CN117749544A - Financial business processing method and device based on virtual reality technology and electronic equipment - Google Patents

Financial business processing method and device based on virtual reality technology and electronic equipment Download PDF

Info

Publication number
CN117749544A
CN117749544A CN202311641721.6A CN202311641721A CN117749544A CN 117749544 A CN117749544 A CN 117749544A CN 202311641721 A CN202311641721 A CN 202311641721A CN 117749544 A CN117749544 A CN 117749544A
Authority
CN
China
Prior art keywords
participant
authentication information
virtual reality
conference
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311641721.6A
Other languages
Chinese (zh)
Inventor
陈鹏
蔡科
李霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202311641721.6A priority Critical patent/CN117749544A/en
Publication of CN117749544A publication Critical patent/CN117749544A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application provides a financial business processing method and device based on a virtual reality technology and electronic equipment, and relates to the technical fields of meta universe, artificial intelligence and big data analysis. According to the method, a virtual reality space is created for a participant by acquiring a plurality of authentication information bound by the participant, logging in according to the logging in information of the participant, a meeting secret key is sent to other participants according to the participant information, meeting achievements are acquired, the meeting achievements are authenticated, after the participant logs in, the safety evaluation coefficient of the participant is determined in real time, the authority of the participant is set according to the safety evaluation coefficient, the meeting achievements are authenticated according to the plurality of authentication information, a virtual realization application mode of a real financial service scene is realized, the real service scene is transplanted to the virtual reality space based on a virtual reality technology, financial service processing is carried out in the virtual reality space, safety is guaranteed, and the universe of a high-machine-level financial service becomes possible.

Description

Financial business processing method and device based on virtual reality technology and electronic equipment
Technical Field
The application relates to the technical fields of meta universe, artificial intelligence and big data analysis, in particular to a financial business processing method and device based on a virtual reality technology and electronic equipment.
Background
With the continuous development of the metauniverse technology, the virtual reality technology in the metauniverse technology is gradually applied to various business scenes. For example, for the financial business field with hard demands on the communication frequency, the convenience of virtual reality can greatly meet the demands, and therefore, the virtual reality technology is gradually applied to the financial business field.
In the field of financial services, a virtual reality space can be created through a virtual platform, service introduction and low-level service communication are performed in the virtual reality space, and how to apply the virtual reality technology to high-level financial service scenarios such as service negotiation, electronic contract signing and legal service electronization is a problem to be solved urgently.
Disclosure of Invention
The application provides a financial business processing method, a financial business processing device, electronic equipment and a financial business storage medium based on a virtual reality technology, which are used for solving the problem of how to apply the virtual reality technology to a high-level financial business scene in the prior art.
In a first aspect, the present application provides a financial service processing method based on virtual reality technology, including: acquiring a plurality of authentication information bound by a participant; receiving a login request of the participant, and logging in according to login information of the participant; creating a virtual reality space for the participant, and sending a conference secret key to other participants according to the participant information of the virtual reality space; acquiring conference results and authenticating the conference results; after the participant logs in, determining a security evaluation coefficient of the participant in real time, setting authority of the participant according to the security evaluation coefficient of the participant, and authenticating the conference result according to the authentication information.
In a second aspect, the present application provides another financial service processing method based on virtual reality technology, including: creating a virtual reality space for a participant to join the virtual reality space after passing the security authentication, negotiating and processing financial services in the virtual reality space, wherein the virtual reality space has a real-time security maintenance function.
In a third aspect, the present application provides a financial service processing apparatus based on virtual reality technology, including: the information acquisition module is used for acquiring a plurality of authentication information bound by the participant; the login module is used for receiving a login request of the participant and logging in according to login information of the participant; the space creating module is used for creating a virtual reality space for the participants and sending conference secret keys to other participants according to the participant information of the virtual reality space; the authentication module is used for acquiring conference results and authenticating the conference results; the safety evaluation module is used for determining the safety evaluation coefficient of the participant in real time after the participant logs in, and setting the authority of the participant according to the safety evaluation coefficient of the participant; and the authentication module is used for authenticating the conference result according to the plurality of authentication information.
In a fourth aspect, the present application provides another financial service processing apparatus based on virtual reality technology, including: the system comprises a space creation module, a virtual reality space generation module and a real-time security maintenance module, wherein the space creation module is used for creating a virtual reality space for a participant to join the virtual reality space after passing the security authentication, negotiating and processing financial services in the virtual reality space, and the virtual reality space has a real-time security maintenance function.
In a fifth aspect, the present application provides an electronic device, comprising: a processor, and a memory communicatively coupled to the processor; the memory stores computer-executable instructions; the processor executes computer-executable instructions stored in the memory to implement the method as described in the first aspect or the method as described in the second aspect.
In a sixth aspect, the present application provides a computer-readable storage medium having stored therein computer-executable instructions for implementing the method according to the first aspect or for implementing the method according to the second aspect when executed by a processor.
In a seventh aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of the first aspect, or implements the method of the second aspect.
According to the financial service processing method, the device and the electronic equipment based on the virtual reality technology, the application mode of realizing the virtualization of a real financial service scene is realized, the real service scene such as service negotiation, electronic contract signing and the like in the real financial service field is transplanted to the virtual reality space based on the virtual reality technology, the financial service processing is carried out in the virtual reality space, the safety of the financial service processing in the virtual reality space is ensured, and the metauniverse of high-level financial services such as service negotiation, electronic contract signing and legal authentication processes becomes possible.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart of a financial service processing method based on virtual reality technology according to an embodiment of the present application;
fig. 2 is a flowchart second of a financial service processing method based on virtual reality technology according to an embodiment of the present application;
fig. 3 is a flowchart III of a financial service processing method based on virtual reality technology according to an embodiment of the present application;
Fig. 4 is a flowchart of a financial service processing method based on virtual reality technology according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a financial service processing device based on virtual reality technology according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another financial service processing apparatus based on virtual reality technology according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, in the technical scheme of the application, the acquisition, storage, use, processing and the like of the data all conform to the relevant regulations of national laws and regulations.
In the financial business scenario, a virtual reality technology is utilized to provide a highly realistic virtual display for users of specific products which have not yet been developed, and the virtual display has been started to be applied to daily life. Furthermore, through the virtual platform, users in all parts of the world can communicate with each other in virtual reality, and a virtual conference space is created to conduct business introduction and low-level financial business communication, so that the virtual conference space is gradually brought into future financial element universe planning. However, how to further apply meta-universe technology and concept to business negotiations, electronic contract signing, matched legal service electronization and other financial business scenes with higher confidentiality level, so far, no good solution exists, and even no effective attempt is started, wherein the difficult problem in the prior technical aspect cannot be effectively solved, and more importantly, the establishment of a standardized encryption authentication financial service mode which lacks guarantee of the confidentiality, personal information and authentication means of the financial business is lacking.
The embodiment of the application provides a financial service processing method based on a virtual reality technology, which is characterized in that a login request of a participant is received by acquiring a plurality of authentication information bound by the participant, the login is carried out according to the login information of the participant, a virtual reality space is created for the participant, conference keys are sent to other participants according to the participant information of the virtual reality space, conference achievements are acquired, and the conference achievements are authenticated, wherein after the participant logs in, the safety evaluation coefficient of the participant is determined in real time, the authority of the participant is set according to the safety evaluation coefficient of the participant, and the conference achievements are authenticated according to a plurality of authentication information, so that a real financial service scene virtualization implementation application mode is realized, the real service scene such as service negotiation, electronic contract signing and the like in the real financial service field is transplanted to the virtual reality space based on the virtual reality technology, the safety of the financial service processing is carried out in the virtual reality space, and the confidential and confidential financial service processing security of the financial service such as service negotiation and electronic contract signing and authentication law of a high-level financial service are ensured.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
First, a financial business processing method based on virtual reality technology provided in an embodiment of the present application will be described with reference to fig. 1. Fig. 1 is a flowchart of a financial service processing method based on virtual reality technology according to an embodiment of the present application.
It should be noted that, the financial service processing method based on the virtual reality technology provided in the embodiments of the present application may be executed by a financial service processing device based on the virtual reality technology, where the financial service processing device based on the virtual reality technology may be an electronic device or may be configured in an electronic device, for example, be a meta space system platform configured in the electronic device. In the embodiments of the present application, a financial service processing apparatus based on a virtual reality technology will be described as an example of a metauniverse system platform configured in an electronic device.
The electronic device may be any device with computing capability, for example, may be a personal computer, a mobile terminal, a server, etc., and the mobile terminal may be, for example, a vehicle-mounted device, a mobile phone, a tablet computer, a personal digital assistant, a wearable device, etc., which have various operating systems, touch screens, and/or display screens.
As shown in fig. 1, the financial business processing method based on the virtual reality technology includes the following steps:
s101, acquiring a plurality of authentication information bound by a participant.
The participant in each embodiment of the application can be understood as a user or a user identifier logging into the metauniverse system platform and entering into the virtual reality space to participate in the conference, wherein the user identifier is used for uniquely distinguishing the user by the metauniverse system platform, such as an account number which can be allocated for the user by the metauniverse system platform. In addition, unless specifically stated otherwise, a "participant" in the embodiments of FIGS. 1-3 herein may be understood as a participant that initiates a virtual space creation request, i.e., a participant that creates a virtual reality space.
In some embodiments, the plurality of authentication information may include at least two of the following authentication information entered after the offline registration authorization: passwords, fingerprints, voiceprints, retina, DNA (Deoxyribonucleic acid ), face images, electronic signatures, binding phone numbers, security questions, phone numbers of emergency contacts.
In some embodiments, to construct an implementation mode for performing high-level services such as service negotiation, electronic contract signing, etc. in a virtual reality environment, an account management system and an account authentication system need to be established, and only an account can be generated and allocated, a unique identification system can be formed for each user, so that a subsequent flow link can be performed.
For system building, a conventional application layer framework (such as Spring Boot) is adopted, a common information exchange protocol (such as REST (Representational State Transfer, representational state transfer) and Flex are adopted as communication modes, and encryption processing, such as public and private key encryption technology, is required for the system.
After the system is built, the operation of high security level such as service negotiation and electronic contract signing in the virtual reality environment is needed in the follow-up, so that the account registration link can be in an on-line mode, but in a mode of user off-line registration authorization, and the safety of the follow-up flow is ensured.
Taking a user as an enterprise legal person as an example, the enterprise legal person can go to an off-line service site to conduct registration and account opening service handling, the handling process needs to be accompanied by a legal person of the enterprise, identity information of the enterprise legal person and related documents of the enterprise are verified, registration authorization work with legal significance is completed, and then account distribution and registration are conducted in an account management system by staff of the service site. Correspondingly, the account management system can allocate corresponding accounts for corporate legal persons according to the operation of staff.
Furthermore, the corporate legal person can input a plurality of authentication information on the meta-universe system platform under the cooperation of legal personnel, so that the account authentication system of the meta-universe system platform can acquire the plurality of authentication information, and bind and store the plurality of authentication information with the account corresponding to the corporate legal person. The authentication information is used as a follow-up identity authentication element to ensure the security of financial services such as financial service negotiation, electronic contract signing and the like in a virtual reality environment.
After the user completes the online registration authorization, a corresponding account is allocated to the user, and the authentication information is bound with the account and stored, so that the safety of the subsequent flow is improved.
S102, receiving a login request of a participant, and logging in according to login information of the participant.
In some embodiments, a user may initiate a login request by touching a button with a login function and inputting login information of an account, and perform account login according to the login information.
It can be understood that the key point of the steps of negotiating business, signing electronic contract, and electronic operation of legal process in virtual reality environment is confidentiality and identity verification of enterprise information or personal information, which requires highly mature and reliable encryption technology. The login process is only a measure of entering a meta-universe system platform, and does not involve too much enterprise or personal privacy, so that a general login encryption mode in the related technology is enough, and the excessively complicated login encryption means can greatly increase the operation cost of a user, influence the use experience and can not be reimbursed. Therefore, in some embodiments, the login may be performed by combining an account password with a public-private key short message authentication, and the login information may include an account, a password and a short message authentication code.
It can be appreciated that for each user using the metauniverse system platform, an account number can be assigned, and a plurality of authentication information can be bound, and login can be performed according to the login information.
S103, creating a virtual reality space for the participants, and sending meeting secret keys to other participants according to the meeting information of the virtual reality space.
Wherein the other participants are participants invited to enter the virtual reality space to participate in the conference.
In some embodiments, a corresponding account number may be allocated to a user who needs to use the metauniverse system platform, and after the user logs in the metauniverse system platform through the account number, the user may apply to create a virtual reality space to perform financial service processing such as service negotiation and electronic contract signing. When a user applies for creating a virtual reality space, the user can provide meeting configuration information such as meeting duration of the virtual reality space, upper limit of the number of participants and the like.
After the metauniverse system platform obtains meeting configuration information such as meeting duration of a virtual reality space and upper limit of the number of participants, basic configuration such as data storage space size, channel interface number, network space resource allocation and the like required by the virtual reality space can be automatically determined based on the meeting configuration information to form the virtual reality space, an access port is automatically generated in the virtual reality space for each participant (including the participants and other participants in the embodiment of the application) to join, and meanwhile, recording and video functions are provided to record and backup the whole process of a meeting, so that a recording file and an image file are generated, and the recording file can be processed through a natural language algorithm to automatically form a meeting discipline. At least one of the meeting summary file, the audio and video file may be referred to as a meeting record file. The size of the data storage space required for the virtual reality space may be simply referred to as the required storage space.
The metauniverse system platform can uniformly allocate a storage area for the conference record file, the area is isolated from the outside physically at ordinary times, and the area is communicated with each account of the metauniverse system platform only when user data is stored and the user reads the downloaded record file through an encryption method.
In some embodiments, after the virtual reality space is created, a meeting secret key can be automatically generated, and according to the meeting information of the virtual reality space, information of other participants, such as account numbers of users participating in the meeting, mobile phone numbers bound by the other participants, and other communication modes, such as mobile phone numbers bound by the other participants, can be determined, and then the meeting secret key is sent to the other participants. After the corresponding account number and password are adopted to log in the meta-universe system platform, the users participating in the conference can enter the virtual reality space to participate in the conference by the conference secret key within the time range set during the application of the virtual reality space. The method can ensure the security of the login process, and the verification method is simple and easy to operate, and avoids the influence on the use experience of the user caused by the increase of the operation cost of the user.
In some embodiments, other participants may be determined according to the participant information in the virtual reality space, and the public keys corresponding to the other participants may be obtained, where the conference keys are encrypted by the public keys, and the encrypted conference keys are sent to the other participants, so that the other participants decrypt the encrypted conference keys by the corresponding private keys, obtain the conference keys, and then enter the virtual reality space by the conference keys. Therefore, the security of the conference secret key in the transmission process can be improved.
S104, acquiring conference achievements and authenticating the conference achievements; after the participant logs in, the security evaluation coefficient of the participant is determined in real time, the authority of the participant is set according to the security evaluation coefficient of the participant, and the conference result is authenticated according to a plurality of authentication information.
Wherein the conference outcome relates to financial transactions processed in virtual reality space. For example, when the financial business is an electronic contract, the conference result may be the electronic contract to be signed, or may be the electronic contract to be signed; when a financial business is a business negotiation, the conference outcome may be the negotiation result.
In some embodiments, the meeting outcome may be obtained and authenticated. Wherein, obtain meeting achievement, can include: the conference achievement template is obtained, the conference record file in the virtual reality space is analyzed by adopting a natural language processing technology, conference content is obtained, and conference achievement is generated based on the conference content and the conference achievement template. The authentication of the meeting result may include: according to the respective multiple authentication information of each participant (including the participant creating the virtual reality space and other participants invited to participate in the conference, namely all the participants), the identity of each participant is authenticated, under the condition that the identity authentication is passed, the conference result is confirmed to be confirmed by each participant, and then the authentication application is submitted to the relevant service node based on the conference result. Wherein the relevant business node may be, for example, a node that authenticates legal effectiveness of the meeting outcome.
The conference record file is analyzed through a metauniverse system platform by adopting a natural language processing technology, conference content is obtained, conference results are generated based on the conference content and a conference result template, automatic generation of the conference results is realized, users participating in the conference do not need to edit the conference results by themselves, and workload of the users participating in the conference is reduced.
Taking financial business as an electronic contract for signing, a meeting result as an electronic contract to be signed as an example, each participant (including participants creating a virtual reality space and other participants invited to participate in the meeting, namely all participants) can conduct virtual meeting in the virtual reality space, a meta-universe system platform can conduct record backup on the whole process of the meeting to obtain a meeting record file, an electronic contract template is generated according to requirements of each participant, a natural language processing technology can be adopted to analyze the meeting record file, and the negotiation content of each participant in the meeting record file for the electronic contract is obtained, so that the item details of the electronic contract are determined, and the electronic contract template is revised based on the item details to obtain the electronic contract to be signed.
After the electronic contract to be signed is obtained, the meta-universe system platform can carry out identity authentication on each participant according to a plurality of authentication information of each participant, and after the identity authentication of each participant passes, the electronic contract is confirmed to be confirmed by each participant, so that the user electronic signature of each participant is automatically signed on the electronic contract to be signed, and the signed electronic contract is obtained. And submitting an authentication application to the related service node based on the signed electronic contract. Therefore, the signing of the electronic contract not only adopts the procedure of the electronic signature of the user of each participant to authenticate, but also authenticates the user identity of each participant, thereby ensuring the safety of the signing of the electronic contract.
In addition, the metauniverse system platform can determine the safety degree evaluation coefficient of the participant in real time after the participant logs in, and set the authority of the participant according to the safety degree evaluation coefficient of the participant. The safety degree evaluation coefficient is a parameter for evaluating the safety degree of the participant, and when the safety degree evaluation coefficient is lower than the corresponding safety degree threshold value, the participant is determined to have safety risk.
The authority of the participant is set according to the security evaluation coefficient of the participant, for example, the method includes: and when the security evaluation coefficient of a participant is lower than the corresponding security threshold value, performing account locking on the participant.
It will be appreciated that for each participant participating in the conference (including the participant creating the virtual reality space and other participants invited to participate in the conference), the security assessment factor of the participant may be determined in real time after the participant logs in, and the authority of the participant may be set according to the security assessment factor of the participant.
According to the financial service processing method based on the virtual reality technology, through the steps of obtaining the plurality of authentication information bound by the participant, receiving a login request of the participant, logging in according to the login information of the participant, creating a virtual reality space for the participant, sending conference keys to other participants according to the participant information of the virtual reality space, obtaining conference achievements, and authenticating the conference achievements, wherein after the participant logs in, the security evaluation coefficient of the participant is determined in real time, the authority of the participant is set according to the security evaluation coefficient of the participant, and the conference achievements are authenticated according to the plurality of authentication information, so that a real service scene such as service negotiation, electronic contract signing and the like in the real financial service field is transplanted to the virtual reality space, financial service processing is performed in the virtual reality space, security of the financial service processing in the virtual reality space is guaranteed, and the high-level financial service such as service negotiation, electronic contract authentication and universe law-level universe law-oriented universe law can be changed.
In some embodiments, the meta space system platform may perform record backup on the financial service processing process in the virtual reality space to obtain a conference record file, and in order to improve security of the conference record file, the conference record file may be encrypted and stored according to an encryption level of the virtual reality space. In the following, with reference to fig. 2, a further description is given of a manner of storing a conference record file in the financial service processing method based on the virtual reality technology provided in the embodiment of the present application.
Fig. 2 is a flowchart second of a financial service processing method based on virtual reality technology according to an embodiment of the present application. As shown in fig. 2, the financial business processing method based on the virtual reality technology includes the following steps:
s201, acquiring a plurality of authentication information bound by the participant.
S202, receiving a login request of a participant, and logging in according to login information of the participant; after the participant logs in, the security evaluation coefficient of the participant is determined in real time, and the authority of the participant is set according to the security evaluation coefficient of the participant.
S203, creating a virtual reality space for the participants, and sending meeting secret keys to other participants according to the meeting information of the virtual reality space.
S204, fourth authentication information bound by other participants is obtained.
Wherein the other participants are participants invited to enter the virtual reality space to participate in the conference.
The fourth authentication information is part of the fifth authentication information bound by the other participants. The number of the fourth authentication information may be one or more, which is not limited in the present application.
In some embodiments, the plurality of fifth authentication information of the other participant binding may include all authentication information of the participant binding, or part of the authentication information of the other participant binding. All authentication information bound by other participants may include, for example: at least two of the following authentication information input after offline registration authorization: passwords, fingerprints, voiceprints, retina, DNA, facial images, electronic signatures, binding phone numbers, security questions, phone numbers of emergency contacts.
In some embodiments, since the number of times the authentication information is used for verification increases the exposure risk, when the fourth authentication information is selected from the plurality of fifth authentication information, the selection may be made based on how frequently each fifth authentication information is used and the most recently used interval duration in the history period to reduce the exposure risk of the authentication information.
In this embodiment of the present application, for each other participant, the fourth authentication information may be obtained from the plurality of fifth authentication information bound by the participant by:
acquiring a plurality of fifth authentication information bound by other participants; acquiring historical use conditions of each fifth authentication information; determining the use intensity of each fifth authentication information according to the historical use condition of each fifth authentication information, wherein the use intensity of the fifth authentication information indicates the frequency of the corresponding fifth authentication information in the historical time period and the last used interval duration; fourth authentication information is determined from the plurality of fifth authentication information based on the use intensity of each of the fifth authentication information.
The historical use condition of each piece of fifth authentication information can include information such as use frequency and last use time of the fifth authentication information in a historical time period.
The process of determining the use intensity of each fifth authentication information and determining the fourth authentication information from the plurality of fifth authentication information based on the use intensity of each fifth authentication information may refer to the process of determining the seventh authentication information in other embodiments, which is not described herein.
S205, carrying out identity authentication on other participants according to the fourth authentication information.
In some embodiments, the other participants may input real-time authentication information corresponding to the fourth authentication information, and the metauniverse system platform may match the real-time authentication information with the fourth authentication information to authenticate the identity of the other participants. Under the condition that the real-time authentication information is completely matched with the fourth authentication information, the identity authentication of other participants can be determined to pass; in the case that the real-time authentication information does not exactly match the fourth authentication information, it may be determined that the other participant identity authentication does not pass.
S206, allowing other participants to enter the virtual reality space under the condition that the identity authentication is passed.
In some embodiments, the conference secret key may be encrypted by public keys of other participants, and sent to other participants, and then decrypted by private keys corresponding to terminal devices registered by other participants, where other participants may register with the meta space system platform by using an account number and password, and then enter the virtual reality space to participate in the conference. Because the mode that the account number password is combined with the public and private key to enter the virtual reality space is based on the terminal equipment which is mostly a user mobile phone, the meaning of re-verifying authentication information related to the mobile phone is not great in a plurality of authentication information bound to other participants before the other participants enter the virtual reality space, and then the fifth authentication information does not comprise authentication information with the correlation degree lower than a correlation degree threshold value in the authentication information bound to the other participants. That is, in some embodiments, the correlation of the fifth authentication information with the terminal device that the other participant is logged in to is below a correlation threshold.
For example, the fifth authentication information may include a password, a fingerprint, a voiceprint, a retina, DNA, a face image, an electronic signature, a security question. The metauniverse system platform can extract 4 authentication information from the 8 authentication information of other participants to verify, and the other participants are allowed to enter the virtual reality space under the condition that the 4 authentication information passes.
It should be noted that, for the participant creating the virtual reality space, the participant may directly enter the virtual reality space, or, similar to other participants, enter the virtual reality space after the authentication passes, which is not limited in this application.
S207, acquiring an encryption level of the virtual reality space and a meeting record file in the virtual reality space.
In some embodiments, after the virtual reality space is successfully created, the user applying for creating the virtual reality space may set the encryption level of the virtual reality space, so that the metauniverse system platform may obtain the encryption level of the virtual reality space. The metauniverse system platform can provide a plurality of encryption levels, and a user applying for creating the virtual reality space can select a required encryption level from the plurality of encryption levels. The plurality of encryption levels may include, for example, non-encryption, primary encryption, intermediate encryption, and advanced encryption levels. Different encryption levels correspond to different encryption modes.
In some embodiments, after each user participating in the conference enters the Virtual Reality space according to the conference key within a time range set when the user applies in the Virtual Reality space, each user may see a Virtual image of other users in the Virtual Reality environment in a VR (Virtual Reality) environment of the metauniverse system platform during the process of participating in the conference in the Virtual Reality space. The metauniverse system platform can record the conference process in the virtual reality space through the audio recording and video recording functions, and generates audio files and video files, and the audio files can be processed through a natural language algorithm so as to automatically form conference descriptions. In addition, the virtual reality environment is provided with an automatic recording and video recording function and a meeting summary automatic generation mechanism, also provided with a meeting scene switching function, and can automatically switch virtual meeting scenes according to the preference of users participating in the meeting, and provide the virtual meeting scenes with a background sound function of the corresponding environment. The image file may be a file obtained by recording a virtual image, a virtual conference scene, etc. of each user in the virtual reality environment.
Accordingly, in the embodiment of the present application, the meta-cosmic system platform may further perform the following operations:
Generating a visual image corresponding to a participant in the process of participating in a meeting with other participants in a virtual reality space, wherein the visual image corresponding to the participant comprises a user virtual image of the other participants, a preset scene and background sounds corresponding to the preset scene;
and sending the visual image corresponding to the participant so that the participant displays the corresponding visual image.
The preset scene is a virtual conference scene preset in the meta-universe system platform, such as a seaside scene, a forest scene, a golf course scene, a large conference room scene, a camping scene of a bonfire and the like.
Background sounds corresponding to the preset scene, such as sounds of sea waves, animal sounds and the like.
It should be noted that the preset scene may be automatically switched according to a preset frequency, or switched according to the requirements of each participant, which is not limited in this application. The background sound corresponding to the preset scene can not be recorded in the recording file, but the background sound can play an additional role in protecting against eavesdropping.
It should be noted that, for each participant participating in the virtual reality conference, the visual image corresponding to the participant may be generated in the above manner, where the visual image includes the virtual images of the users of other participants except the participant, the preset scene, and the background sound corresponding to the preset scene, and the visual image corresponding to the participant is sent to the participant, so that the participant displays the corresponding visual image. Therefore, each user participating in the conference can form an immersive conference experience, and the experience of the virtual conference on the conference site and the interaction of participants is improved.
S208, encrypting and storing the conference record file by adopting an encryption mode corresponding to the encryption grade.
In some embodiments, the conference recording file may be encrypted and saved according to the encryption level of the virtual reality space, so as to backup and archive the conference recording file, thereby improving the security of the conference recording file. And the encryption modes corresponding to different encryption levels are different, so that a user can flexibly set the encryption level of the virtual reality space according to the needs, the flexibility of the virtual reality space in use is improved, and the user experience is improved.
In some embodiments, the higher the encryption level, the more complex the corresponding encryption mode, and the stronger the protection effect on the security of the conference recording file. The following describes encryption schemes corresponding to different encryption levels, taking encryption levels including non-encryption, primary encryption, intermediate encryption, and advanced encryption as examples.
For the unencrypted level, the conference record file may be directly saved to the corresponding storage area without encryption.
For the primary encryption level, for example, the recording file and the image file in the conference recording file can be encrypted by adopting an AES (Advanced Encryption Standard ) encryption mode of slice encryption such as m3u8 slice, and the conference summary in the conference recording file can be encrypted by adopting a symmetrical encryption mode.
For medium-level encryption, such as for recording files and video files, encryption can be performed based on a higher-level file stream encryption mode, a special decryption player is provided for decoding and playing, and a meeting era is encrypted by adopting an asymmetric encryption means such as RSA (Rivest-Shamir-Adleman) or ECC (Elliptic curve cryptography ) and the like.
For the advanced encryption level, the record file, the image file and the conference summary can be uniformly encrypted by adopting a federal encryption algorithm, and the record and the video can be added with an anti-eavesdropping and anti-recording mechanism, so that the privacy and the safety of the virtual reality space are further improved. The encryption process is as follows:
slicing the conference record file according to the time dimension to obtain a plurality of slice files; encrypting and storing a target slice file in the plurality of slice files; and distributing other slice files except the target slice file in the plurality of slice files to the participants and other participants so that the participants and the other participants encrypt and store the distributed slice files.
The target slice file may be one slice file of a plurality of slice files. Slicing the conference record file according to the time dimension, and adding 1 to the number of the obtained slice files.
The allocation manners of allocating the other slice files except the target slice file to the participant and the other participants, respectively, among the plurality of slice files may be set as required, which is not limited in this application.
For example, assuming that the number of participants is 2, and the lengths of time corresponding to the audio file, the image file, and the conference summary are 60 minutes, respectively, the metauniverse system platform may segment each of the audio file, the image file, and the conference summary into three slice files of 0-20 minutes, 20-40 minutes, and 40-60 minutes, encrypt and store the audio file, the image file, and the conference summary corresponding to 0-20 minutes as target slice files, and send the audio file, the image file, and the conference summary corresponding to 20-40 minutes to participant 1, so that participant 1 encrypts and stores the file, and send the audio file, the image file, and the conference summary corresponding to 40-60 minutes to participant 2, so that participant 2 encrypts and stores the file.
It should be noted that, when decrypting the recorded file, all the participants need to agree with the metauniverse system platform to decrypt the file together. The system comprises a metauniverse system platform, a participant and a metauniverse system platform, wherein the participant and the metauniverse system platform can decrypt slice files stored by the participant and gather the decrypted files together to obtain a complete record file.
By encrypting the conference record file in the federal encryption mode common to each participant and the metauniverse system platform, the security of the record file is improved.
In some embodiments, the metauniverse system platform and the participants may encrypt the assigned slice files in a compound encryption manner to further increase the security of the encrypted files. The process of composite encryption is described below taking the encryption process in the metauniverse system platform as an example. Namely, encrypting and saving the target slice file in the plurality of slice files may include:
encrypting the target slice file by adopting a first encryption mode to obtain a primary encryption result;
encrypting the primary encryption result by adopting a second encryption mode to obtain a composite encryption result;
and (5) storing the composite encryption result.
The first encryption mode and the second encryption mode may be set as required, for example, the first encryption mode is set to RSA, and the second encryption mode is set to ECC, which is not limited in this application.
In the above embodiments, the case of performing the composite encryption by using two encryption methods is merely taken as an example, and in practical applications, the composite encryption may be performed by using two or more encryption methods, wherein, when the composite encryption is performed, the output result of the former encryption method is used as the input content of the latter encryption method.
S209, acquiring conference achievements.
And S210, carrying out step-by-step authentication on the participant according to each authentication information in the plurality of authentication information, wherein different authentication information is adopted for different steps of authentication, and after the previous step of authentication passes, the next step of authentication is carried out.
In some embodiments, the authentication information adopted by each level of authentication may be preset, and the authentication information adopted by different levels of authentication is different, so that step-by-step authentication is performed on the participant based on each authentication information, and in the step-by-step authentication process, when any level of authentication fails, the participant authentication is determined to fail, the authentication process is stopped, and when all levels of authentication pass, the participant authentication is determined to pass. By adopting various authentication information to carry out step-by-step authentication on the participant, the accuracy and the reliability of authentication are improved.
The number of authentication information used in each level of authentication may be one or more, and the manner of performing authentication based on the corresponding authentication information may be set as required, which is not limited herein.
In some embodiments, for one of the levels of authentication, the real-time authentication information of the participant may be collected, and the real-time authentication information is matched with the authentication information bound to the participant, so as to obtain a corresponding matching result, and according to the matching result, whether the current level of authentication of the participant passes or not is determined.
For example, taking a participant creating a virtual reality space as an example, the following five levels of authentication may be performed.
The first-stage authentication can adopt a password, the password which is bound by a participant in advance can be compared with the password input by the participant in real time, the first-stage authentication failure is determined when the comparison results of at most two times are inconsistent, and the first-stage authentication is determined to pass when the comparison results within two times are consistent.
The second-stage authentication can adopt fingerprints, voiceprints, retina, DNA, face recognition and electronic signature, and the authentication information input by the participant in real time can be compared with the pre-bound fingerprints, voiceprints, retina, DNA, face recognition and electronic signature one by adopting a neural network deep learning algorithm. And when the matching degree of any item is not lower than 95%, and the total matching degree accumulation of 6 items of authentication information is not lower than 585%, namely the average matching degree difference of each item is not more than 3%, determining that the second-level authentication passes, and when at least one condition is not met, determining that the second-level authentication fails.
The third-level authentication can adopt a binding telephone number, the metauniverse system platform can send a short message key to the binding telephone number, and whether the third-level authentication passes or not is determined according to whether the short message key input by a participant is consistent with the short message key sent by the metauniverse system platform. And if the short message keys are inconsistent at most, the third-level authentication fails.
The fourth authentication may adopt a secret question, and may randomly extract, for example, three secret questions bound by the participant, answer the secret questions by the participant, and then compare the answers of the secret questions input by the participant with the answers of the corresponding secret questions reserved by the metauniverse system platform. When the answers of all the secret questions are consistent, determining that the fourth-level authentication is passed, and when the answer of any secret question is inconsistent, extracting three secret questions randomly again, and comparing the answers of the secret questions input by the participant with the answers of the corresponding secret questions reserved by the metauniverse system platform again. And if the answers of the two secret questions are inconsistent, the fourth-level authentication fails.
The fifth-level authentication can adopt the telephone number of the emergency contact person, the metauniverse system platform can send a short message key to the telephone number, the emergency contact person performs secondary authentication, the fifth-level authentication is determined to pass when the secondary authentication passes, and the fifth-level authentication is determined to fail when the secondary authentication fails.
And when any one of the levels of authentication is not passed, determining that the participant authentication is not passed, stopping the authentication process, and when all the levels of authentication are passed, determining that the participant authentication is passed. In addition, when the participant authentication fails, account locking and freezing can be performed on the participant so as to ensure safety, after the authentication is jointly assisted by other participants of the conference and the metauniverse system platform, the participant can be continuously authenticated after thawing, but when the authentication fails again, the account can be completely frozen, and the participant is required to take enterprise and personal related proving materials to go to offline sites again for account information recovery or reset.
And S211, under the condition that the authentication is passed, auditing the conference result according to a preset rule to obtain the conference result after the auditing.
In some embodiments, authentication may be performed in the above manner for each participant participating in the conference, and in the case that all participants pass authentication, S211 may be performed.
The preset rule is a rule that needs to be met by a preset meeting result, for example, taking the meeting result as an electronic contract as an example, and the preset rule may include a rule of terms that needs to be met by terms of the electronic contract.
S212, submitting an authentication application to the related service node based on the post-auditing meeting result.
In some embodiments, after the post-audit meeting results are generated, automatic filing of the post-audit electronic contract can be performed, reducing the cost of manual operations. Specifically, the meta-universe system platform can audit the clause details in the conference result according to a preset rule, obtain the conference result after audit, connect with the relevant business nodes of the network, and submit the authentication application on the network based on the conference result after audit.
Therefore, the embodiment of the application realizes a virtual realization application mode of a real financial service scene, realizes that the real service scene such as service negotiation, electronic contract signing and the like in the real financial service field is transplanted to a virtual reality space based on a virtual reality technology, performs financial service processing in the virtual reality space, ensures the safety of the financial service processing in the virtual reality space, and makes the meta-universe of high-level financial services such as service negotiation, electronic contract signing and legal authentication process possible.
According to the analysis, in the embodiment of the application, after the participant logs in, the security evaluation coefficient of the participant can be determined in real time, and the authority of the participant is set according to the security evaluation coefficient of the participant. In the following, with reference to fig. 3, a manner of determining a security evaluation coefficient of a participant in real time and setting authority of the participant according to the security evaluation coefficient of the participant in the financial service processing method based on the virtual reality technology provided in the embodiment of the present application is further described.
Fig. 3 is a flowchart III of a financial service processing method based on virtual reality technology according to an embodiment of the present application. As shown in fig. 3, the financial business processing method based on the virtual reality technology includes the following steps:
s301, acquiring a plurality of authentication information bound by the participant.
S302, receiving a login request of a participant, and logging in according to login information of the participant.
In some embodiments, the participant may be set to have low-level authority after logging in, authenticated according to third authentication information among the plurality of authentication information of the participant, and set to have high-level authority after the authentication is passed.
The low-level authority allows the participant to perform basic operations such as presetting virtual reality space, reading system information and the like.
The authority level of the high-level authority is higher than that of the low-level authority, so that more and more important operations are allowed to be performed by the participant, and the participant is required to be acquired after strict identity authentication. Such as high-level rights, also allow the participant to perform information modification core operations, such as modifying personal information, based on the operations allowed by low-level rights.
In some embodiments, the method for obtaining the third authentication information is similar to the method for obtaining the seventh authentication information in other embodiments, and will not be described herein. Wherein the number of the third authentication information may be smaller than the number of the seventh authentication information.
After the participant logs in, the participant is set to have low-level authority, the participant is subjected to identity authentication according to third authentication information among a plurality of authentication information of the participant, and after the identity authentication is passed, the participant is set to have high-level authority, so that the safety of information related to each account in a meta space system platform is ensured, and the safety of a subsequent process is further improved.
It should be noted that, for each participant using the metauniverse system platform, the above manner may be adopted to release the rights to the participant step by step.
S303, acquiring network attack state information of the terminal equipment logged in by the participant in real time.
The network attack state information may include information about whether the terminal device is attacked by the network, the type of the network attack, the number of times of attack, and the like.
In some embodiments, after a participant logs in, the metauniverse system platform may automatically start a global security assessment coefficient, where the coefficient is a real-time assessment mechanism for each operation behavior and security state of the participant during logging in the metauniverse system platform, and each subsequent step is provided with a corresponding security threshold.
In some embodiments, the security assessment factor of the participant may be determined in real time after logging in based on the participant's login information. The safety evaluation coefficients of the participants can be obtained through different safety evaluation coefficient determination modes in different links of the participant login meta-universe system platform.
In some embodiments, in response to logging in based on the participant' S login information, the metauniverse system platform may determine a first security assessment factor for this link by way of steps S303-S305.
The metauniverse system platform can be connected with a firewall or safety antivirus software of a terminal device logged in by a participant, and statistics is carried out on the information such as the number and the type of network attacks in the current login day, so that network attack state information is obtained.
S304, determining a network attack damage value based on the network attack state information.
The network attack damage value represents the risk degree of security risk caused by the network attack.
In some embodiments, the network attack status information includes at least one attack number of network attacks and a corresponding attack type. The attack times are the times of network attack born by the terminal equipment.
Accordingly, S304 may be implemented by: acquiring the corresponding dangerous intensity of each attack type; and taking the attack times corresponding to each attack type as weights, and carrying out weighted summation on the dangerous intensity corresponding to each attack type to obtain the network attack damage value.
Among them, attack types may include the following types: trojan virus and malware attacks, MITM attacks (Man-in-the-Middle attach), phishing attacks, cryptographic attacks, SQL (Structured Query Language ) injection and URL (Universal Resource Locator, uniform resource locator) interpretation attacks, DNS (Domain Name System ) spoofing, dos (Denial Of Service, denial of service) and DDos (Distributed Denial Of Service ) attacks, session hijacking, brute force attacks, other attacks.
The risk intensity corresponding to a certain attack type represents the risk degree of security risk caused by the network attack of the attack type.
In some embodiments, different risk intensities may be set depending on the type of attack. Such as Trojan virus and malicious software attacks, MITM attacks, phishing attacks and password attacks, are more conventional attack means, and can be set to have corresponding dangerous intensity of 0.5; SQL injection and URL interpretation attacks, DNS spoofing, dos and DDos attacks, session hijacking and brute force attacks are attack means with high risk, the corresponding risk intensity can be set to be 1, other attacks are the rest conditions, and the risk intensity can be set to be 0.2.
In some embodiments, the network attack damage value may be determined according to the following equation (1):
wherein d represents a network attack damage value; n (N) i Representing the attack times corresponding to the ith attack type; kappa (kappa) i Represents the risk intensity, kappa corresponding to the ith attack type i The total attack times N are obtained by accumulation.
S305, determining a first security evaluation coefficient in the security evaluation coefficients based on the network attack damage value.
In some embodiments, the network attack damage value may be determined as a first security assessment factor.
In some embodiments, besides network attacks, abnormal operations of the user are also objects to be monitored with emphasis, and account security risks are also generated in the case that the user performs unusual operation behaviors.
Accordingly, in the case that the participant performs an irregular operation behavior, the method may further include the steps of:
a1, determining a security risk value of a participant based on an irregular operation behavior;
accordingly, S305 may include: a2, determining a first security degree evaluation coefficient based on the network attack damage value and the security risk value.
In which non-conventional operation acts, such as directly attempting to modify personal information after login for a participant, without intermediate resolution steps.
The security risk value represents the security risk degree of the user operation behavior.
In some embodiments, the non-regular operational behavior is implemented based on a first authentication information among the plurality of authentication information; correspondingly, step a1 includes: acquiring second authentication information input by a participant and input duration of the second authentication information; verifying the second authentication information based on the first authentication information; and determining the security risk value of the participant based on the input duration of the second authentication information and the verification result of the second authentication information.
The first authentication information may be the third authentication information, for example, in a case where the participant directly tries to modify the personal information after logging in, such as an irregular operation.
The second authentication information is authentication information corresponding to the first authentication information and input by the participant in real time. For example, in the case where the first authentication information includes a binding phone number, a security question, a voiceprint, a fingerprint, the second authentication information includes a verification code corresponding to the binding phone number, an answer to the security question, a voiceprint, a fingerprint entered by the participant.
In some embodiments, the security risk value for the participant may be determined according to the following equation (2):
wherein p represents a security risk value; omega represents a preset basic security risk value; n1 represents the number of second authentication information or first authentication information; k1 represents a first preset coefficient; i i Is an indicative function representing a verification result of the ith second authentication information, wherein in the case where the verification result is passed, I i Is 0, and in the case that the verification result is failed, I i Has a value of 1; t (T) i Representing an input duration of the ith second authentication information; t (T) 0 Representing an input duration threshold.
Wherein N1 may be, for example, 5 and K1 may be, for example, 50.
Wherein Ω represents a preset basic security risk value, which is generated when the participant performs an irregular operation, and is a risk measure for an irregular link, and the value of Ω can be set by itself, but is not suitable to be too large or too small. ln (1+ (T) i -T 0 ) 2 Representing the input duration distance T 0 The greater the difference in seconds is,the more abnormal the risk is, the higher the risk is, because the time for inputting authentication information by a normal person is about 10 seconds, T can be calculated 0 Set to 10. (1+I) i )*ln(1+(T i -T 0 ) 2 ) The factor multiplied by K1 represents a great risk in this link, and if the user inputs authentication information in error, the account is likely to be stolen.
In some embodiments, the first authentication information is determined by:
acquiring historical use conditions of each authentication information in a plurality of authentication information of a participant;
determining the use intensity of each piece of authentication information according to the historical use condition of each piece of authentication information, wherein the use intensity of the authentication information indicates the frequency of the corresponding piece of authentication information in a historical time period and the time interval of the latest use;
the first authentication information is determined from the plurality of authentication information based on the use intensity of each authentication information.
The determining manner of the first authentication information may refer to the obtaining manner of the seventh authentication information in other embodiments, which is not described herein.
In some embodiments, determining the first security assessment factor based on the network attack damage value and the security risk value may be accomplished according to the following equation (3):
Safe1=S1-d-p (3)
wherein Safe1 represents a first safety evaluation coefficient; s1, a first preset safety evaluation coefficient value is represented; d represents a network attack damage value; p represents a security risk value.
Wherein S1 may be set as desired, for example, may be set to 100.
It can be understood that in the case that the participant performs an irregular operation, if an authentication information input error occurs, the account is most likely to be stolen, and the value of the security risk value p is high, and if the value of the damage value d of the network attack is also high, the first security evaluation coefficient is easily caused to be lower than the corresponding security threshold value, and thus the situation that the identity information is stolen is very likely to occur.
In addition, for the first security assessment coefficient of the login link, since the risk requirement of the login stage is relatively low, the security threshold of the link can be set to be low, for example, about 20, and since the existence of the security risk value p can instantaneously cause the numerical value of the first security assessment coefficient to break down the corresponding security threshold, the setting of the low security threshold does not bring about a huge risk. However, it should be noted that, for the security verification link required for modifying the personal information, if the input error of the participant to the second authentication information reaches more than half, for example, if the error of 5 second authentication information reaches 3, the explanation has a significant risk, the meta space system platform will perform account locking on the participant, the authentication information unlocking function is frozen, and the user must bring the enterprise and personal related proof material to go to the offline site again to process the account information recovery or reset.
S306, creating a virtual reality space for the participant.
S307, meeting configuration information of the virtual reality space is acquired, wherein the meeting configuration information comprises at least one of meeting time length, encryption level, number of participants, required storage space and number of channel interfaces.
S308, determining a second safety evaluation coefficient in the safety evaluation coefficients in real time based on the conference configuration information.
In some embodiments, in response to creating a virtual reality space for the participant, the metauniverse system platform may determine a second security assessment factor for this link by way of steps S307-S308.
In some embodiments, the second security assessment factor may be determined according to the following equation (4):
wherein Safe2 represents a second security assessment coefficient; p represents the number of participants; k2 represents a second preset coefficient; r is R k Representing an encryption level; st represents the duration of the conference; k represents the required storage space; c represents the number of channel interfaces.
The second preset coefficient may be set as required, for example, may be set to 50.
In some embodiments, the value of the second safety assessment coefficient determined according to formula (4) may be determined as the final value of the second safety assessment coefficient in the case where the value of the second safety assessment coefficient determined according to formula (4) is smaller than the second preset safety assessment coefficient value, and the second preset safety assessment coefficient value may be determined as the final value of the second safety assessment coefficient in the case where the value of the second safety assessment coefficient determined according to formula (4) is greater than or equal to the second preset safety assessment coefficient value. The second preset security evaluation coefficient value can be set according to requirements, which is not limited in the application.
That is, S308 may further include:
and under the condition of the second preset safety evaluation coefficient value, determining the value of the second safety evaluation coefficient as the second preset safety evaluation coefficient value.
That is, S308 can be realized by the following formula (5):
wherein S3 represents a second preset security evaluation coefficient value. K2 represents a second preset coefficient, which may be set as needed, for example, may be set to 50.
Taking an example that the S3 value is 100 and the K2 value is 50, P represents the number of participants, and under the condition that the encryption means of the conference record file adopts multi-party linked federal encryption, the greater the number of the participants is, the greater the encryption complexity is, and the higher the safety coefficient requirement is; r is R k Representing the encryption level, in encryptionIn the case that the levels include four encryption levels of no encryption, primary encryption, intermediate encryption, and advanced encryption, the four encryption levels may respectively take values of 1,3,5, and 7.st represents conference duration, namely video and audio recording duration, and the unit can be hours, and as the audio and video are stored in a segmented mode, the longer the duration is, the smaller the key information quantity of each fixed duration is on average, so that the higher the decoding cost is, the safer the decoding cost is; k represents the required storage space, the larger the size of the storage space is, the more complicated the conference content is, the larger the leakage risk is, a space threshold value can be manually set according to the capacity size, and if the size of the storage space is smaller than the space threshold value, the value of K can be 10 or 50 instead, so that the value is matched with the number C of channel interfaces to be introduced next, the two-stage difference is not too large, and the influence of the change of K on the coefficient is too small. C is the number of channel interfaces, obviously the more it is, the less secure.
In addition, for creating the second security assessment coefficient of the virtual reality space link, R can be substituted k The normal value range of the values such as st and the like is approximately evaluated that the Safe2 value is between 1 and 100, and the safety threshold of the link can be manually set to be about 40 or a 50% quantile point can be selected as the safety threshold according to the past conference history data Safe2 value, and the safety threshold is not formally started in the virtual reality space construction stage, so that the requirement on the safety level is not too high.
S309, sending the conference secret key to other participants according to the conference information of the virtual reality space.
S310, sixth authentication information in a plurality of authentication information is acquired.
The number of the sixth authentication information may be one or more, which is not limited in this application.
S311, before the participant enters the virtual reality space, authenticating the participant according to the sixth authentication information.
In some embodiments, before the participant enters the virtual reality space, the participant may be authenticated in the manner of S310-S311, and after the participant passes the authentication, the participant is allowed to enter the virtual reality space.
The manner of acquiring the sixth authentication information from the plurality of authentication information of the participant is similar to that of acquiring the seventh authentication information in other embodiments, and will not be described herein.
S312, the number of authentication information which does not pass authentication in the sixth authentication information is obtained.
S313, determining a third security evaluation coefficient in the security evaluation coefficients based on the number of authentication information which fails authentication, the first security evaluation coefficient and the second security evaluation coefficient.
In some embodiments, in the link where the participant enters the virtual reality space, a third security assessment coefficient for the link may be determined in the manner of S312-313.
In some embodiments, when the number of authentication information that fails to pass the authentication is greater than a preset number threshold, determining the value of the third security assessment coefficient as a preset value, where the preset value is lower than a security threshold corresponding to the third security assessment coefficient; in the case where the number of authentication information that fails authentication is not greater than the preset number threshold, the third security degree evaluation coefficient may be determined based on the number, the first security degree evaluation coefficient, the second security degree evaluation coefficient, and a preset formula.
The preset number threshold may be set according to the need and the number of the sixth authentication information, for example, in the case that the number of the sixth authentication information is 4, the preset number threshold may be set to 2.
The preset value is a preset value lower than a safety degree threshold value corresponding to the third safety degree evaluation coefficient.
In some embodiments, the preset formula may be the following formula (6):
Safe3=S2-K3*∑ i W i -K4*(S2-Safe2)-K5*(S2-Safe1) (6)
wherein Safe3 represents a third safety evaluation coefficient; s2, a third preset safety evaluation coefficient value is represented; k3 represents a third preset coefficient; k4 represents a fourth preset coefficient; k5 represents a fifth preset coefficient; sigma (sigma) i W i Indicating the number of authentication information that fails authentication in the sixth authentication information; safe2 represents a second security assessment coefficient; safe1 represents a first safety evaluation coefficient.
The third preset safety evaluation coefficient value, the third preset coefficient, the fourth preset coefficient and the fifth preset coefficient can be set according to the needs, which is not limited in the application.
That is, in some embodiments, S313 may be implemented by the following equation (7):
taking S2 as 100, K3 as 30, K4 as 0.2, K5 as 0.05, and the number of sixth authentication information as 4 as an example, Σ i W i Representing the number of authentication information which fails authentication in the 4 sixth authentication information, if more than two filling errors occur when filling the 4 authentication information, safe3 is directly judged as 0, and is expressed as an indication function in the above formula (7)The formula in brackets after the indication function is a method for calculating the value of Safe3 under the condition that the filled authentication information is not more than two, each time the authentication information is wrong, the account is taken of the influence of the deducted scores of Safe1 and Safe2 parts on Safe3 in the current day login process, namely, if serious unsafe phenomenon occurs before the link, the defending force of safety monitoring is greatly enhanced, and according to the safety importance in the previous two steps, (100-Safe 2) and (100-Safe 1) can be respectively given with weights of 0.2 and 0.05, which is also in accordance with the principle of the safety protection force relaxation degree. />
In addition, for the third safety evaluation coefficient of the link of the participant entering the virtual reality space, the corresponding safety threshold value can be set to be 70, and the safety protection measure of the link has extremely high requirements and needs to carry out the most strict monitoring standard, so that the safety threshold value can be set to be a higher value.
S314, performing account locking on the participant under the condition that at least one of the first security evaluation coefficient, the second security evaluation coefficient and the third security evaluation coefficient is lower than the corresponding security threshold.
S315, unlocking the account of the participant based on seventh authentication information among the plurality of authentication information bound by the participant.
In some embodiments, S315 may be implemented by the following steps b1-b 4:
b1, acquiring historical use conditions of each authentication information in the plurality of authentication information.
The historical use condition of each piece of authentication information can comprise information such as the use frequency of the authentication information in a historical time period, the last use time and the like.
b2, determining the use intensity of each authentication information according to the historical use condition of each authentication information, wherein the use intensity indicates the frequency of the corresponding authentication information in the historical time period and the time interval of the latest use.
b3, determining seventh authentication information from the plurality of authentication information based on the use intensity of each authentication information.
And b4, carrying out identity authentication on the participant based on the seventh authentication information, and unlocking the account of the participant under the condition that the identity authentication passes.
In some embodiments, since an excessive number of times authentication information is used for verification increases exposure risk, when the seventh authentication information is selected from the plurality of authentication information of the participant, it may be selected based on how frequently each authentication information is used and how long the interval has been most recently used in the history period to reduce exposure risk of the authentication information.
In some embodiments, to embody the principle of cross-using discontinuous selection of the same authentication information, the use strength of each authentication information may be determined according to the following formula (8):
wherein s is i Indicating the use intensity of the ith authentication information; f (f) i Representing the frequency of use of the ith authentication information in the history period; k6 represents a sixth preset coefficient; a, a i The number of times of recent use is represented, for example, may be the number of times of use in authentication information of the last 10 times of use; i i1 Indicating whether the ith authentication information appears in the last used authentication information, in the case of appearance, I i1 Has a value of 1, in the absence of I i1 The value of (2) is 0; i i2 Indicating whether the ith authentication information appears in the last but not last used authentication information, in the case of appearance, I i2 Has a value of 1, in the absence of I i2 The value of (2) is 0; alpha is a non-negative parameter;representing an indicative function, at I i1 In the case of 1, < >>Has a value of 1, at I i1 In case of 0, < + >>The value of (2) is 0.
The sixth preset coefficient may be set as needed, for example, may be set to 0.5.
The historical time period can be set according to requirements, such as three months, one month, one week and the like.
Wherein the use intensity of each authentication information is determined by adopting the mode shown in the formula (8) so as to enable s i And frequency of use f i Number of recent uses a i Is proportional to, but in reality, the linear positive correlation phenomenon is almost absent, thus for f i The exponent is used to power, while (1+K6lns (1+a) i )) 2 Is a kind of geometric average processing mechanism, can ensure the stability of the value range and can avoid the linear relationAppears. I i1 And I i2 As a function of the indicationIs a design of additive effects, if the ith authentication information appears in the last and penultimate authentication information, there will be an additional additive effect alpha 2 Alpha is a non-negative parameter which can be set by a user, such as a participant, according to his own preference and reflects the increase in the intensity of use of the authentication information that was used in the first two consecutive times. / >
In some embodiments, step b3 may be implemented by: sequencing the authentication information according to the order of the use intensity from low to high; and determining the authentication information of the preset number which is sequenced in front as seventh authentication information.
For example, the use intensity of each authentication information among 10 authentication information of a password, a fingerprint, a voiceprint, a retina, deoxyribonucleic acid DNA, a face image, an electronic signature, a binding phone number, a security problem, and a phone number of an emergency contact may be determined, and the first 7 authentication information may be determined as the seventh authentication information by arranging the use intensities in order from low to high.
It should be noted that, in the embodiment of the present application, for a participant creating a virtual reality space and other participants invited to enter the virtual reality space to participate in a conference, the security evaluation coefficient may be determined in real time according to the manner of determining the security evaluation coefficient, so as to ensure security after logging in the meta space system platform and entering the virtual reality space.
S316, acquiring conference achievements and authenticating the conference achievements according to the plurality of authentication information.
According to the financial service processing method based on the virtual reality technology, an application mode is realized through virtualization of a real financial service scene, the real service scene such as service negotiation, electronic contract signing and the like in the real financial service field is transplanted to the virtual reality space based on the virtual reality technology, financial service processing is conducted in the virtual reality space, safety of the financial service processing in the virtual reality space is guaranteed, and metauniverse of high-level financial services such as service negotiation, electronic contract signing and legal authentication processes becomes possible.
Another financial service processing method based on the virtual reality technology according to an embodiment of the present application is described below with reference to fig. 4.
Fig. 4 is a flowchart of a financial service processing method based on virtual reality technology according to an embodiment of the present application. As shown in fig. 4, the financial service processing method based on the virtual reality technology includes the following steps:
s401, creating a virtual reality space for a participant to join the virtual reality space after passing the security authentication, negotiating and processing financial services in the virtual reality space, wherein the virtual reality space has a real-time security maintenance function.
The participants in the embodiments of the present application may be understood as any participant that enters into the virtual reality space to participate in the conference.
In some embodiments, creating the virtual reality space may include:
acquiring a space creation request, wherein the space creation request carries conference duration and the number of participants;
determining a required storage space of the virtual reality space and the number of channel interfaces in response to the virtual reality space creation request;
and creating a virtual reality space according to the conference duration, the number of participants, the required storage space and the number of channel interfaces.
In some embodiments, the virtual reality space implements a real-time security maintenance function based on the participant's security assessment coefficients; accordingly, after step S401, it may further include:
acquiring meeting configuration information of a virtual reality space, wherein the meeting configuration information comprises at least one of meeting time length, encryption grade, number of participants, required storage space and number of channel interfaces;
based on meeting configuration information, determining a safety evaluation coefficient of a participant in real time;
and under the condition that the safety degree evaluation coefficient of the participant is lower than the corresponding safety degree threshold value, performing account locking on the participant.
The security evaluation coefficient of the participant may be the second security evaluation coefficient in the above embodiment.
In some embodiments, after step S401, it may further include:
generating a conference secret key of the virtual reality space;
encrypting the conference secret key according to the public key corresponding to the participant;
and sending the encrypted conference secret key to the participant, so that the participant decrypts the encrypted conference secret key through the corresponding private key to obtain the conference secret key, and the participant joins the virtual reality space through the conference secret key.
Thus, the participant can enter the virtual reality space through the conference key.
In some embodiments, the conference key input by the participant can be verified, and after the verification is passed, the participant can be subjected to security authentication, and after the security authentication is passed, the participant is allowed to join the virtual reality space. That is, the financial service processing method based on the virtual reality technology may further include:
receiving a conference secret key input by a participant;
verifying the conference secret key;
under the condition that the conference secret key passes verification, carrying out security authentication on the participant according to part of authentication information in a plurality of authentication information bound by the participant;
after the security authentication passes, the participant is allowed to join the virtual reality space.
In some embodiments, the partial authentication information is determined by:
acquiring historical use conditions of each authentication information in a plurality of authentication information;
determining the use intensity of each piece of authentication information according to the historical use condition of each piece of authentication information, wherein the use intensity of the authentication information indicates the frequency of the corresponding piece of authentication information in a historical time period and the time interval of the latest use;
based on the use intensity of each authentication information, partial authentication information is determined from a plurality of authentication information.
In some embodiments, the virtual reality space implements a real-time security maintenance function based on the participant's security assessment coefficients; correspondingly, the financial business processing method based on the virtual reality technology can further comprise the following steps:
acquiring the number of authentication information which does not pass authentication in part of the authentication information;
determining a safety evaluation coefficient based on the number;
and under the condition that the safety degree evaluation coefficient of the participant is lower than the corresponding safety degree threshold value, performing account locking on the participant.
The security evaluation coefficient may be the third security evaluation coefficient in the above embodiment.
In some embodiments, after step S401, it may further include:
the method comprises the steps of obtaining an encryption grade of a virtual reality space and a conference record file in the virtual reality space, wherein the conference record file is a record file when a participant negotiates to process financial services in the virtual reality space;
and encrypting and storing the conference record file by adopting an encryption mode corresponding to the encryption grade.
In some embodiments, the encrypting and storing the meeting record file by adopting an encrypting mode corresponding to the encrypting level includes:
slicing the conference record file according to the time dimension to obtain a plurality of slice files;
Encrypting and storing a target slice file in the plurality of slice files;
and distributing other slice files except the target slice file in the plurality of slice files to the participant, so that the participant encrypts and saves the distributed slice files.
In some embodiments, encrypting and saving a target slice file of a plurality of slice files includes:
encrypting the target slice file by adopting a first encryption mode to obtain a primary encryption result;
encrypting the primary encryption result by adopting a second encryption mode to obtain a composite encryption result;
and (5) storing the composite encryption result.
In some embodiments, the financial business processing method based on the virtual reality technology may further include:
generating a visual image corresponding to a participant when the participant negotiates to process financial services in a virtual reality space, wherein the visual image corresponding to the participant comprises user virtual images, preset scenes and background sounds corresponding to the preset scenes of other participants in the virtual reality space;
and sending the visual image corresponding to the participant so that the participant displays the corresponding visual image.
It should be noted that, technical features in other embodiments of the present application may also be used in this embodiment, and for descriptions of steps that are the same as or similar to those in other embodiments of the present application, reference may be made to other embodiments, for example, specific authentication, encryption, etc. in other embodiments still apply to this embodiment, which is not repeated herein.
Therefore, the financial service processing method based on the virtual reality technology provided by the embodiment of the application is characterized in that by creating the virtual reality space, adding the virtual reality space after the participant passes the security authentication, negotiating and processing the financial service in the virtual reality space, and the virtual reality space has a real-time security maintenance function, so that the real service scenes such as service negotiation, electronic contract signing and the like in the real financial service field can be transplanted to the virtual reality space based on the virtual reality technology, the financial service processing is performed in the virtual reality space, and the security of the financial service processing in the virtual reality space is ensured, thereby the universe of the financial service such as service negotiation, electronic contract signing and legal authentication process of a high-machine-level becomes possible.
Fig. 5 is a schematic structural diagram of a financial service processing device based on virtual reality technology according to an embodiment of the present application. As shown in fig. 5, the financial transaction processing device 500 based on the virtual reality technology includes: an information acquisition module 510, a login module 520, a space creation module 530, an authentication module 540, and a security assessment module 550.
The information obtaining module 510 is configured to obtain a plurality of authentication information bound by a participant;
The login module 520 is configured to receive a login request of a participant, and perform login according to login information of the participant;
a space creation module 530, configured to create a virtual reality space for a participant, and send a meeting key to other participants according to the participant information in the virtual reality space;
the authentication module 540 is configured to obtain a meeting result and authenticate the meeting result;
the security evaluation module 550 is configured to determine a security evaluation coefficient of the participant in real time after the participant logs in, and set the authority of the participant according to the security evaluation coefficient of the participant;
and the authentication module 540 is used for authenticating the conference result according to the plurality of authentication information.
It should be noted that, the financial service processing apparatus 500 based on the virtual reality technology provided in the embodiment of the present application may execute the financial service processing method based on the virtual reality technology in the embodiment shown in fig. 1 to 3. The financial service processing device based on the virtual reality technology can be electronic equipment or be configured in the electronic equipment, such as a metauniverse system platform configured in the electronic equipment.
The electronic device may be any device with computing capability, for example, may be a personal computer, a mobile terminal, a server, etc., and the mobile terminal may be, for example, a vehicle-mounted device, a mobile phone, a tablet computer, a personal digital assistant, a wearable device, etc., which have various operating systems, touch screens, and/or display screens.
In some embodiments, security assessment module 550 includes a first security assessment unit to:
acquiring network attack state information of terminal equipment logged in by a participant in real time;
determining a network attack damage value based on the network attack state information;
a first one of the security assessment coefficients is determined based on the network attack damage value.
In some embodiments, the network attack status information includes at least one attack number of network attacks and a corresponding attack type; the first security evaluation unit is specifically configured to:
acquiring the corresponding dangerous intensity of each attack type;
and taking the attack times corresponding to each attack type as weights, and carrying out weighted summation on the dangerous intensity corresponding to each attack type to obtain the network attack damage value.
In some embodiments, in case the participant performs an irregular operation behaviour, the first security assessment unit is further adapted to:
determining a security risk value for the participant based on the non-routine operational behavior;
a first security assessment coefficient is determined based on the network attack damage value and the security risk value.
In some embodiments, the first security assessment unit is configured to:
Determining a first safety evaluation coefficient according to Safe1 = S1-d-p;
wherein Safe1 represents a first safety evaluation coefficient; s1, a first preset safety evaluation coefficient value is represented; d represents a network attack damage value; p represents a security risk value.
In some embodiments, the non-regular operational behavior is implemented based on a first authentication information among the plurality of authentication information; a first security evaluation unit configured to:
acquiring second authentication information input by a participant and input duration of the second authentication information;
verifying the second authentication information based on the first authentication information;
and determining the security risk value of the participant based on the input duration of the second authentication information and the verification result of the second authentication information.
In some embodiments, the first authentication information is determined by:
acquiring historical use conditions of each authentication information in a plurality of authentication information;
determining the use intensity of each piece of authentication information according to the historical use condition of each piece of authentication information, wherein the use intensity of the authentication information indicates the frequency of the corresponding piece of authentication information in a historical time period and the time interval of the latest use;
the first authentication information is determined from the plurality of authentication information based on the use intensity of each authentication information.
In some embodiments, the first security assessment unit is configured to:
according toDetermining a security risk value of the participant;
wherein p represents a security risk value; omega represents a preset basic security risk value; n1 represents the number of second authentication information or first authentication information; k1 represents a first preset coefficient; i i Representing a verification result of the ith second authentication information, wherein in the case where the verification result is passed, I i Is 0, and in the case that the verification result is failed, I i Has a value of 1; t (T) i Representing an input duration of the ith second authentication information; t (T) 0 Representing an input duration threshold.
In some embodiments, the financial transaction processing apparatus 500 based on the virtual reality technology may further include: a configuration module for:
after the participant logs in, the participant is set to have low-level rights;
and authenticating the identity of the participant according to third authentication information in the plurality of authentication information, and setting that the participant has advanced authority after the identity authentication is passed.
In some embodiments, the security assessment module 550 may further include a second security assessment unit for:
after creating a virtual reality space for a participant, acquiring conference configuration information of the virtual reality space, wherein the conference configuration information comprises at least one of conference duration, encryption level, number of participants, required storage space and number of channel interfaces;
And determining a second security assessment coefficient in the security assessment coefficients in real time based on the conference configuration information.
In some embodiments, the second security assessment unit is configured to:
according toDetermining a second safety evaluation coefficient; />
Wherein Safe2 represents a second security assessment coefficient; p represents the number of participants; k2 represents a second preset coefficient; r is R k Representing an encryption level; st represents the duration of the conference; k represents the required storage space; c represents the number of channel interfaces.
In some embodiments, the second security assessment unit is further configured to:
according toAnd determining the value of the second safety degree evaluation coefficient as a second preset safety degree evaluation coefficient value under the condition that the value of the determined second safety degree evaluation coefficient is larger than or equal to the second preset safety degree evaluation coefficient value.
In some embodiments, the space creation module 530 is configured to:
determining other participants according to the participant information in the virtual reality space;
obtaining public keys corresponding to other participants;
encrypting the conference secret key through the public key;
and sending the encrypted conference secret key to other participants so that the other participants decrypt the encrypted conference secret key through the corresponding private key to obtain the conference secret key.
In some embodiments, after sending the conference key to other participants according to the participant information of the virtual reality space, the authentication module 540 is further configured to:
acquiring fourth authentication information bound by other participants;
according to the fourth authentication information, carrying out identity authentication on other participants;
in case of passing the identity authentication, other participants are allowed to enter the virtual reality space.
In some embodiments, authentication module 540 is configured to:
acquiring a plurality of fifth authentication information bound by other participants;
acquiring historical use conditions of each fifth authentication information;
determining the use intensity of each fifth authentication information according to the historical use condition of each fifth authentication information, wherein the use intensity of the fifth authentication information indicates the frequency of the corresponding fifth authentication information in the historical time period and the last used interval duration;
fourth authentication information is determined from the plurality of fifth authentication information based on the use intensity of each of the fifth authentication information.
In some embodiments, the correlation of the fifth authentication information with the terminal device on which the other participant is logged in is below a correlation threshold.
In some embodiments, the security assessment module 550 further comprises a third security assessment unit for:
Acquiring sixth authentication information among the plurality of authentication information;
before the participant enters the virtual reality space, authenticating the identity of the participant according to the sixth authentication information;
acquiring the number of authentication information which does not pass authentication in the sixth authentication information;
and determining a third safety degree evaluation coefficient in the safety degree evaluation coefficients based on the quantity, the first safety degree evaluation coefficient and the second safety degree evaluation coefficient.
In some embodiments, the third security assessment unit is specifically configured to:
under the condition that the number is larger than a preset number threshold, determining the value of the third safety degree evaluation coefficient as a preset value, wherein the preset value is lower than the safety degree threshold corresponding to the third safety degree evaluation coefficient;
and determining a third safety degree evaluation coefficient in the safety degree evaluation coefficients based on the number, the first safety degree evaluation coefficient, the second safety degree evaluation coefficient and a preset formula under the condition that the number is not larger than a preset number threshold.
In some embodiments, the third security assessment unit is specifically configured to:
according to Safe3 = S2-K3 Σ i W i -K4 (S2-Safe 2) -K5 (S2-Safe 1), determining a third safety assessment factor;
wherein Safe3 represents a third safety evaluation coefficient; s2, a third preset safety evaluation coefficient value is represented; k3 represents a third preset coefficient; k4 represents a fourth preset coefficient; k5 represents a fifth preset coefficient; sigma (sigma) i W i Indicating the number of authentication information that fails authentication in the sixth authentication information; safe2 represents a second security assessment coefficient; safe1 represents a first safety evaluation coefficient.
In some embodiments, the security assessment module further comprises: a permission setting unit configured to:
and under the condition that at least one of the first security degree evaluation coefficient, the second security degree evaluation coefficient and the third security degree evaluation coefficient is lower than the corresponding security degree threshold value, performing account locking on the participant.
In some embodiments, the rights setting unit is further configured to:
and unlocking the account number of the participant based on seventh authentication information among the plurality of authentication information bound by the participant.
In some embodiments, the rights setting unit is specifically configured to:
acquiring historical use conditions of each authentication information in a plurality of authentication information;
determining the use intensity of each authentication information according to the historical use condition of each authentication information, wherein the use intensity indicates the frequency of the corresponding authentication information in the historical time period and the latest use interval duration;
determining seventh authentication information from the plurality of authentication information based on the use intensity of each authentication information;
based on the seventh authentication information, identity authentication is performed on the participant, and account unlocking is performed on the participant under the condition that the identity authentication passes.
In some embodiments, the authority setting unit is configured to:
according toDetermining the use intensity of each authentication information;
wherein s is i Indicating the use intensity of the ith authentication information; f (f) i Representing the frequency of use of the ith authentication information in the history period; k6 represents a sixth preset coefficient; a, a i Indicating the number of times of recent use; i i1 Indicating whether the ith authentication information appears in the last used authentication information, in the case of appearance, I i1 Has a value of 1, in the absence of I i1 The value of (2) is 0; i i2 Indicating whether the ith authentication information appears in the last but not last used authentication information, in the case of appearance, I i2 Has a value of 1, in the absence of I i2 The value of (2) is 0; alpha is a non-negative parameter;representing an indicative function, at I i1 In the case of 1, < >>Has a value of 1, at I i1 In case of 0, < + >>The value of (2) is 0.
In some embodiments, the authority setting unit is configured to:
sequencing the authentication information according to the order of the use intensity from low to high;
and determining the authentication information of the preset number which is sequenced in front as seventh authentication information.
In some embodiments, the financial transaction processing apparatus 500 based on the virtual reality technology may further include: file record and save module, is used for:
Acquiring an encryption grade of a virtual reality space and a meeting record file in the virtual reality space;
and encrypting and storing the conference record file by adopting an encryption mode corresponding to the encryption grade.
In some embodiments, the file recording and saving module is specifically configured to:
slicing the conference record file according to the time dimension to obtain a plurality of slice files;
encrypting and storing a target slice file in the plurality of slice files;
and distributing other slice files except the target slice file in the plurality of slice files to the participants and other participants so that the participants and the other participants encrypt and store the distributed slice files.
In some embodiments, the file recording and saving module is specifically configured to:
encrypting the target slice file by adopting a first encryption mode to obtain a primary encryption result;
encrypting the primary encryption result by adopting a second encryption mode to obtain a composite encryption result;
and (5) storing the composite encryption result.
In some embodiments, the financial transaction processing apparatus 500 based on the virtual reality technology may further include: the space image processing module is used for:
generating a visual image corresponding to a participant in the process of participating in a meeting with other participants in a virtual reality space, wherein the visual image corresponding to the participant comprises a user virtual image of the other participants, a preset scene and background sounds corresponding to the preset scene;
And sending the visual image corresponding to the participant so that the participant displays the corresponding visual image.
In some embodiments, authentication module 540 is configured to:
step-by-step authentication is carried out on the participant according to each authentication information in the plurality of authentication information, wherein different authentication information is adopted for different steps of authentication, and after the previous step of authentication passes, the next step of authentication is carried out;
under the condition that the authentication is passed, auditing the conference result according to a preset rule to obtain the conference result after the auditing;
and submitting an authentication application to the related service node based on the post-audit conference result.
In some embodiments, authentication module 540 is further to:
and under the condition that the participant does not pass the authentication, performing account locking on the participant.
In some embodiments, the financial transaction processing apparatus 500 based on the virtual reality technology may further include: the conference result generation module is used for:
acquiring a conference result template and a conference record file in a virtual reality space;
analyzing the conference record file by adopting a natural language processing technology to obtain conference content;
based on the conference content and the conference result template, a conference result is generated.
In some embodiments, the plurality of authentication information includes at least two of the following authentication information entered after the offline registration authorization:
passwords, fingerprints, voiceprints, retina, deoxyribonucleic acid DNA, facial images, electronic signatures, binding phone numbers, security questions, phone numbers of emergency contacts.
The financial service processing device 500 based on the virtual reality technology provided in the embodiment of the present application may be used to execute the technical scheme of the financial service processing method based on the virtual reality technology in the embodiment shown in fig. 1-3, and its implementation principle and technical effect are similar and will not be described herein.
According to the financial service processing device based on the virtual reality technology, through the acquisition of the plurality of authentication information bound by the participant, the login request of the participant is received, the login is carried out according to the login information of the participant, a virtual reality space is created for the participant, conference keys are sent to other participants according to the participant information of the virtual reality space, conference achievements are acquired, and authentication is carried out on the conference achievements, wherein after the participant logs in, the safety evaluation coefficient of the participant is determined in real time, the authority of the participant is set according to the safety evaluation coefficient of the participant, and the conference achievements are authenticated according to the plurality of authentication information, so that the application mode of realizing virtualization of a real financial service scene is realized, the real service scene such as service negotiation, electronic contract signing and the like in the real financial service field is transplanted to the virtual reality space based on the virtual reality technology, financial service processing is carried out in the virtual reality space, the safety of the financial service processing in the virtual reality space is guaranteed, and the high-level financial service such as service negotiation, electronic contract authentication and law change is possible.
Fig. 6 is a schematic structural diagram of another financial service processing apparatus based on virtual reality technology according to an embodiment of the present application. As shown in fig. 6, the financial transaction processing device 600 based on the virtual reality technology includes: the space creation module 610.
The space creation module 610 is configured to create a virtual reality space for a participant to join the virtual reality space after passing the security authentication, and negotiate to process financial services in the virtual reality space, where the virtual reality space has a real-time security maintenance function.
It should be noted that, the financial service processing apparatus 600 based on the virtual reality technology provided in the embodiment of the present application may execute the financial service processing method based on the virtual reality technology in the embodiment shown in fig. 4. The financial service processing device based on the virtual reality technology can be electronic equipment or be configured in the electronic equipment, such as a metauniverse system platform configured in the electronic equipment.
The electronic device may be any device with computing capability, for example, may be a personal computer, a mobile terminal, a server, etc., and the mobile terminal may be, for example, a vehicle-mounted device, a mobile phone, a tablet computer, a personal digital assistant, a wearable device, etc., which have various operating systems, touch screens, and/or display screens.
In some embodiments, the space creation module 610 is configured to:
acquiring a space creation request, wherein the space creation request carries conference duration and the number of participants;
determining a required storage space of the virtual reality space and the number of channel interfaces in response to the virtual reality space creation request;
and creating a virtual reality space according to the conference duration, the number of participants, the required storage space and the number of channel interfaces.
In some embodiments, the virtual reality space implements a real-time security maintenance function based on the participant's security assessment coefficients; the financial service processing apparatus 600 based on the virtual reality technology further includes: a first security maintenance module for:
acquiring meeting configuration information of a virtual reality space, wherein the meeting configuration information comprises at least one of meeting time length, encryption grade, number of participants, required storage space and number of channel interfaces;
based on meeting configuration information, determining a safety evaluation coefficient of a participant in real time;
and under the condition that the safety degree evaluation coefficient of the participant is lower than the corresponding safety degree threshold value, performing account locking on the participant.
In some embodiments, the financial transaction processing apparatus 600 based on the virtual reality technology may further include: a key generation and transmission module for:
Generating a conference secret key of the virtual reality space;
encrypting the conference secret key according to the public key corresponding to the participant;
and sending the encrypted conference secret key to the participant, so that the participant decrypts the encrypted conference secret key through the corresponding private key to obtain the conference secret key, and the participant joins the virtual reality space through the conference secret key.
In some embodiments, the financial transaction processing apparatus 600 based on the virtual reality technology may further include: an authentication module for:
receiving a conference secret key input by a participant;
verifying the conference secret key;
under the condition that the conference secret key passes verification, carrying out security authentication on the participant according to part of authentication information in a plurality of authentication information bound by the participant;
after the security authentication passes, the participant is allowed to join the virtual reality space.
In some embodiments, the partial authentication information is determined by:
acquiring historical use conditions of each authentication information in a plurality of authentication information;
determining the use intensity of each piece of authentication information according to the historical use condition of each piece of authentication information, wherein the use intensity of the authentication information indicates the frequency of the corresponding piece of authentication information in a historical time period and the time interval of the latest use;
Based on the use intensity of each authentication information, partial authentication information is determined from a plurality of authentication information.
In some embodiments, the virtual reality space implements a real-time security maintenance function based on the participant's security assessment coefficients; the financial service processing apparatus 600 based on the virtual reality technology may further include: a second security maintenance module for:
acquiring the number of authentication information which does not pass authentication in part of the authentication information;
determining a safety evaluation coefficient based on the number;
and under the condition that the safety degree evaluation coefficient of the participant is lower than the corresponding safety degree threshold value, performing account locking on the participant.
In some embodiments, the financial transaction processing apparatus 600 based on the virtual reality technology may further include: file record and save module, is used for:
the method comprises the steps of obtaining an encryption grade of a virtual reality space and a conference record file in the virtual reality space, wherein the conference record file is a record file when a participant negotiates to process financial services in the virtual reality space;
and encrypting and storing the conference record file by adopting an encryption mode corresponding to the encryption grade.
In some embodiments, the file record and save module is configured to:
Slicing the conference record file according to the time dimension to obtain a plurality of slice files;
encrypting and storing a target slice file in the plurality of slice files;
and distributing other slice files except the target slice file in the plurality of slice files to the participant, so that the participant encrypts and saves the distributed slice files.
In some embodiments, the file record and save module is configured to:
encrypting the target slice file by adopting a first encryption mode to obtain a primary encryption result;
encrypting the primary encryption result by adopting a second encryption mode to obtain a composite encryption result;
and (5) storing the composite encryption result.
In some embodiments, the financial transaction processing apparatus 600 based on the virtual reality technology may further include: the image processing module is used for:
generating a visual image corresponding to a participant when the participant negotiates to process financial services in a virtual reality space, wherein the visual image corresponding to the participant comprises user virtual images, preset scenes and background sounds corresponding to the preset scenes of other participants in the virtual reality space;
and sending the visual image corresponding to the participant so that the participant displays the corresponding visual image.
The financial service processing device based on the virtual reality technology provided in the embodiment of the application may be used to execute the technical scheme of the financial service processing method based on the virtual reality technology in the embodiment shown in fig. 4, and its implementation principle and technical effect are similar and will not be described in detail here.
According to the financial service processing device based on the virtual reality technology, the virtual reality space is created, the participants join in the virtual reality space after passing through the security authentication, financial services are negotiated and processed in the virtual reality space, and the virtual reality space has a real-time security maintenance function, so that real service scenes such as service negotiations, electronic contract signing and the like in the field of real financial services can be transplanted to the virtual reality space based on the virtual reality technology, financial service processing is conducted in the virtual reality space, and the security of the financial service processing in the virtual reality space is guaranteed, and therefore high-density financial services such as service negotiations, electronic contract signing and meta-universe of legal authentication processes become possible.
It should be noted that, it should be understood that the division of the modules of the above apparatus is merely a division of a logic function, and may be fully or partially integrated into a physical entity or may be physically separated. And these modules may all be implemented in software in the form of calls by the processing element; or can be realized in hardware; the method can also be realized in a form of calling software by a processing element, and the method can be realized in a form of hardware by a part of modules. For example, the security evaluation module 550 may be a processing element that is set up separately, may be implemented in a chip of the above-described apparatus, or may be stored in a memory of the above-described apparatus in the form of program codes, and the functions of the security evaluation module 550 may be invoked and executed by a processing element of the above-described apparatus. The implementation of the other modules is similar. In addition, all or part of the modules can be integrated together or can be independently implemented. The processing element here may be an integrated circuit with signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in a software form.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 7, the electronic device may include: a transceiver 121, a processor 122, a memory 123.
Processor 122 executes the computer-executable instructions stored in the memory, causing processor 122 to perform the aspects of the embodiments described above. The processor 122 may be a general-purpose processor including a central processing unit CPU, a network processor (network processor, NP), etc.; but may also be a digital signal processor DSP, an application specific integrated circuit ASIC, a field programmable gate array FPGA or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component.
Memory 123 is coupled to processor 122 via the system bus and communicates with each other, and memory 123 is configured to store computer program instructions.
The transceiver 121 may be used to acquire a task to be run and configuration information of the task to be run.
The system bus may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The system bus may be classified into an address bus, a data bus, a control bus, and the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus. The transceiver is used to enable communication between the database access device and other computers (e.g., clients, read-write libraries, and read-only libraries). The memory may include random access memory (random access memory, RAM) and may also include non-volatile memory (non-volatile memory).
The electronic device provided in the embodiment of the present application may be a terminal device in the above embodiment.
The embodiment of the application also provides a chip for running the instruction, which is used for executing the technical scheme of the financial business processing method based on the virtual reality technology in the embodiment.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores computer instructions, and when the computer instructions run on a computer, the computer is caused to execute the technical scheme of the financial business processing method based on the virtual reality technology.
The embodiment of the application also provides a computer program product, which comprises a computer program stored in a computer readable storage medium, wherein at least one processor can read the computer program from the computer readable storage medium, and the technical scheme of the financial business processing method based on the virtual reality technology in the embodiment can be realized when the at least one processor executes the computer program.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (48)

1. A financial business processing method based on virtual reality technology is characterized by comprising the following steps:
acquiring a plurality of authentication information bound by a participant;
receiving a login request of the participant, and logging in according to login information of the participant;
creating a virtual reality space for the participant, and sending a conference secret key to other participants according to the participant information of the virtual reality space;
acquiring conference results and authenticating the conference results;
after the participant logs in, determining a security evaluation coefficient of the participant in real time, setting authority of the participant according to the security evaluation coefficient of the participant, and authenticating the conference result according to the authentication information.
2. The method of claim 1, wherein said determining in real time the participant's safety assessment factor comprises:
Acquiring network attack state information of terminal equipment logged in by the participant in real time;
determining a network attack damage value based on the network attack state information;
and determining a first security assessment coefficient in the security assessment coefficients based on the network attack damage value.
3. The method according to claim 2, wherein the network attack status information includes at least one attack number of network attacks and a corresponding attack type;
the determining a network attack damage value based on the network attack state information comprises the following steps:
acquiring the corresponding dangerous intensity of each attack type;
and taking the attack times corresponding to the attack types as weights, and carrying out weighted summation on the dangerous intensities corresponding to the attack types to obtain the network attack damage value.
4. The method of claim 2, wherein the determining the participant's safety assessment factor in real time in the event that the participant performs unusual operational behavior further comprises:
determining a security risk value for the participant based on the non-routine operational behavior;
the determining a first security assessment coefficient of the security assessment coefficients based on the network attack damage value comprises:
And determining the first security assessment coefficient based on the network attack damage value and the security risk value.
5. The method of claim 4, wherein the determining the first security assessment factor based on the cyber-attack damage value and the security risk value comprises:
determining the first safety evaluation coefficient according to Safe1 = S1-d-p;
wherein Safe1 represents the first security assessment coefficient; s1, a first preset safety evaluation coefficient value is represented; d represents the network attack damage value; p represents the security risk value.
6. The method of claim 4, wherein the non-regular operational behavior is implemented based on a first authentication information among the plurality of authentication information;
the determining a security risk value for the participant based on the irregular operational behavior comprises:
acquiring second authentication information input by the participant and input duration of the second authentication information;
verifying the second authentication information based on the first authentication information;
and determining the security risk value of the participant based on the input duration of the second authentication information and the verification result of the second authentication information.
7. The method of claim 6, wherein the first authentication information is determined by:
acquiring historical use conditions of each authentication information in the plurality of authentication information;
determining the use intensity of each piece of authentication information according to the historical use condition of each piece of authentication information, wherein the use intensity of the authentication information indicates the frequency of the corresponding piece of authentication information in a historical time period and the most recently used interval duration;
the first authentication information is determined from the plurality of authentication information based on the use intensity of each of the authentication information.
8. The method of claim 6, wherein the determining the security risk value of the participant based on the input duration of the second authentication information and the verification result of the second authentication information comprises:
according toDetermining a security risk value for the participant;
wherein p represents the security risk value; omega represents a preset basic security risk value; n1 represents the number of the second authentication information or the first authentication information; k1 represents a first preset coefficient; i i Representing a verification result of the ith second authentication information, wherein in the case where the verification result is passed, I i Is 0, and in the case that the verification result is failed, I i Has a value of 1; t (T) i Representing an input duration of the ith second authentication information; t (T) 0 Representing an input duration threshold.
9. The method according to any one of claims 1-8, further comprising:
after the participant logs in, setting that the participant has low-level rights;
and carrying out identity authentication on the participant according to third authentication information in the plurality of authentication information, and setting the participant to have advanced authority after the identity authentication is passed.
10. The method of any of claims 2-8, wherein the determining in real time the participant's safety assessment factor further comprises:
after creating a virtual reality space for the participants, acquiring conference configuration information of the virtual reality space, wherein the conference configuration information comprises at least one of conference duration, encryption level, the number of the participants, required storage space and the number of channel interfaces;
and determining a second safety degree evaluation coefficient in the safety degree evaluation coefficients in real time based on the conference configuration information.
11. The method of claim 10, wherein determining a second one of the security assessment coefficients in real-time based on the conference configuration information comprises:
According toDetermining the second security assessment coefficient;
wherein Safe2 represents the second security assessment coefficient; p represents the number of participants; k2 represents a second preset coefficient; r is R k Representing the encryption level; st represents the conference duration; k represents the required storage space; c represents the number of channel interfaces.
12. The method of claim 11, wherein the determining, in real-time, a second one of the security assessment coefficients based on the conference configuration information, further comprises:
according toAnd determining the value of the second safety degree evaluation coefficient as the second preset safety degree evaluation coefficient value under the condition that the determined value of the second safety degree evaluation coefficient is larger than or equal to the second preset safety degree evaluation coefficient value.
13. The method according to any one of claims 1-8, wherein the sending of the conference key to other participants according to the virtual reality space's participant information comprises:
determining the other participants according to the participant information of the virtual reality space;
obtaining public keys corresponding to the other participants;
encrypting the and session key by the public key;
And sending the encrypted conference secret key to the other participants so that the other participants decrypt the encrypted conference secret key through the corresponding private key to obtain the conference secret key.
14. The method according to any one of claims 1-8, wherein after the sending of the conference key to the other participants according to the virtual reality space's participant information, the method further comprises:
acquiring fourth authentication information bound by the other participants;
according to the fourth authentication information, carrying out identity authentication on the other participants;
and allowing the other participants to enter the virtual reality space under the condition that the identity authentication is passed.
15. The method of claim 14, wherein the obtaining the fourth authentication information bound by the other participant comprises:
acquiring a plurality of fifth authentication information bound by the other participants;
acquiring historical use conditions of each piece of fifth authentication information;
determining the use intensity of each fifth authentication information according to the historical use condition of each fifth authentication information, wherein the use intensity of the fifth authentication information indicates the frequency of the corresponding fifth authentication information in a historical time period and the most recently used interval duration;
The fourth authentication information is determined from the plurality of fifth authentication information based on the use intensity of each of the fifth authentication information.
16. The method of claim 15, wherein the fifth authentication information has a correlation with the terminal device on which the other participant is logged below a correlation threshold.
17. The method of claim 10, wherein said determining in real time the participant's safety assessment factor further comprises:
acquiring sixth authentication information among the plurality of authentication information;
before the participant enters the virtual reality space, authenticating the participant according to the sixth authentication information;
acquiring the number of authentication information which does not pass authentication in the sixth authentication information;
a third one of the security assessment coefficients is determined based on the number, the first security assessment coefficient, and the second security assessment coefficient.
18. The method of claim 17, wherein the determining a third one of the security assessment coefficients based on the number, the first security assessment coefficient, and the second security assessment coefficient comprises:
Determining the value of the third safety evaluation coefficient to be a preset value under the condition that the number is larger than a preset number threshold, wherein the preset value is lower than the safety threshold corresponding to the third safety evaluation coefficient;
and determining a third safety degree evaluation coefficient in the safety degree evaluation coefficients based on the number, the first safety degree evaluation coefficient, the second safety degree evaluation coefficient and a preset formula under the condition that the number is not larger than the preset number threshold value.
19. The method of claim 18, wherein the determining a third one of the safety assessment coefficients based on the number, the first safety assessment coefficient, the second safety assessment coefficient, and a preset formula if the number is not greater than the preset number threshold comprises:
according to Safe3 = S2-K3 Σ i W i -K4 (S2-Safe 2) -K5 (S2-Safe 1), determining the third safety assessment factor;
wherein Safe3 represents the third safety evaluation coefficient; s2, a third preset safety evaluation coefficient value is represented; k3 represents a third preset coefficient; k4 represents a fourth preset coefficient; k5 represents a fifth preset coefficient; sigma (sigma) i W i Indicating the number of authentication information that fails authentication in the sixth authentication information; safe2 represents the second security assessment coefficient; safe1 represents the first security assessment coefficient.
20. The method of claim 17, wherein the setting the rights of the participant according to the participant's security assessment factor comprises:
and under the condition that at least one of the first security evaluation coefficient, the second security evaluation coefficient and the third security evaluation coefficient is lower than a corresponding security threshold value, performing account locking on the participant.
21. The method of claim 20, wherein after account locking the participant, further comprising:
and unlocking the account number of the participant based on seventh authentication information among the plurality of authentication information bound by the participant.
22. The method of claim 21, wherein the account unlocking the participant based on a seventh authentication information of the plurality of authentication information bound by the participant comprises:
acquiring historical use conditions of each authentication information in the plurality of authentication information;
Determining the use intensity of each piece of authentication information according to the historical use condition of each piece of authentication information, wherein the use intensity indicates the frequency of the corresponding piece of authentication information in a historical time period and the time interval of the latest use;
determining the seventh authentication information from the plurality of authentication information based on a use intensity of each of the authentication information;
and carrying out identity authentication on the participant based on the seventh authentication information, and carrying out account unlocking on the participant under the condition that the identity authentication passes.
23. The method of claim 22, wherein determining the usage intensity of each authentication information based on the historical usage of each authentication information comprises:
according toDetermining the use intensity of each authentication information;
wherein s is i Indicating the use intensity of the ith authentication information; f (f) i Representing the frequency of use of the ith authentication information in the history period; k6 represents a sixth preset coefficient; a, a i Indicating the number of times of recent use; i i1 Indicating whether the ith authentication information appears in the last used authentication information, in the case of appearance, I i1 Has a value of 1, in the absence of I i1 The value of (2) is 0; i i2 Indicating whether the ith authentication information appears in the last but not last used authentication information, in the case of appearance, I i2 Has a value of 1, in the absence of I i2 The value of (2) is 0; alpha is a non-negative parameter;representing an indicative function, at I i1 In the case of 1, < >>Has a value of 1, at I i1 In case of 0, < + >>The value of (2) is 0.
24. The method of claim 23, wherein the determining the seventh authentication information from the plurality of authentication information based on the usage intensity of each authentication information comprises:
sorting the authentication information according to the order of the use intensity from low to high;
and determining the authentication information of the preset quantity which is sequenced in front as the seventh authentication information.
25. The method according to any one of claims 1-8, further comprising:
acquiring an encryption grade of the virtual reality space and a meeting record file in the virtual reality space;
and encrypting and storing the conference record file by adopting an encryption mode corresponding to the encryption grade.
26. The method of claim 25, wherein encrypting and storing the meeting record file using the encryption method corresponding to the encryption level comprises:
Slicing the conference record file according to the time dimension to obtain a plurality of slice files;
encrypting and storing a target slice file in the plurality of slice files;
and distributing other slice files except the target slice file in the plurality of slice files to the participant and the other participants so that the participant and the other participants encrypt and store the distributed slice files.
27. The method of claim 26, wherein encrypting and saving a target slice file of the plurality of slice files comprises:
encrypting the target slice file by adopting a first encryption mode to obtain a primary encryption result;
encrypting the primary encryption result by adopting a second encryption mode to obtain a composite encryption result;
and storing the composite encryption result.
28. The method according to any one of claims 1-8, further comprising:
generating a visual image corresponding to the participant in the process of meeting the participant and the other participants in the virtual reality space, wherein the visual image corresponding to the participant comprises a user virtual image of the other participants, a preset scene and background sounds corresponding to the preset scene;
And sending the visual image corresponding to the participant so that the participant displays the corresponding visual image.
29. The method of any of claims 1-8, wherein authenticating the meeting outcome based on the plurality of authentication information comprises:
step-by-step authentication is carried out on the participant according to each authentication information in the plurality of authentication information, wherein different authentication information is adopted for different steps of authentication, and after the previous step of authentication passes, the next step of authentication is carried out;
under the condition that the authentication is passed, auditing the conference result according to a preset rule to obtain an audited conference result;
and submitting an authentication application to the related service node based on the post-auditing meeting result.
30. The method of claim 29, wherein after the step-wise authenticating the participant based on each of the plurality of authentication information, further comprising:
and under the condition that the participant does not pass the authentication, performing account locking on the participant.
31. The method according to any one of claims 1-8, further comprising:
Acquiring a conference result template and a conference record file in the virtual reality space;
analyzing the conference record file by adopting a natural language processing technology to obtain conference content;
and generating the conference result based on the conference content and the conference result template.
32. The method according to any one of claims 1-8, wherein the plurality of authentication information includes at least two of the following authentication information entered after offline registration authorization:
passwords, fingerprints, voiceprints, retina, deoxyribonucleic acid DNA, facial images, electronic signatures, binding phone numbers, security questions, phone numbers of emergency contacts.
33. A financial business processing method based on virtual reality technology is characterized by comprising the following steps:
creating a virtual reality space for a participant to join the virtual reality space after passing the security authentication, negotiating and processing financial services in the virtual reality space, wherein the virtual reality space has a real-time security maintenance function.
34. The method of claim 33, wherein the creating a virtual reality space comprises:
acquiring a space creation request, wherein the space creation request carries conference duration and the number of participants;
Determining a required storage space of the virtual reality space and the number of channel interfaces in response to the virtual reality space creation request;
and creating the virtual reality space according to the conference duration, the number of participants, the required storage space and the number of channel interfaces.
35. The method of claim 34, wherein the virtual reality space implements a real-time security maintenance function based on the participant's security assessment coefficients;
after the creating the virtual reality space, the method further comprises:
acquiring conference configuration information of the virtual reality space, wherein the conference configuration information comprises at least one of conference duration, encryption level, number of participants, required storage space and number of channel interfaces;
determining a safety evaluation coefficient of the participant in real time based on the conference configuration information;
and under the condition that the safety degree evaluation coefficient of the participant is lower than the corresponding safety degree threshold value, performing account locking on the participant.
36. The method of any one of claims 33-35, further comprising, after the creating the virtual reality space:
Generating a conference secret key of the virtual reality space;
encrypting the conference secret key according to the public key corresponding to the participant;
and sending the encrypted conference secret key to the participant, so that the participant decrypts the encrypted conference secret key through a corresponding private key to obtain the conference secret key, and adds the conference secret key into the virtual reality space.
37. The method of claim 36, wherein the method further comprises:
receiving the conference secret key input by the participant;
verifying the conference secret key;
under the condition that the conference secret key passes verification, carrying out security authentication on the participant according to part of authentication information in a plurality of authentication information bound by the participant;
after the security authentication is passed, the participant is allowed to join the virtual reality space.
38. The method of claim 37, wherein the partial authentication information is determined by:
acquiring historical use conditions of each authentication information in the plurality of authentication information;
determining the use intensity of each piece of authentication information according to the historical use condition of each piece of authentication information, wherein the use intensity of the authentication information indicates the frequency of the corresponding piece of authentication information in a historical time period and the most recently used interval duration;
The partial authentication information is determined from the plurality of authentication information based on the use intensity of each of the authentication information.
39. The method of claim 37, wherein the virtual reality space implements a real-time security maintenance function based on the participant's security assessment coefficients; the method further comprises the steps of:
acquiring the number of authentication information which does not pass authentication in the partial authentication information;
determining the safety evaluation coefficient based on the number;
and under the condition that the safety degree evaluation coefficient of the participant is lower than the corresponding safety degree threshold value, performing account locking on the participant.
40. The method of any one of claims 33-35, further comprising, after the creating the virtual reality space:
acquiring an encryption grade of the virtual reality space and a conference record file in the virtual reality space, wherein the conference record file is a record file when the participant negotiates to process financial services in the virtual reality space;
and encrypting and storing the conference record file by adopting an encryption mode corresponding to the encryption grade.
41. The method of claim 40, wherein encrypting and storing the meeting record file using the encryption scheme corresponding to the encryption level comprises:
Slicing the conference record file according to the time dimension to obtain a plurality of slice files;
encrypting and storing a target slice file in the plurality of slice files;
and distributing other slice files except the target slice file in the plurality of slice files to the participant so that the participant encrypts and saves the distributed slice files.
42. The method of claim 41, wherein encrypting and saving a target slice file of the plurality of slice files comprises:
encrypting the target slice file by adopting a first encryption mode to obtain a primary encryption result;
encrypting the primary encryption result by adopting a second encryption mode to obtain a composite encryption result;
and storing the composite encryption result.
43. The method according to any one of claims 33-35, further comprising:
generating a visual image corresponding to the participant when the participant negotiates to process financial services in the virtual reality space, wherein the visual image corresponding to the participant comprises user virtual images of other participants in the virtual reality space, a preset scene and background sounds corresponding to the preset scene;
And sending the visual image corresponding to the participant so that the participant displays the corresponding visual image.
44. A financial transaction processing device based on virtual reality technology, comprising:
the information acquisition module is used for acquiring a plurality of authentication information bound by the participant;
the login module is used for receiving a login request of the participant and logging in according to login information of the participant;
the space creating module is used for creating a virtual reality space for the participants and sending conference secret keys to other participants according to the participant information of the virtual reality space;
the authentication module is used for acquiring conference results and authenticating the conference results;
the safety evaluation module is used for determining the safety evaluation coefficient of the participant in real time after the participant logs in, and setting the authority of the participant according to the safety evaluation coefficient of the participant;
and the authentication module is used for authenticating the conference result according to the plurality of authentication information.
45. A financial transaction processing device based on virtual reality technology, comprising:
The system comprises a space creation module, a virtual reality space generation module and a real-time security maintenance module, wherein the space creation module is used for creating a virtual reality space for a participant to join the virtual reality space after passing the security authentication, negotiating and processing financial services in the virtual reality space, and the virtual reality space has a real-time security maintenance function.
46. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored in the memory to implement the method of any one of claims 1-32 or the method of any one of claims 33-43.
47. A computer readable storage medium having stored therein computer executable instructions for implementing the method of any of claims 1-32 or the method of any of claims 33-43 when executed by a processor.
48. A computer program product comprising a computer program which, when executed by a processor, implements the method of any of claims 1-32 or the method of any of claims 33-43.
CN202311641721.6A 2023-12-01 2023-12-01 Financial business processing method and device based on virtual reality technology and electronic equipment Pending CN117749544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311641721.6A CN117749544A (en) 2023-12-01 2023-12-01 Financial business processing method and device based on virtual reality technology and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311641721.6A CN117749544A (en) 2023-12-01 2023-12-01 Financial business processing method and device based on virtual reality technology and electronic equipment

Publications (1)

Publication Number Publication Date
CN117749544A true CN117749544A (en) 2024-03-22

Family

ID=90257078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311641721.6A Pending CN117749544A (en) 2023-12-01 2023-12-01 Financial business processing method and device based on virtual reality technology and electronic equipment

Country Status (1)

Country Link
CN (1) CN117749544A (en)

Similar Documents

Publication Publication Date Title
CN111429254B (en) Business data processing method and device and readable storage medium
CN106330850B (en) Security verification method based on biological characteristics, client and server
CN108880822B (en) Identity authentication method, device and system and intelligent wireless equipment
CN111988147B (en) Combined signature and signature verification method, system and storage medium
WO2015158874A1 (en) Method and system for user authentication
CN110287739B (en) Data security management method and system based on hardware private key storage technology
CN111131336B (en) Resource access method, device, equipment and storage medium under multi-party authorization scene
US20210241270A1 (en) System and method of blockchain transaction verification
CN101420302A (en) Safe identification method and device
CN112583608B (en) Cooperative processing method, device and equipment
CN111355591A (en) Block chain account safety management method based on real-name authentication technology
WO2022042745A1 (en) Key management method and apparatus
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment
Akbarfam et al. Dlacb: Deep learning based access control using blockchain
CN111600721B (en) Asset management system, method and device based on multi-person voting mechanism
CN117749544A (en) Financial business processing method and device based on virtual reality technology and electronic equipment
Edwards et al. FFDA: A novel four-factor distributed authentication mechanism
CN113726515A (en) UKEY-based key processing method, storage medium and electronic device
CN113360575A (en) Method, device, equipment and storage medium for supervising transaction data in alliance chain
SHAKIR User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Tan et al. An evaluation study of user authentication in the malaysian fintech industry with uauth security analytics framework
Elhag Enhancing online banking transaction authentication by using tamper proof & cloud computing
CN109284615B (en) Mobile equipment digital resource safety management method
Kang et al. Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination