RU2412484C2 (en) Secure mobile terminal for electronic transactions and secure electronic transaction system
KR20160110704A (en) Using method for mobile payment and payment service system thereof
JP2015138431A (en) Credit card use limitation system, reading device, credit card use limitation device, limitation terminal, credit card use limitation method, program and storage medium
CN111553788B (en) Capital business processing method and device based on big data, electronic equipment and medium
JP6009982B2 (en) Information processing system, account management server, and information processing method
CN113282671A (en) Claims settlement method and device based on block chain and electronic equipment
CN110738481B (en) Digital asset hosting risk control method, device and storage medium
CN105991611B (en) Account management method and system
CN113591069B (en) Identity authentication method, equipment and medium based on intelligent callback machine
JP7116655B2 (en) System and program
KR100729662B1 (en) Method for administrated credit loan service of smart card
CN107292628B (en) Service implementation method and device
CN116739586A (en) Method for accessing electronic wallet and related device
CN115408670A (en) Method and device for generating digital visitor certificate
CN114997881A (en) Transaction authorization method, device, storage medium and electronic equipment
CN113592492A (en) Block chain-based data transaction safety protection method, equipment and medium
GHOSH et al. DEVICE AND METHOD FOR ACCEPTING CENTRAL BANK DIGITAL CURRENCY (CBDC) IN PAYMENT NETWORKS
CN115439159A (en) Electronic resource object distribution method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination