US20140344898A1 - Stand-in authorization system and stand-in authorization method - Google Patents
Stand-in authorization system and stand-in authorization method Download PDFInfo
- Publication number
- US20140344898A1 US20140344898A1 US14/366,670 US201214366670A US2014344898A1 US 20140344898 A1 US20140344898 A1 US 20140344898A1 US 201214366670 A US201214366670 A US 201214366670A US 2014344898 A1 US2014344898 A1 US 2014344898A1
- Authority
- US
- United States
- Prior art keywords
- entrusted
- verification
- authorization
- transaction
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
- G06Q20/027—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Definitions
- the present invention relates to the field of data processing, and in particular, to an entrusted-authorization system and an entrusted-authorization method.
- Entrusted-authorization business of on-line accounting system has just started domestically.
- a sharing platform for previously applied business card on-line entrusted-authorization, for example, does not exist.
- Various on-line accounting systems can only cope with some risks in a manner of multi-machine backup. However, if the on-line accounting system needs a whole system maintenance or it cannot provide a linking service to the outside due to some disastrous reason, the system completely goes down.
- Foreign big credit card organizations have mandatory requirements of entrusted-authorization for their admitted member mechanisms. Comparatively speaking, the admitted member mechanisms have less personalized customizations but stronger constraints due to their business modes and platforms.
- the present invention provides an entrusted-authorization system and an entrusted-authorization method for ensuring normal processing of transaction requests in case that the accounting system is unavailable.
- An entrusted-authorization system characterized in that, the entrusted-authorization system comprises an accounting system, a switch module and an entrusted-authorization module, wherein the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system; the switch module is connected with the accounting system and the entrusted-authorization module for transmitting transaction request messages from the client terminal to the entrusted-authorization module in case that the accounting system is unavailable, whereby the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system for processing, the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount. 2.
- the entrusted-authorization module comprises data communication module, verification processing module and database, wherein the data communication module is connected between the switch module and the verification processing module so as to transfer information therebetween;
- the database stores the entrusted-authorization parameters, the transaction information and cause of failure, the entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, the account information comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of the card (CVN), information in IC card which corresponds to the ones in validity verification items of account;
- the verification processing module stores the validity verification items of account, where the validity verification items of account comprise at least one of verification of card number, verification of term of validity of the card, verification of check digit of card, verification of password, verification of CVN, and verification of IC card information;
- the verification processing module is configured to perform the following steps: A.
- the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amount, transaction type and transaction date.
- the entrusted-authorization system characterized in that the verification processing module stores verification events of account risk, the verification events of account risk comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control, the entrusted-authorization parameters further comprises account risk information which further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to the items in the verification events of account risk; wherein the verification processing module determines the verification events of account risk according to the account risk information and performing verification according to the determined verification events of the account risk, and step D is performed if the verification is approved, or otherwise, the verification processing module generates and sends a response message indicating the failure to the data communication module and sending the cause of failure to the database.
- the entrusted-authorization system according to technical solution 2 or 3, characterized in that the entrusted-authorization parameters further comprises permitted transaction types and the verification processing module is further configured to: determine the transaction types according to the transaction request messages; and verify the transaction types according to the permitted transaction type. 5.
- An entrusted-authorization method applied to entrusted-authorization system characterized in that the entrusted-authorization system comprises an accounting system, an entrusted-authorization module and a switch module connected with the accounting system and the entrusted-authorization module, the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system, the entrusted-authorization method comprising: the switch module transmits transaction request messages from the client terminal to the entrusted-authorization module in case that the accounting system is unavailable, whereby the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, sending the messages to the accounting system for processing, wherein the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount.
- the entrusted-authorization method characterized in that the entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, the account information comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of the card (CVN), information in IC card which corresponds to items in validity verification events of the account, wherein the entrusted-authorization module verifying the transaction request messages according to the entrusted-authorization parameters comprises the following steps: A.
- the entrusted-authorization module verifies the validity of the transaction request messages, and performs subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module;
- B. verifies the transaction request messages according to the financial mechanism information and the transaction initiation mechanism information in the entrusted-authorization parameters, and performs subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module;
- C verifies the validity of the transaction request messages, and performs subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module;
- the validity verification events of account determines the validity verification events of account according to account information and performs the verification according to the determined validity verification events of account, and performs subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module; wherein the validity verification events of account is stored in the entrusted-authorization module, and the validity verification events of account comprise at least one of verification of card number, verification of term of validity of the card, verification of check digit of the card, verification of password, verification of CVN, and verification of IC card information; D.
- the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amount, transaction types and transaction dates.
- the entrusted-authorization module determines verification events of account risk according to account risk information and performs the verification according to the determined verification events of the account risk, and performs step D if the verification is approved, or otherwise, generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module, wherein the verification events of the account risk is stored in the entrusted-authorization module, the verification events of the account risk comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control, the entrusted-authorization parameters further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to items in verification events of the account risk. 9.
- the entrusted-authorization method characterized in that the entrusted-authorization parameters further comprises permitted transaction types, and verifying the transaction request messages according to the entrusted-authorization parameters comprises: the entrusted-authorization module determining the transaction types according to the transaction request messages; and the entrusted-authorization module verifying the transaction types according to the permitted transaction types.
- the entrusted-authorization method according to one of technical solutions 6 to 9, characterized in that the method further comprises: uploading the entrusted-authorization parameters determined by the accounting system to the database when the accounting system is available; and the entrusted-authorization module delivering the transaction information and the cause of failure during entrusted-authorization to the accounting system when the switch module switches the transaction to the accounting system.
- the entrusted-authorization system and the entrusted-authorization method of the invention can be flexibly applied, can effectively solve the problems such as the on-line accounting system not being able to provide service to the outside in case of disastrous shutdown, overall upgrading, etc.
- admitted member mechanisms i.e. the accounting systems
- admitted member mechanisms are given a maximum freedom of control, which is flexible, safe, controllable, and can greatly reduce the costs involved in a case where each on-line accounting system builds up a backup system so that the admitted member mechanisms can set entrusted-authorization parameters as actually required.
- FIG. 1 is a schematic view showing the structure of the entrusted-authorization system of the invention.
- FIG. 2 is a schematic view showing the flowchart of the entrusted-authorization method of the invention.
- FIG. 1 is a schematic view showing the structure of the entrusted-authorization system of the invention.
- the entrusted-authorization system of the invention comprises an accounting system 1 , a switch module 2 and an entrusted-authorization module 3 .
- the entrusted-authorization module 3 comprises a data communication module 30 , a verification processing module 31 and a database 32 .
- the entrusted-authorization module 3 of the invention further comprises a parameter uploading module 33 and a transaction delivering module 34 .
- the entrusted-authorization module 3 stores the entrusted-authorization parameters determined by the accounting system 1 .
- the switch module 2 is connected with the accounting system 1 for transmitting transaction request messages from the client terminal 4 to the entrusted-authorization module 3 in case that the accounting system 1 is unavailable, the entrusted-authorization module 3 verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system 1 for processing, wherein the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount.
- the parameter uploading module 33 is used for uploading the entrusted-authorization parameters from the accounting system 1 to the database 32 when the accounting system is available.
- the transaction delivering module 34 is used for delivering transaction information and cause of failure during entrusted-authorization in the database 32 to the accounting system 1 when the switch module 2 switches transaction to the accounting system 1 .
- the data communication module 30 is connected between the switch module 2 and the verification processing module 31 so as to transfer information therebetween.
- the database 32 stores the entrusted-authorization parameters, the transaction information and the cause of failure.
- the entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, in which the account information comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of the card (CVN), information in the IC card which corresponds to items in validity verification events of the account.
- the verification processing module 31 is configured to perform the following steps:
- the validity verification events of account is stored in the verification processing module, and the validity verification events of account comprise at least one of the verification of card number, verification of term of validity of the card, verification of check digit of the card, verification of password, verification of CVN, and verification of IC card information.
- the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amount, transaction types and transaction dates.
- step B if the entrusted-authorization parameters are consistent with financial mechanism information and transaction initiation mechanism information in the transaction request messages, then the verification is approved; otherwise, the verification is not approved.
- taking the validity verification events of account comprises verification of card number and verification of term of validity of the card as an example. If account information in the entrusted-authorization parameters comprises card number or term of validity of the card or both (taking the account information comprising both card number and term of validity of the card as an example), it is determined to verify the card number and the term of validity of the card. If the card numbers are consistent and the current date is within the term of validity of the card, the verification is approved; otherwise, the verification is not approved. Those skilled in the art can determine the entrusted-authorization parameters as actually required so as to determine the corresponding validity verification events of account, thus providing the accounting system 1 with greater flexibility and selectivity.
- the entrusted-authorization parameters further comprise account risk information which further comprises information selected from a group comprising the following items: information in account blacklist, commercial tenant blacklist and limit control that corresponds to the items in verification events of account risk; wherein the verification events of account risk are stored in the verification processing module 31 and comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control.
- the verification processing module 31 can also determine the verification events of account risk according to the account risk information and perform verification according to the determined verification events of account risk. If the verification is approved, the step D is performed; otherwise, a response message indicating failure is generated and sent to the data communication module 30 and the cause of failure is sent to the database 32 .
- Account risk information then comprises account blacklist or limit or both.
- account risk information comprising only account blacklist as an example, it is determined to verify account blacklist. If the financial account information in the transaction request messages is in the account blacklist, then the verification is not approved; otherwise, the verification is approved.
- the entrusted-authorization parameters further comprises permitted transaction types
- the verification processing module 31 is configured to determine the transaction types according to the transaction request messages and verify the transaction types according to the permitted transaction types. If a determined transaction type belongs to a permitted transaction type, then the verification is approved; otherwise, the verification is not approved.
- the permitted transaction type supports various transactions in the art. The specific transaction type is selected by the entrusted-authorization member mechanisms (i.e., the accounting systems), and different entrusted-authorization member mechanisms (i.e., the accounting systems) can select completely different transaction types.
- the permitted transaction type includes consumption transaction, authorized transaction, payment transaction, cashing transaction and pre-authorization transaction, without being limited thereto. With development of the technology, other new types of transactions can be further included without departing from the scope of protection of the invention.
- FIG. 2 is a schematic view showing the flowchart of the entrusted-authorization method of the invention which is applied to entrusted-authorization system.
- the entrusted-authorization system comprises an accounting system, an entrusted-authorization module, and a switch module connected to the accounting system and the entrusted-authorization module.
- the entrusted-authorization module stores the entrusted-authorization parameters determined by the accounting system.
- the entrusted-authorization method of the invention comprises the following steps:
- step 100 in which it is determined whether the accounting system is available; if not, step 101 is performed; otherwise, step 102 is performed.
- step 101 in which the switch module sends transaction request messages from the client terminal to the entrusted-authorization module so as to be processed by the entrusted-authorization module according to the entrusted-authorization parameters;
- the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount.
- step 102 in which the switch module sends transaction request messages from the client terminal to the accounting system so as to be processed by the accounting system.
- step 103 in which the entrusted-authorization module verifies the validity of the messages; if valid, step 104 is performed; otherwise, step 105 is performed.
- step 104 in which the entrusted-authorization module verifies the validity of the mechanism; if the verification is approved, step 106 is performed; otherwise, step 107 is performed; the entrusted-authorization module verifies the transaction request messages according to financial mechanism information and transaction initiation mechanism information in the entrusted-authorization parameters; if the financial mechanism information and transaction initiation mechanism information in the entrusted-authorization parameters are consistent with those in the transaction request messages, the verification is approved; otherwise, the verification is not approved.
- step 105 in which the entrusted-authorization module returns the information indicating that messages are illegal to the switch module.
- step 106 in which the entrusted-authorization module verifies the validity of the transaction; if the verification is approved, step 108 is performed; otherwise, step 107 is performed; wherein the entrusted-authorization parameters further comprises permitted transaction types, a transaction type is determined according to the transaction request messages and the transaction type is verified according to the permitted transaction type; if the determined transaction type belongs to the permitted transaction type, the verification is approved; otherwise, the verification is not approved, wherein the permitted transaction type supports various transactions in the art, the specific transaction type is selected by the entrusted-authorization member mechanisms (i.e., the accounting systems), and different entrusted-authorization member mechanisms (i.e., the accounting systems) can select completely different transaction types; the permitted transaction types include consumption transaction, authorized transaction, payment transaction, cashing transaction and pre-authorization transaction, but without being limited thereto; with the development of the technology, other new types of transactions can be further included without departing from the scope of protection of the invention.
- the entrusted-authorization parameters further comprises permitted transaction types
- step 107 in which the entrusted-authorization module generates and sends a response message indicating failure and saves the cause of failure.
- step 108 in which the entrusted-authorization module determines the validity verification events of account and performs verification; if the verification is approved, step 109 is performed; otherwise, step 107 is performed;
- the validity verification events of account comprises at least one of verification of card number, verification of term of validity of the card, verification of check digit of the card, verification of password, verification of CVN, and verification of IC card information;
- the entrusted-authorization parameters further comprise account information which comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of card (CVN), information in IC card which corresponds to items in the validity verification events of account.
- step 109 in which the entrusted-authorization module determines the verification events of account risk according to account risk information and performs verification according to the determined verification events of the account risk; if the verification is approved, step 110 is performed; otherwise, step 107 is performed; wherein the entrusted-authorization parameters further comprises account risk information which further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to items in the verification events of the account risk; if the financial account information, transaction initiation mechanism information and transaction amount from the transaction request messages belong to the account risk information in the entrusted-authorization parameters, the verification is not approved; otherwise, the verification is approved.
- account risk information further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to items in the verification events of the account risk; if the financial account information, transaction initiation mechanism information and transaction amount from the transaction request messages belong to the account risk information in the entrusted-authorization parameters
- step 110 in which the entrusted-authorization module verifies the amount according to account amount in the entrusted-authorization parameters; if the verification is approved, step 111 is performed; otherwise, step 112 is performed; taking a single transaction as an example, if the account amount is larger than or equal to the transaction amount, then the verification is approved; otherwise, the verification is not approved; the present invention is not limited to the case of single transaction and those skilled in the art can devise a verification process for an amount that is added up in multiple transactions.
- step 111 in which the entrusted-authorization module encashes the transaction request, generates and sends a response message indicating success, and saves transaction information.
- step 112 in which the entrusted-authorization module performs transaction delivering; that is, when the switch module switches the transaction to the accounting system, the entrusted-authorization module delivers the transaction information and the cause of failure during entrusted-authorization to the accounting system.
- the transactions are delivered in a manner of batch files or on-line messages.
- step 113 in which the entrusted-authorization parameters are uploaded; that is, when the accounting system is available, the entrusted-authorization parameters from the accounting system are uploaded to the entrusted-authorization module.
- the main idea of the invention lies in that the entrusted-authorization member mechanisms designate the verification events and a control with maximum freedom is provided for the admitted member mechanisms. Therefore, the above described embodiments of the invention are merely exemplary rather than limiting the invention. For example, the sequence of steps 104 , 106 , 108 and 109 can be adjusted. Alternatively, some steps can be omitted; for example, steps 106 and 109 can be omitted. Those skilled in the art can make modifications to the invention.
- FIGS. 1 and 2 It can be known from the embodiments shown in FIGS. 1 and 2 that although only one accounting system is shown in the invention, the invention is not limited to having only one accounting system. Those skilled in the art can add several accounting systems according to the actual requirement.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides an entrusted-authorization system and an entrusted-authorization method. The entrusted-authorization system comprises an accounting system, a switch module and an entrusted-authorization module, wherein the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system, the switch module is connected with the accounting system and the entrusted-authorization module for transmitting transaction request messages from the client terminal to the entrusted-authorization module for processing in case that the accounting system is unavailable, wherein the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system for processing. The transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount. With the entrusted-authorization system and entrusted-authorization method of the invention, a normal processing of transaction request can be ensured when the accounting system is unavailable.
Description
- The present invention relates to the field of data processing, and in particular, to an entrusted-authorization system and an entrusted-authorization method.
- Entrusted-authorization business of on-line accounting system has just started domestically. A sharing platform for previously applied business card on-line entrusted-authorization, for example, does not exist. Various on-line accounting systems can only cope with some risks in a manner of multi-machine backup. However, if the on-line accounting system needs a whole system maintenance or it cannot provide a linking service to the outside due to some disastrous reason, the system completely goes down. Foreign big credit card organizations have mandatory requirements of entrusted-authorization for their admitted member mechanisms. Comparatively speaking, the admitted member mechanisms have less personalized customizations but stronger constraints due to their business modes and platforms.
- In this regard, the present invention provides an entrusted-authorization system and an entrusted-authorization method for ensuring normal processing of transaction requests in case that the accounting system is unavailable.
- The present invention provides the following technical solution:
- 1. An entrusted-authorization system, characterized in that, the entrusted-authorization system comprises an accounting system, a switch module and an entrusted-authorization module, wherein
the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system;
the switch module is connected with the accounting system and the entrusted-authorization module for transmitting transaction request messages from the client terminal to the entrusted-authorization module in case that the accounting system is unavailable, whereby the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system for processing, the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount.
2. The entrusted-authorization system according totechnical solution 1, characterized in that, the entrusted-authorization module comprises data communication module, verification processing module and database, wherein
the data communication module is connected between the switch module and the verification processing module so as to transfer information therebetween;
the database stores the entrusted-authorization parameters, the transaction information and cause of failure, the entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, the account information comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of the card (CVN), information in IC card which corresponds to the ones in validity verification items of account;
the verification processing module stores the validity verification items of account, where the validity verification items of account comprise at least one of verification of card number, verification of term of validity of the card, verification of check digit of card, verification of password, verification of CVN, and verification of IC card information;
the verification processing module is configured to perform the following steps:
A. verifying validity of the transaction request messages, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to the data communication module and sending the cause of failure to the database;
B. verifying the transaction request messages according to the financial mechanism information and the transaction initiation mechanism information in the entrusted-authorization parameters, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating the failure to the data communication module and sending the cause of the failure to the database;
C. determining the validity verification events of account according to the account information and performing verification according to the determined validity verification events of account, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating the failure to the data communication module and sending the cause of the failure to the database; and
D. verifying the transaction request according to account amount, and in case of approved verification, encashing the transaction request, generating and sending a response message indicating the success to the data communication module, and generating and sending transaction information to the database, or otherwise generating and sending a response message indicating the failure to the data communication module and sending the cause of failure to the database, the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amount, transaction type and transaction date.
3. The entrusted-authorization system according totechnical solution 2, characterized in that the verification processing module stores verification events of account risk, the verification events of account risk comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control, the entrusted-authorization parameters further comprises account risk information which further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to the items in the verification events of account risk; wherein the verification processing module determines the verification events of account risk according to the account risk information and performing verification according to the determined verification events of the account risk, and step D is performed if the verification is approved, or otherwise, the verification processing module generates and sends a response message indicating the failure to the data communication module and sending the cause of failure to the database.
4. The entrusted-authorization system according totechnical solution 2 or 3, characterized in that the entrusted-authorization parameters further comprises permitted transaction types and the verification processing module is further configured to: determine the transaction types according to the transaction request messages; and verify the transaction types according to the permitted transaction type.
5. The entrusted-authorization system according to one oftechnical solutions 2 to 4, characterized in that the entrusted-authorization module further comprises:
a parameter uploading module for uploading the entrusted-authorization parameters determined by the accounting system to the database when the accounting system is available; and
a transaction delivering module for delivering the transaction information and the cause of failure during the entrusted-authorization in the database to the accounting system when the switch module switches the transaction to the accounting system.
6. An entrusted-authorization method applied to entrusted-authorization system, characterized in that the entrusted-authorization system comprises an accounting system, an entrusted-authorization module and a switch module connected with the accounting system and the entrusted-authorization module, the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system, the entrusted-authorization method comprising:
the switch module transmits transaction request messages from the client terminal to the entrusted-authorization module in case that the accounting system is unavailable, whereby the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, sending the messages to the accounting system for processing, wherein the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount.
7. The entrusted-authorization method according to technical solution 6, characterized in that the entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, the account information comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of the card (CVN), information in IC card which corresponds to items in validity verification events of the account, wherein the entrusted-authorization module verifying the transaction request messages according to the entrusted-authorization parameters comprises the following steps:
A. the entrusted-authorization module verifies the validity of the transaction request messages, and performs subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module;
B. verifies the transaction request messages according to the financial mechanism information and the transaction initiation mechanism information in the entrusted-authorization parameters, and performs subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module;
C. determines the validity verification events of account according to account information and performs the verification according to the determined validity verification events of account, and performs subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module; wherein the validity verification events of account is stored in the entrusted-authorization module, and the validity verification events of account comprise at least one of verification of card number, verification of term of validity of the card, verification of check digit of the card, verification of password, verification of CVN, and verification of IC card information;
D. verifies the transaction request according to the account amount, and in case of verification being approved, encashing the transaction request, generates and sends a response message indicating the success to the switch module, and generates and saves the transaction information to the entrusted-authorization module, or otherwise generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module, the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amount, transaction types and transaction dates.
8. The entrusted-authorization method according to technical solution 7, characterized in that the entrusted-authorization module verifying the transaction request messages according to the entrusted-authorization parameters comprises the following steps:
E. the entrusted-authorization module determines verification events of account risk according to account risk information and performs the verification according to the determined verification events of the account risk, and performs step D if the verification is approved, or otherwise, generates and sends a response message indicating the failure to the switch module and saves the cause of failure in the entrusted-authorization module, wherein the verification events of the account risk is stored in the entrusted-authorization module, the verification events of the account risk comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control, the entrusted-authorization parameters further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to items in verification events of the account risk.
9. The entrusted-authorization method according to technical solution 7 or 8, characterized in that the entrusted-authorization parameters further comprises permitted transaction types, and verifying the transaction request messages according to the entrusted-authorization parameters comprises:
the entrusted-authorization module determining the transaction types according to the transaction request messages; and
the entrusted-authorization module verifying the transaction types according to the permitted transaction types.
10. The entrusted-authorization method according to one of technical solutions 6 to 9, characterized in that the method further comprises:
uploading the entrusted-authorization parameters determined by the accounting system to the database when the accounting system is available; and
the entrusted-authorization module delivering the transaction information and the cause of failure during entrusted-authorization to the accounting system when the switch module switches the transaction to the accounting system. - With the entrusted-authorization system and the entrusted-authorization method of the invention, a normal processing of transaction request can be ensured when the accounting system is unavailable.
- In addition, the entrusted-authorization system and the entrusted-authorization method of the invention can be flexibly applied, can effectively solve the problems such as the on-line accounting system not being able to provide service to the outside in case of disastrous shutdown, overall upgrading, etc. Moreover, admitted member mechanisms (i.e. the accounting systems) are given a maximum freedom of control, which is flexible, safe, controllable, and can greatly reduce the costs involved in a case where each on-line accounting system builds up a backup system so that the admitted member mechanisms can set entrusted-authorization parameters as actually required.
-
FIG. 1 is a schematic view showing the structure of the entrusted-authorization system of the invention; and -
FIG. 2 is a schematic view showing the flowchart of the entrusted-authorization method of the invention. - Preferred embodiments of the invention will be described below in detail with reference to the accompanying drawings in which like figure references denote like elements.
-
FIG. 1 is a schematic view showing the structure of the entrusted-authorization system of the invention. As shown inFIG. 1 , the entrusted-authorization system of the invention comprises anaccounting system 1, aswitch module 2 and an entrusted-authorization module 3. The entrusted-authorization module 3 comprises adata communication module 30, averification processing module 31 and adatabase 32. Preferably, the entrusted-authorization module 3 of the invention further comprises aparameter uploading module 33 and atransaction delivering module 34. - The entrusted-authorization module 3 stores the entrusted-authorization parameters determined by the
accounting system 1. Theswitch module 2 is connected with theaccounting system 1 for transmitting transaction request messages from theclient terminal 4 to the entrusted-authorization module 3 in case that theaccounting system 1 is unavailable, the entrusted-authorization module 3 verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to theaccounting system 1 for processing, wherein the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount. - The
parameter uploading module 33 is used for uploading the entrusted-authorization parameters from theaccounting system 1 to thedatabase 32 when the accounting system is available. Thetransaction delivering module 34 is used for delivering transaction information and cause of failure during entrusted-authorization in thedatabase 32 to theaccounting system 1 when theswitch module 2 switches transaction to theaccounting system 1. - The
data communication module 30 is connected between theswitch module 2 and theverification processing module 31 so as to transfer information therebetween. Thedatabase 32 stores the entrusted-authorization parameters, the transaction information and the cause of failure. The entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, in which the account information comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of the card (CVN), information in the IC card which corresponds to items in validity verification events of the account. - The
verification processing module 31 is configured to perform the following steps: - A. verifying the validity of the transaction request messages, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to the
data communication module 30 and sending the cause of failure to thedatabase 32. Since the verification of the validity of messages pertains to common knowledge in the art, it is not discussed in detail herein.
B. verifying the transaction request messages according to the financial mechanism information and the transaction initiation mechanism information in the entrusted-authorization parameters, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to thedata communication module 30 and sending the cause of failure to thedatabase 32;
C. determining the validity verification events of account according to the account information and performing verification according to the determined validity verification events of account, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to thedata communication module 30 and sending the cause of failure to thedatabase 32; wherein the validity verification events of account is stored in the verification processing module, and the validity verification events of account comprise at least one of the verification of card number, verification of term of validity of the card, verification of check digit of the card, verification of password, verification of CVN, and verification of IC card information.
D. verifying the transaction request according to account amount, and in case of the verification being approved, generating and sending a response message indicating success to thedata communication module 30, and generating and sending transaction information to thedatabase 32, or otherwise generating and sending a response message indicating the failure to thedata communication module 30 and sending the cause of failure to thedatabase 32, the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amount, transaction types and transaction dates. - In step B, if the entrusted-authorization parameters are consistent with financial mechanism information and transaction initiation mechanism information in the transaction request messages, then the verification is approved; otherwise, the verification is not approved.
- In step C, taking the validity verification events of account comprises verification of card number and verification of term of validity of the card as an example. If account information in the entrusted-authorization parameters comprises card number or term of validity of the card or both (taking the account information comprising both card number and term of validity of the card as an example), it is determined to verify the card number and the term of validity of the card. If the card numbers are consistent and the current date is within the term of validity of the card, the verification is approved; otherwise, the verification is not approved. Those skilled in the art can determine the entrusted-authorization parameters as actually required so as to determine the corresponding validity verification events of account, thus providing the
accounting system 1 with greater flexibility and selectivity. - Further, the entrusted-authorization parameters further comprise account risk information which further comprises information selected from a group comprising the following items: information in account blacklist, commercial tenant blacklist and limit control that corresponds to the items in verification events of account risk; wherein the verification events of account risk are stored in the
verification processing module 31 and comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control. Theverification processing module 31 can also determine the verification events of account risk according to the account risk information and perform verification according to the determined verification events of account risk. If the verification is approved, the step D is performed; otherwise, a response message indicating failure is generated and sent to thedata communication module 30 and the cause of failure is sent to thedatabase 32. - Taking the verification events of account risk which comprises the verification of account blacklist and the verification of limit control as an example. Account risk information then comprises account blacklist or limit or both. Taking the account risk information comprising only account blacklist as an example, it is determined to verify account blacklist. If the financial account information in the transaction request messages is in the account blacklist, then the verification is not approved; otherwise, the verification is approved.
- Further, the entrusted-authorization parameters further comprises permitted transaction types, the
verification processing module 31 is configured to determine the transaction types according to the transaction request messages and verify the transaction types according to the permitted transaction types. If a determined transaction type belongs to a permitted transaction type, then the verification is approved; otherwise, the verification is not approved. The permitted transaction type supports various transactions in the art. The specific transaction type is selected by the entrusted-authorization member mechanisms (i.e., the accounting systems), and different entrusted-authorization member mechanisms (i.e., the accounting systems) can select completely different transaction types. The permitted transaction type includes consumption transaction, authorized transaction, payment transaction, cashing transaction and pre-authorization transaction, without being limited thereto. With development of the technology, other new types of transactions can be further included without departing from the scope of protection of the invention. -
FIG. 2 is a schematic view showing the flowchart of the entrusted-authorization method of the invention which is applied to entrusted-authorization system. The entrusted-authorization system comprises an accounting system, an entrusted-authorization module, and a switch module connected to the accounting system and the entrusted-authorization module. The entrusted-authorization module stores the entrusted-authorization parameters determined by the accounting system. As shown inFIG. 2 , the entrusted-authorization method of the invention comprises the following steps: -
step 100, in which it is determined whether the accounting system is available; if not, step 101 is performed; otherwise,step 102 is performed. - step 101, in which the switch module sends transaction request messages from the client terminal to the entrusted-authorization module so as to be processed by the entrusted-authorization module according to the entrusted-authorization parameters; the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount.
-
step 102, in which the switch module sends transaction request messages from the client terminal to the accounting system so as to be processed by the accounting system. -
step 103, in which the entrusted-authorization module verifies the validity of the messages; if valid,step 104 is performed; otherwise,step 105 is performed. -
step 104, in which the entrusted-authorization module verifies the validity of the mechanism; if the verification is approved,step 106 is performed; otherwise,step 107 is performed; the entrusted-authorization module verifies the transaction request messages according to financial mechanism information and transaction initiation mechanism information in the entrusted-authorization parameters; if the financial mechanism information and transaction initiation mechanism information in the entrusted-authorization parameters are consistent with those in the transaction request messages, the verification is approved; otherwise, the verification is not approved. -
step 105, in which the entrusted-authorization module returns the information indicating that messages are illegal to the switch module. -
step 106, in which the entrusted-authorization module verifies the validity of the transaction; if the verification is approved,step 108 is performed; otherwise,step 107 is performed; wherein the entrusted-authorization parameters further comprises permitted transaction types, a transaction type is determined according to the transaction request messages and the transaction type is verified according to the permitted transaction type; if the determined transaction type belongs to the permitted transaction type, the verification is approved; otherwise, the verification is not approved, wherein the permitted transaction type supports various transactions in the art, the specific transaction type is selected by the entrusted-authorization member mechanisms (i.e., the accounting systems), and different entrusted-authorization member mechanisms (i.e., the accounting systems) can select completely different transaction types; the permitted transaction types include consumption transaction, authorized transaction, payment transaction, cashing transaction and pre-authorization transaction, but without being limited thereto; with the development of the technology, other new types of transactions can be further included without departing from the scope of protection of the invention. -
step 107, in which the entrusted-authorization module generates and sends a response message indicating failure and saves the cause of failure. -
step 108, in which the entrusted-authorization module determines the validity verification events of account and performs verification; if the verification is approved,step 109 is performed; otherwise,step 107 is performed; the validity verification events of account comprises at least one of verification of card number, verification of term of validity of the card, verification of check digit of the card, verification of password, verification of CVN, and verification of IC card information; and the entrusted-authorization parameters further comprise account information which comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of card (CVN), information in IC card which corresponds to items in the validity verification events of account. -
step 109, in which the entrusted-authorization module determines the verification events of account risk according to account risk information and performs verification according to the determined verification events of the account risk; if the verification is approved,step 110 is performed; otherwise,step 107 is performed; wherein the entrusted-authorization parameters further comprises account risk information which further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to items in the verification events of the account risk; if the financial account information, transaction initiation mechanism information and transaction amount from the transaction request messages belong to the account risk information in the entrusted-authorization parameters, the verification is not approved; otherwise, the verification is approved. -
step 110, in which the entrusted-authorization module verifies the amount according to account amount in the entrusted-authorization parameters; if the verification is approved,step 111 is performed; otherwise,step 112 is performed; taking a single transaction as an example, if the account amount is larger than or equal to the transaction amount, then the verification is approved; otherwise, the verification is not approved; the present invention is not limited to the case of single transaction and those skilled in the art can devise a verification process for an amount that is added up in multiple transactions. -
step 111, in which the entrusted-authorization module encashes the transaction request, generates and sends a response message indicating success, and saves transaction information. -
step 112, in which the entrusted-authorization module performs transaction delivering; that is, when the switch module switches the transaction to the accounting system, the entrusted-authorization module delivers the transaction information and the cause of failure during entrusted-authorization to the accounting system. Optionally, the transactions are delivered in a manner of batch files or on-line messages. -
step 113, in which the entrusted-authorization parameters are uploaded; that is, when the accounting system is available, the entrusted-authorization parameters from the accounting system are uploaded to the entrusted-authorization module. - The main idea of the invention lies in that the entrusted-authorization member mechanisms designate the verification events and a control with maximum freedom is provided for the admitted member mechanisms. Therefore, the above described embodiments of the invention are merely exemplary rather than limiting the invention. For example, the sequence of
steps - It can be known from the embodiments shown in
FIGS. 1 and 2 that although only one accounting system is shown in the invention, the invention is not limited to having only one accounting system. Those skilled in the art can add several accounting systems according to the actual requirement. - It can be known from the embodiments shown in
FIGS. 1 and 2 that although some items in the validity verification events of account and verification events of account risk are described in the invention, the invention is not limited thereto. Those skilled in the art can devise other verification items without departing from the scope of protection of the invention. - In light of the above teaching, those skilled in the art can readily envisage other embodiments, combinations and modifications of the invention. Therefore, when considered with reference to the above description and the accompanying drawings, the invention is defined merely by the technical solutions.
Claims (10)
1. An entrusted-authorization system, characterized in that, the entrusted-authorization system comprises an accounting system, a switch module and an entrusted-authorization module, wherein
the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system;
the switch module is connected with the accounting system and the entrusted-authorization module for transmitting transaction request messages from client terminals to the entrusted-authorization module in case that the accounting system is unavailable, the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, the messages are sent to the accounting system for processing, the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amount.
2. The entrusted-authorization system according to claim 1 , characterized in that, the entrusted-authorization module comprises data communication module, verification processing module and database, wherein
the data communication module is connected between the switch module and the verification processing module so as to transfer information therebetween;
the database stores the entrusted-authorization parameters, the transaction information and cause of failure, the entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, the account information comprises the information selected from a group comprising the following items: card numbers, terms of validity of the cards, check digits of the card, password encryption data, verification number of the card (CVN), information in IC card which corresponds to items in validity verification events of account;
the verification processing module stores the validity verification events of account, where the validity verification events of account comprise at least one of verification of card numbers, verification of terms of validity of the cards, verification of check digits of the cards, verification of passwords, verification of CVN, and verification of IC card information;
the verification processing module is configured to perform the following steps:
A. verifying the validity of the transaction request messages, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to the data communication module and sending the cause of failure to the database;
B. verifying the transaction request messages according to the financial mechanism information and the transaction initiation mechanism information in the entrusted-authorization parameters, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to the data communication module and sending the cause of failure to the database;
C. determining the validity verification events of account according to account information and performing the verification according to the determined validity verification events of account, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to the data communication module and sending the cause of failure to the database; and
D. verifying transaction request according to account amount, and in case of the verification being approved, encashing the transaction request, generating and sending a response message indicating success to the data communication module, and generating and sending transaction information to the database, or otherwise generating and sending a response message indicating failure to the data communication module and sending the cause of failure to the database, the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amounts, transaction types and transaction dates.
3. The entrusted-authorization system according to claim 2 , characterized in that, the verification processing module stores verification events of account risk, the verification events of account risk comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control, the entrusted-authorization parameters further comprise account risk information which further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to items in the verification events of account risk; wherein the verification processing module determines the verification events of account risk according to account risk information and performing the verification according to the determined verification events of account risk, and step D is performed if the verification is approved, or otherwise, the verification processing module generates and sends a response message indicating failure to the data communication module and sending the cause of failure to the database.
4. The entrusted-authorization system according to claim 2 , characterized in that, the entrusted-authorization parameters further comprises permitted transaction types and the verification processing module is further configured to:
determine transaction types according to the transaction request messages; and
verify the transaction types according to the permitted transaction types.
5. The entrusted-authorization system according to one of claims 2 to 4 , characterized in that, the entrusted-authorization module further comprises:
a parameter uploading module for uploading the entrusted-authorization parameters determined by the accounting system to the database when the accounting system is available; and
a transaction delivering module for delivering transaction information and cause of failure during entrusted-authorization in the database to the accounting system when the switch module switches transaction to the accounting system.
6. An entrusted-authorization method applied to entrusted-authorization system, characterized in that, the entrusted-authorization system comprises an accounting system, an entrusted-authorization module and a switch module connected with the accounting system and the entrusted-authorization module, the entrusted-authorization module stores entrusted-authorization parameters determined by the accounting system, the entrusted-authorization method comprising:
the switch module transmits transaction request messages from the client terminal to the entrusted-authorization module in case that the accounting system is unavailable, the entrusted-authorization module verifies the transaction request messages according to the entrusted-authorization parameters; otherwise, sends the messages to the accounting system for processing, wherein the transaction request messages comprise financial account information, financial mechanism information, transaction initiation mechanism information and transaction amounts.
7. The entrusted-authorization method according to claim 6 , characterized in that, the entrusted-authorization parameters comprise financial mechanism information, transaction initiation mechanism information, account amount and account information, the account information comprises information selected from a group comprising the following items: card number, term of validity of the card, check digit of the card, password encryption data, verification number of the card (CVN), information in IC card which corresponds to items in the validity verification events of account, wherein the entrusted-authorization module verifying the transaction request messages according to the entrusted-authorization parameters comprises the following steps:
A. the entrusted-authorization module verifies the validity of the transaction request messages, and performing subsequent steps if the verification is approved, or otherwise generates and sends a response message indicating failure to the switch module and saves the cause of failure in the entrusted-authorization module;
B. verifying the transaction request messages according to the financial mechanism information and the transaction initiation mechanism information in the entrusted-authorization parameters, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to the switch module and saving the cause of failure in the entrusted-authorization module;
C. determining the validity verification events of account according to account information and performing verification according to the determined validity verification events of account, and performing subsequent steps if the verification is approved, or otherwise generating and sending a response message indicating failure to the switch module and saving the cause of failure in the entrusted-authorization module; wherein the validity verification events of account is stored in the entrusted-authorization module, and the validity verification events of account comprise at least one of verification of card number, verification of term of validity of the card, verification of check digits of the card, verification of password, verification of CVN, and verification of IC card information;
D. verifying transaction request according to account amount, and in case of approved verification, encashing the transaction request, generating and sending a response message indicating success to the switch module, and generating and saving transaction information to the entrusted-authorization module, or otherwise generating and sending a response message indicating failure to the switch module and saving the cause of failure in the entrusted-authorization module, the transaction information comprises financial account information, financial mechanism information, transaction initiation mechanism information, transaction amount, transaction types and transaction dates.
8. The entrusted-authorization method according to claim 7 , characterized in that, the entrusted-authorization module verifying the transaction request messages according to the entrusted-authorization parameters comprises the following steps:
E. the entrusted-authorization module determines verification events of account risk according to account risk information and performs verification according to the determined verification events of account risk, and performs step D if the verification is approved, or otherwise, generates and sends a response message indicating failure to the switch module and saves the cause of failure in the entrusted-authorization module, wherein the verification events of account risk is stored in the entrusted-authorization module, the verification events of account risk comprises at least one of verification of account blacklist, verification of commercial tenant blacklist and verification of limit control, the entrusted-authorization parameters further comprises information selected from a group comprising the following items: information in the account blacklist, commercial tenant blacklist and limit control that corresponds to items in verification events of account risk.
9. The entrusted-authorization method according to claim 7 , characterized in that, the entrusted-authorization parameters further comprise permitted transaction types and verifying the transaction request messages according to the entrusted-authorization parameters comprises:
the entrusted-authorization module determines transaction types according to the transaction request messages; and
the entrusted-authorization module verifies the transaction types according to the permitted transaction types.
10. The entrusted-authorization method according to one of claims 6 to 9 , characterized in that, the method further comprises:
uploading the entrusted-authorization parameters determined by the accounting system to the entrusted-authorization module when the accounting system is available; and
the entrusted-authorization module delivers transaction information and cause of failure during entrusted-authorization to the accounting system when the switch module switches the transaction to the accounting system.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110435131.9 | 2011-12-22 | ||
CN201110435131.9A CN103177388B (en) | 2011-12-22 | 2011-12-22 | For authoring system and for authorization method |
PCT/CN2012/087026 WO2013091555A1 (en) | 2011-12-22 | 2012-12-20 | Stand-in authorization system and stand-in authorization method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/087026 A-371-Of-International WO2013091555A1 (en) | 2011-12-22 | 2012-12-20 | Stand-in authorization system and stand-in authorization method |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/450,896 Continuation US20190349374A1 (en) | 2011-12-22 | 2019-06-24 | Stand-in authorization system and stand-in authorization method |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140344898A1 true US20140344898A1 (en) | 2014-11-20 |
Family
ID=48637221
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/366,670 Abandoned US20140344898A1 (en) | 2011-12-22 | 2012-12-20 | Stand-in authorization system and stand-in authorization method |
US16/450,896 Pending US20190349374A1 (en) | 2011-12-22 | 2019-06-24 | Stand-in authorization system and stand-in authorization method |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/450,896 Pending US20190349374A1 (en) | 2011-12-22 | 2019-06-24 | Stand-in authorization system and stand-in authorization method |
Country Status (4)
Country | Link |
---|---|
US (2) | US20140344898A1 (en) |
EP (1) | EP2797047A4 (en) |
CN (1) | CN103177388B (en) |
WO (1) | WO2013091555A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160142421A1 (en) * | 2013-07-01 | 2016-05-19 | Nec Corporation | Validity control system, terminal device, and method |
US20160210625A1 (en) * | 2013-09-13 | 2016-07-21 | Nec Corporation | Terminal device, server device, method, and program recording medium for validity control |
US20210248325A1 (en) * | 2018-08-31 | 2021-08-12 | Mindridge Analytics Inc. | Method and apparatus for shaping data in a general ledger |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103177388B (en) * | 2011-12-22 | 2016-12-07 | 中国银联股份有限公司 | For authoring system and for authorization method |
SG11201602154YA (en) | 2013-09-23 | 2016-04-28 | Xero Ltd | Systems for access control and system integration |
CN105389724A (en) * | 2015-10-28 | 2016-03-09 | 北京京东尚科信息技术有限公司 | Method and device for entrusting account |
CN107423984B (en) * | 2017-07-31 | 2020-12-18 | 中国银行股份有限公司 | Transaction amount overrun authorization method and system |
US20210135857A1 (en) * | 2019-11-05 | 2021-05-06 | Verizon Patent And Licensing Inc. | System and methods for distributed runtime logging and transaction control for multi-access edge computing services |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5384449A (en) * | 1992-04-28 | 1995-01-24 | Visa International Service Association | Authorization matching system |
US6119093A (en) * | 1997-07-01 | 2000-09-12 | Walker Asset Management Limited Partnership | System for syndication of insurance |
US6427912B1 (en) * | 2000-08-16 | 2002-08-06 | Coin Acceptors, Inc. | Off-line credit card transaction system and method for vending machines |
US20020120559A1 (en) * | 2001-02-26 | 2002-08-29 | O'mara Timothy L. | Tiered processing method and system for identifying and mitigating merchant risk |
US20020139837A1 (en) * | 2001-03-12 | 2002-10-03 | Spitz Clayton P. | Purchasing card transaction risk model |
US20030105688A1 (en) * | 2001-12-05 | 2003-06-05 | Brown Owen H. | Secure digital escrow account transactions system and method |
US20030195843A1 (en) * | 1999-02-19 | 2003-10-16 | Visa International Service Association | Conducting commerce between individuals with integrated shipping |
US20030209599A1 (en) * | 1995-04-13 | 2003-11-13 | Gatto James G. | Electronic fund transfer or transaction system |
US20050149455A1 (en) * | 2003-07-01 | 2005-07-07 | Visa U.S.A. Inc. | Method and system for providing advanced authorization |
US6999943B1 (en) * | 2000-03-10 | 2006-02-14 | Doublecredit.Com, Inc. | Routing methods and systems for increasing payment transaction volume and profitability |
US20060116957A1 (en) * | 2000-03-17 | 2006-06-01 | Jason May | Method and apparatus for facilitating online payment transactions in a network-based transaction facility |
US20080103972A1 (en) * | 2006-10-25 | 2008-05-01 | Payfont Limited | Secure authentication and payment system |
US20100025460A1 (en) * | 2008-07-31 | 2010-02-04 | Sybase, Inc. | Mobile Banking Architecture |
US20130138563A1 (en) * | 2011-05-26 | 2013-05-30 | Global Standard Financial, Inc. | Systems and methods for prepaid merchant payment services |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003049364A1 (en) * | 2001-12-04 | 2003-06-12 | Conceptm Company Limited | System and method for facilitating electronic financial transactions using a mobile telecommunication device |
US7427017B2 (en) * | 2005-06-22 | 2008-09-23 | Remettra, Inc. | Method and system for collecting bank account information from an individual and authenticating the individual prior to allowing the bank account to receive an electronic fund transfer |
US8768837B2 (en) * | 2007-05-03 | 2014-07-01 | Mastercard International Incorporated | Method and system for controlling risk in a payment transaction |
US8738451B2 (en) * | 2008-04-04 | 2014-05-27 | Metabank | System, program product, and method for debit card and checking account autodraw |
CN101950452B (en) * | 2008-07-31 | 2012-08-29 | 中国工商银行股份有限公司 | Bank card core system and bank card stand-in authorization system data synchronous processing method |
CN101329795B (en) * | 2008-07-31 | 2011-06-15 | 中国工商银行股份有限公司 | System and method for implementing bank card agent authorization |
MA33353B1 (en) * | 2009-05-12 | 2012-06-01 | Henryk Kulakowski | Procedures for obtaining a license for a transaction using a mobile phone |
US8893967B2 (en) * | 2009-05-15 | 2014-11-25 | Visa International Service Association | Secure Communication of payment information to merchants using a verification token |
US9734495B2 (en) * | 2009-06-02 | 2017-08-15 | Qualcomm Incorporated | Mobile commerce authentication and authorization systems |
CN102096968A (en) * | 2009-12-09 | 2011-06-15 | 中国银联股份有限公司 | Method for verifying accuracy of PIN (Personal Identification Number) in agent authorization service |
CN103177388B (en) * | 2011-12-22 | 2016-12-07 | 中国银联股份有限公司 | For authoring system and for authorization method |
-
2011
- 2011-12-22 CN CN201110435131.9A patent/CN103177388B/en active Active
-
2012
- 2012-12-20 WO PCT/CN2012/087026 patent/WO2013091555A1/en active Application Filing
- 2012-12-20 EP EP12858751.6A patent/EP2797047A4/en not_active Ceased
- 2012-12-20 US US14/366,670 patent/US20140344898A1/en not_active Abandoned
-
2019
- 2019-06-24 US US16/450,896 patent/US20190349374A1/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5384449A (en) * | 1992-04-28 | 1995-01-24 | Visa International Service Association | Authorization matching system |
US20030209599A1 (en) * | 1995-04-13 | 2003-11-13 | Gatto James G. | Electronic fund transfer or transaction system |
US6119093A (en) * | 1997-07-01 | 2000-09-12 | Walker Asset Management Limited Partnership | System for syndication of insurance |
US20030195843A1 (en) * | 1999-02-19 | 2003-10-16 | Visa International Service Association | Conducting commerce between individuals with integrated shipping |
US6999943B1 (en) * | 2000-03-10 | 2006-02-14 | Doublecredit.Com, Inc. | Routing methods and systems for increasing payment transaction volume and profitability |
US20060116957A1 (en) * | 2000-03-17 | 2006-06-01 | Jason May | Method and apparatus for facilitating online payment transactions in a network-based transaction facility |
US6427912B1 (en) * | 2000-08-16 | 2002-08-06 | Coin Acceptors, Inc. | Off-line credit card transaction system and method for vending machines |
US20020120559A1 (en) * | 2001-02-26 | 2002-08-29 | O'mara Timothy L. | Tiered processing method and system for identifying and mitigating merchant risk |
US20020139837A1 (en) * | 2001-03-12 | 2002-10-03 | Spitz Clayton P. | Purchasing card transaction risk model |
US20030105688A1 (en) * | 2001-12-05 | 2003-06-05 | Brown Owen H. | Secure digital escrow account transactions system and method |
US20050149455A1 (en) * | 2003-07-01 | 2005-07-07 | Visa U.S.A. Inc. | Method and system for providing advanced authorization |
US20080103972A1 (en) * | 2006-10-25 | 2008-05-01 | Payfont Limited | Secure authentication and payment system |
US20100025460A1 (en) * | 2008-07-31 | 2010-02-04 | Sybase, Inc. | Mobile Banking Architecture |
US20130138563A1 (en) * | 2011-05-26 | 2013-05-30 | Global Standard Financial, Inc. | Systems and methods for prepaid merchant payment services |
Non-Patent Citations (1)
Title |
---|
May US 2006/0116847 A1 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160142421A1 (en) * | 2013-07-01 | 2016-05-19 | Nec Corporation | Validity control system, terminal device, and method |
US10050979B2 (en) * | 2013-07-01 | 2018-08-14 | Nec Corporation | Executing a process based on validity information indicating one of validity and invalidity |
US20160210625A1 (en) * | 2013-09-13 | 2016-07-21 | Nec Corporation | Terminal device, server device, method, and program recording medium for validity control |
US20210248325A1 (en) * | 2018-08-31 | 2021-08-12 | Mindridge Analytics Inc. | Method and apparatus for shaping data in a general ledger |
Also Published As
Publication number | Publication date |
---|---|
CN103177388A (en) | 2013-06-26 |
WO2013091555A1 (en) | 2013-06-27 |
US20190349374A1 (en) | 2019-11-14 |
CN103177388B (en) | 2016-12-07 |
EP2797047A4 (en) | 2015-06-03 |
EP2797047A1 (en) | 2014-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20140344898A1 (en) | Stand-in authorization system and stand-in authorization method | |
US11640467B2 (en) | System and methods for secure firmware validation | |
US10089471B2 (en) | System and methods for secure firmware validation | |
US9858574B2 (en) | Verification methods for fraud prevention in money transfer receive transactions | |
US9471811B2 (en) | Learning a new peripheral using a security provisioning manifest | |
US20190043028A1 (en) | Methods and systems for processing electronic disbursements | |
US20140344157A1 (en) | Method and device for carrying out cashless payment | |
CN103562973B (en) | Electronic system for quickly and securely processing transactions using mobile devices | |
US20140046830A1 (en) | Mobile Application For Monitoring and Managing Transactions Associated with Accounts Maintained at Financial Institutions | |
CN105678546B (en) | Digital asset processing method based on distributed shared general ledger | |
CN103714459A (en) | Secure payment system and method of intelligent terminal | |
CN105518732A (en) | Authorizing transactions using mobile device based rules | |
CN101706933A (en) | Method and background system for realizing joint account service operation | |
US10402820B2 (en) | System and method for providing emergency prepaid card | |
US9344281B2 (en) | Detecting fraud using operational parameters for a peripheral | |
US20180144329A1 (en) | Secure real-time transactions | |
CN106056380A (en) | Mobile payment risk control system and mobile payment risk control method | |
US20140156530A1 (en) | Method and Device for Carrying Out Cashless Payments | |
JP2003233874A (en) | Settling system | |
US10970695B2 (en) | Secure real-time transactions | |
CN114978735A (en) | POS equipment login authentication method, equipment, storage medium and electronic device | |
CN110992017B (en) | Remote security wind control management method, system and storage medium for off-line prepaid card | |
CN111222970B (en) | Method and system for realizing bill verification based on certificate interaction mode | |
CN114004607A (en) | Resource transfer method, device, computer equipment and storage medium | |
KR20100119682A (en) | Client terminal recovery method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |