CN117094722A - Security supervision method and system for online payment - Google Patents

Security supervision method and system for online payment Download PDF

Info

Publication number
CN117094722A
CN117094722A CN202311354951.4A CN202311354951A CN117094722A CN 117094722 A CN117094722 A CN 117094722A CN 202311354951 A CN202311354951 A CN 202311354951A CN 117094722 A CN117094722 A CN 117094722A
Authority
CN
China
Prior art keywords
decryption information
data set
information
transaction bill
bill data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311354951.4A
Other languages
Chinese (zh)
Other versions
CN117094722B (en
Inventor
冼峰
于道勇
张羽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinhui Technology Co ltd
Original Assignee
Shenzhen Xinhui Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xinhui Technology Co ltd filed Critical Shenzhen Xinhui Technology Co ltd
Priority to CN202311354951.4A priority Critical patent/CN117094722B/en
Publication of CN117094722A publication Critical patent/CN117094722A/en
Application granted granted Critical
Publication of CN117094722B publication Critical patent/CN117094722B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Abstract

The disclosure provides a method and a system for safety supervision of online payment, which relate to the online payment technology, wherein the method comprises the following steps: transmitting the transaction bill data set to a safety supervision platform, and generating first encryption information according to a data encryption module; encrypting according to the first encryption information to obtain an encrypted transaction bill data set; configuring first decryption information and second decryption information, wherein the transaction bill data sets after decryption of the first decryption information and the second decryption information show different integrity; determining the first decryption information or the second decryption information according to the authorization of the target user; and sending the decryption information to an agent bank of the target user to acquire a decrypted transaction bill data set. The method can solve the technical problems of low data storage and calling safety of the existing user transaction data management method, can improve the safety of user transaction data storage and management, ensures the safety of user information, and can also help banks to improve the screening accuracy of the paying users.

Description

Security supervision method and system for online payment
Technical Field
The present disclosure relates to online payment technology, and more particularly, to a security proctoring method and system for online payment.
Background
The online payment, also called electronic payment or digital payment, is a payment mode completed through electronic channels such as the Internet, and the shopping experience and efficiency of consumers can be greatly improved through online payment, so that time and energy are saved. Since online payment may be affected by network security problems such as hacking, data leakage, transaction fraud, etc., there is often a situation that user transaction information is revealed, so how to guarantee user privacy and information security is a very critical link.
The existing user transaction data management method has the following defects: the data storage and invocation security is low.
Disclosure of Invention
Therefore, in order to solve the above technical problems, the technical solution adopted in the embodiments of the present disclosure is as follows:
a method of security supervision of online payments, comprising the steps of: recording a transaction bill data set paid on a target user line; the transaction bill data set is sent to a security supervision platform, and first encryption information is generated according to a data encryption module embedded in the security supervision platform, wherein the first encryption information is obtained by taking the target user as a first encryption party and the security supervision platform as a second encryption party through key configuration; encrypting the transaction bill data set according to the first encryption information to obtain an encrypted transaction bill data set; configuring first decryption information and second decryption information according to the first encryption information, wherein the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the display integrity of the transaction bill data set decrypted by the first decryption information and the second decryption information is different; determining first decryption information or second decryption information according to the authorization of the target user; and the security supervision platform sends the first decryption information or the second decryption information to an agent bank of the target user to acquire a decrypted transaction bill data set.
A security proctoring system for online payments, comprising:
the transaction bill data set recording module is used for recording a transaction bill data set paid on a target user line;
the first encryption information generation module is used for sending the transaction bill data set to a security supervision platform and generating first encryption information according to a data encryption module embedded in the security supervision platform, wherein the first encryption information is obtained by taking the target user as a first encryption party and the security supervision platform as a second encryption party through key configuration;
the transaction bill data set encryption module is used for encrypting the transaction bill data set according to the first encryption information to obtain an encrypted transaction bill data set;
the decryption information configuration module is used for configuring first decryption information and second decryption information according to the first encryption information, the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the display integrity of the transaction bill data sets decrypted by the first decryption information and the second decryption information is different;
the target user authorization module is used for determining the first decryption information or the second decryption information according to the target user authorization;
and the decrypted transaction bill data set acquisition module is used for transmitting the first decryption information or the second decryption information to the payroll bank of the target user by the security supervision platform to acquire a decrypted transaction bill data set.
By adopting the technical method, compared with the prior art, the technical progress of the present disclosure has the following points:
the technical problems of low data storage and calling security in the existing user transaction data management method can be solved, and firstly, a transaction bill data set paid on a target user line is obtained; then the transaction bill data set is sent to a safety supervision platform, and a target user is used as a first encryption party through a data encryption module embedded in the safety supervision platform, and the safety supervision platform is used as a second encryption party to carry out key configuration to generate first encryption information; then encrypting the transaction bill data set according to the first encryption information to obtain an encrypted transaction bill data set; configuring first decryption information and second decryption information according to the first encryption information, wherein the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the display integrity of the transaction bill data set decrypted by the first decryption information and the second decryption information is different; determining first decryption information or second decryption information by the target user authorization; and finally, the first decryption information or the second decryption information is sent to the payroll bank of the target user through the security supervision platform, and a decrypted transaction bill data set is obtained. The method can improve the safety of user transaction data storage and management, ensure the safety of user information, and simultaneously can help banks to improve the screening accuracy of the paying users.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings that are used in the description of the embodiments will be briefly described below.
FIG. 1 is a schematic flow chart of a method for secure supervision of online payment according to the present application;
FIG. 2 is a schematic flow chart of obtaining a decrypted transaction bill dataset in a method for secure supervision of online payment according to the present application;
fig. 3 is a schematic structural diagram of a security supervision system for online payment according to the present application.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
Based on the above description, as shown in fig. 1, the present disclosure provides a security supervision method for online payment, including:
with the rapid development of the Internet and mobile technology, online payment gradually becomes a mainstream trend of transactions, and the method provided by the application is used for carrying out safety supervision on transaction bill data of online payment of users so as to achieve the purposes of improving the safety of user transaction data storage and management and guaranteeing the safety of user information.
Recording a transaction bill data set paid on a target user line;
in the embodiment of the application, firstly, a transaction bill data set paid on a target user line is recorded and stored, wherein the target user refers to a user to be subjected to transaction data security supervision, the transaction bill data set comprises a plurality of bill data of the target user for transaction through the online payment, and the bill data comprises information such as product name, payment amount, merchant name and the like. By obtaining the transaction bill dataset, support is provided for secure storage and management of the next step of targeted user transaction data.
The transaction bill data set is sent to a security supervision platform, and first encryption information is generated according to a data encryption module embedded in the security supervision platform, wherein the first encryption information is obtained by taking the target user as a first encryption party and the security supervision platform as a second encryption party through key configuration;
in the embodiment of the present application, firstly, the transaction bill data set is sent to a security supervision platform, where the security supervision platform is a system for performing security supervision on transaction data, and a data encryption module is embedded in the security supervision platform, where the data encryption module is used to generate encryption information according to characteristics of a target user, and a data encryption algorithm is stored in the data encryption module, for example: AES algorithm, DSA algorithm, SHA-2 algorithm, etc., and those skilled in the art can select an adapted encryption algorithm according to actual requirements.
And then, taking the target user as a first encryption party, taking the security supervision platform as a second encryption party, and carrying out key configuration according to the data encryption module to generate first encryption information. By generating the first encryption information, support is provided for encrypting the transaction billing data set for the next step.
Encrypting the transaction bill data set according to the first encryption information to obtain an encrypted transaction bill data set;
in the embodiment of the application, the transaction bill data set is encrypted according to the first encryption information to obtain the encrypted transaction bill data set, and the security of the transaction data storage of the user can be improved by encrypting the transaction bill data set.
Configuring first decryption information and second decryption information according to the first encryption information, wherein the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the display integrity of the transaction bill data set decrypted by the first decryption information and the second decryption information is different;
in the embodiment of the application, the first decryption information and the second decryption information are configured according to the first encryption information, wherein the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the transaction bill data set obtained by decrypting the first decryption information is different from the transaction bill data set obtained by decrypting the second decryption information in display integrity. Wherein the display integrity refers to the display integrity of the target user transaction bill data set after decryption, wherein the larger the display integrity is, the larger the data display integrity is. Wherein each transaction bill data of the user includes a plurality of transaction information, such as: information such as the name of the commodity, the type of the commodity, the payee, the payment amount, the payment channel and the like are paid in the transaction; the target user can set the transaction information to be shielded by himself, namely, set different display integrity. For example: setting the display integrity of the first decryption information to be 100, and representing the transaction bill data set decrypted by the first decryption information as the transaction information to be displayed completely; and setting the display integrity of the second decryption information to be 60, and representing that the transaction bill data set decrypted by the second decryption information is 60% displayed, for example, only displaying commodity type, payee and payment channel, and not displaying commodity name and payment amount.
By configuring the first decryption information and the second decryption information with different display integrity, the user privacy can be protected while the user transaction bill data set is called, and the guarantee capability of the user privacy is improved.
Determining first decryption information or second decryption information according to the authorization of the target user;
in the embodiment of the application, the authorization information of the target user is acquired, and whether the first decryption information or the second decryption information is selected is determined according to the authorization information.
In one embodiment, the method further comprises:
if the target user authorizes to determine first decryption information, wherein the display integrity of the first decryption information is greater than the display integrity of the second decryption information;
and when the target user's issuing bank receives the first decryption information, decrypting the transaction bill data set according to the first decryption information, and obtaining the decrypted transaction bill data set.
In the embodiment of the application, the display integrity of the first decryption information is greater than the display integrity of the second decryption information, when the target user authorizes to determine the first decryption information, the first decryption information is acquired and sent to a payroll bank of the target user, and the payroll bank decrypts the transaction bill data set according to the first decryption information to obtain a decrypted transaction bill data set.
In one embodiment, the method further comprises:
if the target user authorizes to determine the second decryption information, acquiring data items in the transaction bill data set, identifying the sensitivity of each data item, and acquiring the sensitivity of the data item;
and acquiring an identification data item with the data item sensitivity less than or equal to the preset data item sensitivity according to the data item sensitivity, and displaying the data of the identification data item as the second decryption information.
In the embodiment of the present application, when the target user authorizes to determine the second decryption information, the data item in the transaction bill data set is acquired, wherein the data item refers to a data type in the transaction bill data set, for example: payment amount, payee, etc., and performing sensitivity identification on each data item, where the sensitivity identification may be set by a target user in a user-defined manner or perform feature analysis on each data item, and performing sensitivity identification on each data item according to a feature analysis result, where the higher the privacy of each data item, the higher the sensitivity, for example: the sensitivity of the payment amount is greater than the sensitivity of the product type, etc.
And acquiring the sensitivity of the preset data item, wherein the sensitivity of the preset data item can be set by a person skilled in the art according to the actual situation of the data item. And judging the data item sensitivity according to the preset data item sensitivity, taking the data item with the data item sensitivity less than or equal to the preset data item sensitivity as an identification data item, and displaying the data of the identification data item as second decryption information.
And the security supervision platform sends the first decryption information or the second decryption information to an agent bank of the target user to acquire a decrypted transaction bill data set.
In the embodiment of the application, the first decryption information or the second decryption information is sent to the payroll bank of the target user through the security supervision platform, and the encrypted transaction bill data set is decrypted according to the decryption information to obtain the decrypted transaction bill data set.
As shown in fig. 2, in one embodiment, the method further comprises:
acquiring an information sensitivity index by carrying out information sensitivity analysis on a transaction bill data set paid on the target user line;
when the information sensitivity index is larger than a preset information sensitivity index, configuring multi-level decryption information according to the first encryption information, wherein the multi-level decryption information is used for carrying out multi-level decryption on the encrypted transaction bill data set, and the transaction bill data sets decrypted by each level of decryption information are different in display integrity;
determining first decryption information according to the authorization of the target user;
and the security supervision platform sends the first decryption information to an agent bank of the target user to obtain a decrypted transaction bill data set.
In the embodiment of the application, firstly, the transaction bill data set paid on the target user line is subjected to information sensitivity analysis, wherein the information sensitivity analysis method can obtain information sensitivity sets of a plurality of data items by carrying out sensitivity analysis on the plurality of data items in the transaction bill data set, and then the information sensitivity sets of the plurality of data items are added and summed to obtain the information sensitivity index.
Acquiring a preset information sensitivity index, wherein the preset information sensitivity index can be set according to actual conditions by a person skilled in the art, judging the information sensitivity index according to the preset information sensitivity index, and configuring multi-level decryption information according to the first encryption information when the information sensitivity index is larger than the preset information sensitivity index, wherein the multi-level decryption information is used for carrying out multi-level decryption on the encrypted transaction bill data set, and the display integrity of the transaction bill data set after decryption of each level of decryption information is different. Wherein the greater the decryption level, the greater the transaction billing dataset display integrity, e.g.: three levels of decryption information can be set, wherein the transaction bill data set corresponding to the first level of decryption information has the display integrity of 60; the transaction bill data set corresponding to the secondary decryption information has the display integrity of 80; the transaction bill dataset corresponding to the tertiary decryption information shows an integrity of 100. The transaction bill data set is decrypted by setting the multi-stage decryption information with different display integrity, so that the flexibility of the display of the transaction bill data set can be improved, and the privacy of a user can be protected.
And then determining first decryption information according to the authorization of the target user, wherein the first decryption information comprises decryption information level, the first decryption information is sent to an agent bank of the target user through the security supervision platform, and the encrypted transaction bill data set is decrypted according to the first decryption information to obtain the decrypted transaction bill data set.
In one embodiment, the method further comprises:
invoking data item sensitivity of each data item in the transaction bill data set;
sorting the data items in the transaction bill data set according to the data item sensitivity to obtain sorted data items;
and dividing the display item number of the ordered data items according to the multi-level decryption information to obtain the display item number corresponding to each level of decryption information, and outputting the data corresponding to the display item number as a decrypted transaction bill data set.
In the embodiment of the application, when the encrypted transaction bill data set is decrypted through the first decryption information, firstly, the data item sensitivity of each data item in the transaction bill data set is invoked to obtain a plurality of data item sensitivities. And then sorting the data items in the transaction bill data set from small to large according to the data item sensitivity to obtain sorted data items. And then dividing the number of display items of the ordered data items according to the multi-level decryption information, wherein the higher the level of the decryption information is, the larger the number of display items is, and the number of display items corresponding to each level of decryption information is obtained, for example: assume that data items in a transaction bill data set are five items of data, and the data items from small to large in sensitivity are respectively a payment channel, a payee, a commodity type, a commodity name and a payment amount, and the level of decryption information is five levels; the number of display items corresponding to the first-level decryption information is one, and the type of the data item is a payment channel; the number of display items corresponding to the secondary decryption information is two, and the types of the data items are respectively a payment channel and a payee; the three-level decryption information corresponds to three display items, and the types of the data items are respectively a payment channel, a payee and a commodity type; the number of display items corresponding to the four-level decryption information is four, and the types of the data items are respectively a payment channel, a payee, a commodity type and a commodity name; the five-level decryption information corresponds to five display items, and the types of the data items are respectively a payment channel, a payee, a commodity type, a commodity name and a payment amount.
And then decrypting the encrypted transaction bill data set according to the decryption level of the first decryption information, and outputting data corresponding to the display item number of the decryption level as the decrypted transaction bill data set to obtain the decrypted transaction bill data set.
In one embodiment, the method further comprises:
inputting the decrypted transaction bill data set into a user group online payment database corresponding to the payroll bank of the target user, wherein the user group online payment database comprises a user group and transaction bill data sets corresponding to all users in the user group;
according to the target user's payroll bank, creating payroll customer portraits;
identifying the user group in the online payment database of the user group according to the payroll client image, and outputting the matching degree of the user group;
in the embodiment of the application, a plurality of users and corresponding transaction bill data sets of the target user's issuing bank are acquired, a user group is built according to the plurality of users, then each user in the user group is taken as a child node, the transaction bill data set corresponding to the user is taken as a leaf node of the child node, each user in the user group and the transaction bill data set corresponding to each user are taken as construction data, and an online payment database of the user group is acquired. And inputting the decrypted transaction bill data set into a user group online payment database corresponding to the payroll bank of the target user.
According to the payroll bank of the target user, payment feature data of payroll customers are obtained, wherein the payment feature data comprise data such as product purchase types and consumption levels, multiple payment feature analysis can be carried out on the payroll customers of the payroll bank, the payment feature data are ordered from large to small according to the occurrence frequency of the payment features, a payment feature sequence is obtained, N payment features in the ranking in the payment feature sequence are used as target payment feature data, a person skilled in the art with the value of N can set according to the actual feature data quantity, and then portrait construction is carried out on the payroll customers according to the N target payment feature data, so that payroll customer portraits are generated. And then identifying each user in the user group in the online payment database of the user group according to the paid customer image, and generating the user group matching degree.
In one embodiment, the method further comprises:
identifying the user group in the online payment database of the user group according to the payroll client image, wherein the user group comprises payment account security, payment account switching degree, payment classification list and payment consumption level;
and performing AHP hierarchical analysis according to the payment account security, the payment account switching degree, the payment classification table and the payment consumption level, obtaining the matching degree of the user group, and performing intention client identification on the user group with the matching degree greater than or equal to the preset matching degree.
In the embodiment of the application, the payment characteristics of the users in the user group online payment database are identified according to the payroll client image, wherein the payment characteristics comprise payment account security, payment account switching degree, payment classification table and payment consumption level; the payment account security refers to the proportion of abnormal payment conditions when a user pays, wherein the abnormal payment conditions comprise funds limitation, funds missing, payment failure and the like, and the greater the abnormal payment proportion is, the lower the payment account security is; the payment account switching degree refers to switching frequency of a plurality of bank cards during payment on a user line, wherein the larger the switching frequency is, the larger the payment account switching degree is; the payment classification table refers to the types of investment products of users, including financial financing products and the like; the payment consumption level refers to the consumption capacity of a user and can be represented by a month average consumption amount, wherein the larger the month average consumption amount is, the higher the payment consumption level is represented.
Performing AHP hierarchical analysis according to the payment account security, the payment account switching degree, the payment classification table and the payment consumption level, wherein the AHP hierarchical analysis is a multi-criterion decision method for decomposing a complex problem into a plurality of layers for comparison and decision, and firstly, performing hierarchical division on the payment account security, the payment account switching degree, the payment classification table and the payment consumption level; then comparing the characteristic values in different layers in pairs, and calculating to obtain the relative weight of each characteristic value, wherein the larger the contribution of which characteristic value to decision is, the larger the weight is; and finally, comprehensively evaluating according to the weight of the characteristic value to obtain the matching degree of each user in the user group.
The method comprises the steps of obtaining preset matching degree, setting the preset matching degree according to actual conditions by a person skilled in the art, judging the matching degree of each user in a user group according to the preset matching degree, and carrying out intention client identification on users in the user group with the matching degree larger than or equal to the preset matching degree to obtain a plurality of intention clients and constructing the intention client group.
And screening the intention user group according to the user group matching degree.
In the embodiment of the application, the users with the user group matching degree larger than or equal to the preset matching degree are subjected to the intention user representation, and the intention user group is built according to the intention users to obtain the generation intention user group. The accuracy and efficiency of the screening of the payroll users can be improved by constructing payroll client images based on payroll user characteristics to screen intention users of the user groups.
In one embodiment, as shown in FIG. 3, there is provided a security proctoring system for online payment, comprising:
the transaction bill data set recording module is used for recording a transaction bill data set paid on a target user line;
the first encryption information generation module is used for sending the transaction bill data set to a security supervision platform and generating first encryption information according to a data encryption module embedded in the security supervision platform, wherein the first encryption information is obtained by taking the target user as a first encryption party and the security supervision platform as a second encryption party through key configuration;
the transaction bill data set encryption module is used for encrypting the transaction bill data set according to the first encryption information to obtain an encrypted transaction bill data set;
the decryption information configuration module is used for configuring first decryption information and second decryption information according to the first encryption information, the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the display integrity of the transaction bill data sets decrypted by the first decryption information and the second decryption information is different;
the target user authorization module is used for determining the first decryption information or the second decryption information according to the target user authorization;
and the decrypted transaction bill data set acquisition module is used for transmitting the first decryption information or the second decryption information to the payroll bank of the target user by the security supervision platform to acquire a decrypted transaction bill data set.
In one embodiment, the system further comprises:
the transaction bill data set input module is used for inputting the decrypted transaction bill data set into a user group online payment database corresponding to the payroll bank of the target user, wherein the user group online payment database comprises a user group and transaction bill data sets corresponding to all users in the user group;
the generation salary client portrait creation module is used for creating generation salary client portraits according to generation salary banks of the target users;
the user group matching degree output module is used for identifying the user group in the user group online payment database according to the generation payroll client image and outputting the user group matching degree;
and the intention user group screening module is used for screening the intention user group according to the user group matching degree.
In one embodiment, the system further comprises:
the first decryption information determining module is used for determining first decryption information if the target user authorizes, wherein the display integrity of the first decryption information is greater than the display integrity of the second decryption information;
and the transaction bill data set decryption module is used for decrypting the transaction bill data set according to the first decryption information when the first decryption information is received by the payroll bank of the target user, and obtaining the decrypted transaction bill data set.
In one embodiment, the system further comprises:
the second decryption information determining module is used for acquiring data items in the transaction bill data set if the target user authorizes to determine the second decryption information, identifying the sensitivity of each data item and acquiring the sensitivity of the data item;
the second decryption information display module is used for acquiring an identification data item with the sensitivity smaller than or equal to the preset data item according to the sensitivity of the data item, and displaying the data of the identification data item as the second decryption information.
In one embodiment, the system further comprises:
the information sensitivity index acquisition module is used for acquiring an information sensitivity index by carrying out information sensitivity analysis on a transaction bill data set paid on the target user line;
the multi-level decryption information configuration module is used for configuring multi-level decryption information according to the first encryption information when the information sensitivity index is larger than a preset information sensitivity index, wherein the multi-level decryption information is used for carrying out multi-level decryption on the encrypted transaction bill data set, and the display integrity of the transaction bill data set decrypted by each level of decryption information is different;
the first decryption information determining module is used for determining first decryption information according to the authorization of the target user;
the decrypted transaction bill data set obtaining module is used for sending the first decryption information to the payroll bank of the target user by the security supervision platform to obtain the decrypted transaction bill data set.
In one embodiment, the system further comprises:
the data item sensitivity calling module is used for calling the data item sensitivity of each data item in the transaction bill data set;
the ordering data item obtaining module is used for ordering the data items in the transaction bill data set according to the data item sensitivity to obtain ordering data items;
and the display item quantity dividing module is used for dividing the display item quantity of the ordered data items according to the multi-level decryption information to obtain the display item quantity corresponding to each level of decryption information, and outputting the data corresponding to the display item quantity as a decrypted transaction bill data set.
In one embodiment, the system further comprises:
the user group identification module is used for identifying the user group in the online payment database of the user group according to the payroll client image, and comprises payment account security, payment account switching degree, a payment classification table and payment consumption level;
and the intention client identification module is used for carrying out AHP hierarchical analysis according to the payment account security, the payment account switching degree, the payment classification table and the payment consumption level, obtaining the matching degree of the user group and carrying out intention client identification on the user group with the matching degree larger than or equal to the preset matching degree.
In summary, compared with the prior art, the embodiments of the present disclosure have the following technical effects:
(1) The technical problem that the existing user transaction data management method has low data storage and calling safety is solved, the safety of user transaction data storage and management can be improved, the safety of user information is guaranteed, and meanwhile, the bank can be helped to improve the screening accuracy of the paying users.
(2) The transaction bill data set is decrypted by setting the multi-stage decryption information with different display integrity, so that the flexibility of the display of the transaction bill data set can be improved, and the privacy of a user can be protected.
(3) The accuracy and efficiency of the screening of the payroll users can be improved by constructing payroll client images based on payroll user characteristics to screen intention users of the user groups.
The above examples merely represent a few embodiments of the present disclosure and are not to be construed as limiting the scope of the application. Accordingly, various alterations, modifications and variations may be made by those having ordinary skill in the art without departing from the scope of the disclosed concept as defined by the following claims and all such alterations, modifications and variations are intended to be included within the scope of the present disclosure.

Claims (8)

1. A method of security supervision of online payments, the method comprising:
recording a transaction bill data set paid on a target user line;
the transaction bill data set is sent to a security supervision platform, and first encryption information is generated according to a data encryption module embedded in the security supervision platform, wherein the first encryption information is obtained by taking the target user as a first encryption party and the security supervision platform as a second encryption party through key configuration;
encrypting the transaction bill data set according to the first encryption information to obtain an encrypted transaction bill data set;
configuring first decryption information and second decryption information according to the first encryption information, wherein the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the display integrity of the transaction bill data set decrypted by the first decryption information and the second decryption information is different;
determining first decryption information or second decryption information according to the authorization of the target user;
and the security supervision platform sends the first decryption information or the second decryption information to an agent bank of the target user to acquire a decrypted transaction bill data set.
2. The method of claim 1, wherein the method further comprises:
inputting the decrypted transaction bill data set into a user group online payment database corresponding to the payroll bank of the target user, wherein the user group online payment database comprises a user group and transaction bill data sets corresponding to all users in the user group;
according to the target user's payroll bank, creating payroll customer portraits;
identifying the user group in the online payment database of the user group according to the payroll client image, and outputting the matching degree of the user group;
and screening the intention user group according to the user group matching degree.
3. The method of claim 1, wherein the first decryption information or the second decryption information is determined based on the target user authorization, the method comprising:
if the target user authorizes to determine first decryption information, wherein the display integrity of the first decryption information is greater than the display integrity of the second decryption information;
and when the target user's issuing bank receives the first decryption information, decrypting the transaction bill data set according to the first decryption information, and obtaining the decrypted transaction bill data set.
4. A method as claimed in claim 3, wherein the method further comprises:
if the target user authorizes to determine the second decryption information, acquiring data items in the transaction bill data set, identifying the sensitivity of each data item, and acquiring the sensitivity of the data item;
and acquiring an identification data item with the data item sensitivity less than or equal to the preset data item sensitivity according to the data item sensitivity, and displaying the data of the identification data item as the second decryption information.
5. The method of claim 1, wherein the method further comprises:
acquiring an information sensitivity index by carrying out information sensitivity analysis on a transaction bill data set paid on the target user line;
when the information sensitivity index is larger than a preset information sensitivity index, configuring multi-level decryption information according to the first encryption information, wherein the multi-level decryption information is used for carrying out multi-level decryption on the encrypted transaction bill data set, and the transaction bill data sets decrypted by each level of decryption information are different in display integrity;
determining first decryption information according to the authorization of the target user;
and the security supervision platform sends the first decryption information to an agent bank of the target user to obtain a decrypted transaction bill data set.
6. The method of claim 5, wherein the method further comprises:
invoking data item sensitivity of each data item in the transaction bill data set;
sorting the data items in the transaction bill data set according to the data item sensitivity to obtain sorted data items;
and dividing the display item number of the ordered data items according to the multi-level decryption information to obtain the display item number corresponding to each level of decryption information, and outputting the data corresponding to the display item number as a decrypted transaction bill data set.
7. The method of claim 2, wherein identifying the user group in the user group online payment database based on the payroll client image and outputting a user group match, the method comprising:
identifying the user group in the online payment database of the user group according to the payroll client image, wherein the user group comprises payment account security, payment account switching degree, payment classification list and payment consumption level;
and performing AHP hierarchical analysis according to the payment account security, the payment account switching degree, the payment classification table and the payment consumption level, obtaining the matching degree of the user group, and performing intention client identification on the user group with the matching degree greater than or equal to the preset matching degree.
8. A security proctoring system for on-line payment, characterized by the steps for performing any one of the security proctoring methods for on-line payment as claimed in claims 1-7, said system comprising:
the transaction bill data set recording module is used for recording a transaction bill data set paid on a target user line;
the first encryption information generation module is used for sending the transaction bill data set to a security supervision platform and generating first encryption information according to a data encryption module embedded in the security supervision platform, wherein the first encryption information is obtained by taking the target user as a first encryption party and the security supervision platform as a second encryption party through key configuration;
the transaction bill data set encryption module is used for encrypting the transaction bill data set according to the first encryption information to obtain an encrypted transaction bill data set;
the decryption information configuration module is used for configuring first decryption information and second decryption information according to the first encryption information, the first decryption information and the second decryption information are used for decrypting the encrypted transaction bill data set, and the display integrity of the transaction bill data sets decrypted by the first decryption information and the second decryption information is different;
the target user authorization module is used for determining the first decryption information or the second decryption information according to the target user authorization;
and the decrypted transaction bill data set acquisition module is used for transmitting the first decryption information or the second decryption information to the payroll bank of the target user by the security supervision platform to acquire a decrypted transaction bill data set.
CN202311354951.4A 2023-10-19 2023-10-19 Security supervision method and system for online payment Active CN117094722B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311354951.4A CN117094722B (en) 2023-10-19 2023-10-19 Security supervision method and system for online payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311354951.4A CN117094722B (en) 2023-10-19 2023-10-19 Security supervision method and system for online payment

Publications (2)

Publication Number Publication Date
CN117094722A true CN117094722A (en) 2023-11-21
CN117094722B CN117094722B (en) 2024-01-30

Family

ID=88781592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311354951.4A Active CN117094722B (en) 2023-10-19 2023-10-19 Security supervision method and system for online payment

Country Status (1)

Country Link
CN (1) CN117094722B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339939A (en) * 2016-08-26 2017-01-18 南京喜玛拉云信息技术有限公司 Tamper-proofing distributed bill system based on safety hardware and transaction processing method
CN111740826A (en) * 2020-07-20 2020-10-02 腾讯科技(深圳)有限公司 Encryption method, decryption method, device and equipment based on encryption proxy gateway
CN112199624A (en) * 2020-10-10 2021-01-08 杭州安恒信息技术股份有限公司 Data access control method, device, electronic device and storage medium
CN113298526A (en) * 2021-07-22 2021-08-24 支付宝(杭州)信息技术有限公司 Offline bill generation method and device
CN113901107A (en) * 2021-10-09 2022-01-07 福建中信网安信息科技有限公司 Data grading and refining method and device for automatic identification and screening
CN115170294A (en) * 2022-07-22 2022-10-11 中国工商银行股份有限公司 Client classification method and device and server
CN115221532A (en) * 2021-04-20 2022-10-21 腾讯科技(深圳)有限公司 Method and system for storing resource bill data, computer equipment and storage medium
CN115983900A (en) * 2023-01-12 2023-04-18 中国工商银行股份有限公司 Method, apparatus, device, medium, and program product for constructing user marketing strategy

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339939A (en) * 2016-08-26 2017-01-18 南京喜玛拉云信息技术有限公司 Tamper-proofing distributed bill system based on safety hardware and transaction processing method
CN111740826A (en) * 2020-07-20 2020-10-02 腾讯科技(深圳)有限公司 Encryption method, decryption method, device and equipment based on encryption proxy gateway
CN112199624A (en) * 2020-10-10 2021-01-08 杭州安恒信息技术股份有限公司 Data access control method, device, electronic device and storage medium
CN115221532A (en) * 2021-04-20 2022-10-21 腾讯科技(深圳)有限公司 Method and system for storing resource bill data, computer equipment and storage medium
CN113298526A (en) * 2021-07-22 2021-08-24 支付宝(杭州)信息技术有限公司 Offline bill generation method and device
CN113901107A (en) * 2021-10-09 2022-01-07 福建中信网安信息科技有限公司 Data grading and refining method and device for automatic identification and screening
CN115170294A (en) * 2022-07-22 2022-10-11 中国工商银行股份有限公司 Client classification method and device and server
CN115983900A (en) * 2023-01-12 2023-04-18 中国工商银行股份有限公司 Method, apparatus, device, medium, and program product for constructing user marketing strategy

Also Published As

Publication number Publication date
CN117094722B (en) 2024-01-30

Similar Documents

Publication Publication Date Title
US20220253858A1 (en) System and method for analyzing transaction nodes using visual analytics
Ahmed et al. A survey of anomaly detection techniques in financial domain
US11562451B1 (en) Apparatus for proportional calculation regarding non-fungible tokens
KR20180115778A (en) Integrated block chain-based data transfer control method and system
US20140046786A1 (en) Mobile Merchant POS Processing System, Point-of-Sale App, Analytical Methods, and Systems and Methods for Implementing the Same
US20160217437A1 (en) Method for generating intangible bit money managed as data and system for providing services relevant to same
US20210075591A1 (en) Distributed blockchain-type implementations configured to manage tokenized digital assets and improved electronic wallets, and methods of use thereof
Steel Stolen identity valuation and market evolution on the dark web
CN105989466A (en) Method of payment with mobile phone
CN107230054B (en) Method and system for depositing digital currency into a deposit account
CN108027920A (en) For electronic transaction and the safety measure of user authentication
CN114862110A (en) Method and device for building middle platform of commercial banking business, electronic equipment and storage medium
CN109785145A (en) Fixed point pharmacy financing method, storage medium and computer equipment based on block chain
Bhatti et al. Impact of blockchain technology in modern banking sector to exterminate the financial scams
CN107230076B (en) Method and system for online payment of digital currency
CN117094722B (en) Security supervision method and system for online payment
US20200175562A1 (en) Gem trade and exchange system and previous-block verification method for block chain transactions
Azamuke et al. Scenario-based synthetic dataset generation for mobile money transactions
Kumar et al. Effectiveness of Machine and Deep Learning for Blockchain Technology in Fraud Detection and Prevention
Kabanda Model Structure for Block Chain Technology and Cryptocurrency for the financial services sector in Zimbabwe
Ravi Introduction to banking technology and management
Tian et al. Generating Large-Scale Synthetic Payment Graphs with Realistic Fraudulent and Money Laundering Patterns
US11270230B1 (en) Self learning machine learning transaction scores adjustment via normalization thereof
Rajpoot et al. A Comprehensive Analysis of Block Chain-Based Crypto Currency Systems for Real-World Adoption
Brenig Transparency through decentralized consensus: the bitcoin blockchain and beyond

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant