WO2019080423A1 - 资源数值转移方法、装置、存储介质和服务器 - Google Patents
资源数值转移方法、装置、存储介质和服务器Info
- Publication number
- WO2019080423A1 WO2019080423A1 PCT/CN2018/077315 CN2018077315W WO2019080423A1 WO 2019080423 A1 WO2019080423 A1 WO 2019080423A1 CN 2018077315 W CN2018077315 W CN 2018077315W WO 2019080423 A1 WO2019080423 A1 WO 2019080423A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- account
- transfer
- identifier
- threshold
- maximum
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
Definitions
- the present application relates to the field of information processing technologies, and in particular, to a resource value transfer method, apparatus, storage medium, and server.
- the resource value transfer refers to a process in which a resource is transferred from a first account to a second account, and the value of the resource for identifying the number of resources changes accordingly. In real life, it is represented by transfer, payment or transaction.
- Value-shifted resources include, but are not limited to, electronic wallets, virtual red envelopes, electronic coupons, point coupons, points, electronic vouchers, game coins, virtual items, and the like.
- the duplicate SIM card can also receive the corresponding verification code. Therefore, the traditional method of verifying only the short message verification code may be that the security of the resource value is not high after the SIM card is copied and used by others.
- the embodiment of the present application provides a resource value transfer method, device, storage medium, and server, which can improve the security of resource value transfer.
- a method for transferring a resource value comprising: receiving a resource value transfer request sent by a computer device where the first account is located; acquiring a first account identifier and a second account of the first account in the resource value transfer request a second account identifier, a first device identifier of the computer device, and a transfer value; obtaining a maximum transfer threshold for performing resource value transfer for the first account initiated by the computer device identified by the first device identifier And when the transfer value does not exceed the maximum transfer threshold, transferring the transfer value from the first account identified by the first account identifier to the second account identified by the second account identifier .
- a resource value transfer device includes: a transfer request receiving module, configured to receive a resource value transfer request sent by a computer device where the first account is located; and a transfer information obtaining module, configured to acquire the resource value transfer request a first account identifier of the first account, a second account identifier of the second account, a first device identifier of the computer device, and a transfer value; and the computer device identified by the first device identifier is obtained, a maximum transfer threshold of the first account for resource value transfer; and a transfer execution module, configured to: when the transfer value does not exceed the maximum transfer threshold, identify the transfer value by the first account identifier The first account is transferred to the second account identified by the second account identifier.
- a server comprising a memory and a processor, the memory storing computer readable instructions, wherein the computer readable instructions are executed by the processor, such that the processor of any one of the resource value transfer methods of the present application step.
- One or more non-transitory computer readable storage media storing computer readable instructions, when executed by one or more processors, causing one or more processors to perform any of the present application The steps of a resource value transfer method.
- 1 is an application environment diagram of a resource value transfer method in an embodiment
- FIG. 2 is a schematic flow chart of a resource value transfer method in an embodiment
- FIG. 3 is a schematic flowchart of a process of trust device management in an embodiment
- FIG. 4 is a schematic flow chart of a resource value transfer method in another embodiment
- Figure 5 is a diagram showing the relationship between the number of successful transitions and the maximum transition threshold in one embodiment
- FIG. 6 is a structural block diagram of a resource value transfer apparatus in an embodiment
- FIG. 7 is a structural block diagram of a resource value transfer apparatus in another embodiment
- FIG. 8 is a structural block diagram of a resource value transfer apparatus in still another embodiment
- FIG. 9 is a structural block diagram of a resource value transfer apparatus in still another embodiment.
- Figure 10 is a diagram showing the internal structure of a server in one embodiment.
- first may be referred to as a second account without departing from the scope of the present application, and similarly, the second account may be referred to as a first account. Both the first account and the second account are accounts.
- the resource value transfer method provided by the embodiment of the present application can be applied to the application environment as shown in FIG. 1 .
- the application environment includes a computer device 110 and a server 120, which can communicate over a network.
- the computer device 110 is a device that initiates a resource value transfer request, including but not limited to a mobile phone, a tablet, a portable notebook, or a smart wearable device.
- the server is a device that can perform resource data transfer between the account and the account, such as a server with a resource value transfer authority such as WeChat, Alipay or Bank.
- the computer device 110 may send a resource value transfer request to the server 120, the resource value transfer request including an account identifier (ie, a first account identifier) of the first account initiating the request, an account identifier of the second account (ie, a second account identifier), The device identification of the computer device (ie the first device identification) and the transfer value.
- the server 120 may perform a check based on the resource value transfer request to determine whether to transfer the transfer value from the first account to the second account.
- a resource value transfer method is provided. This embodiment is exemplified by applying the method to the server shown in FIG. 1 as an example. Referring to Figure 2, the method includes:
- Step S202 Receive a resource value transfer request sent by a computer device where the first account is located.
- the resource value transfer represents a process of transferring a certain amount of resource values from the first account to the second account, such as a process of transferring a certain amount of funds from the first account to the second account, which is usually represented as a transfer in daily life.
- the first account is a transfer account of resource values
- the computer device is a device that initiates a resource value transfer request.
- the computer device can perform resource value transfer, and after the password or verification code is verified, the resource value transfer request is initiated. It is also possible to initiate a resource value transfer request before the password or verification code verification.
- the resource value transfer request includes the device identifier of the computer device, the account identifier of the first account, the account identifier of the second account receiving the transfer value, and the transfer value.
- the device identifier and the account identifier are used to uniquely identify the corresponding computer device and account, and may be composed of one or more of a number, a letter, or other special characters of the corresponding digits.
- the device identifier may be a device identifier.
- the device identifier may be an IMSI (International Mobile Subscriber Identification Number) of the mobile phone.
- the account identifier can be the only account corresponding to the account.
- the transfer value can be any value, such as 1,000 yuan.
- the computer device can receive the transfer value input by the user and transfer the account and other information, and trigger the resource value transfer instruction after detecting the operation of submitting the resource value transfer.
- the server may receive the resource value transfer request sent by the computer device through a preset interface.
- Step S204 Acquire a first account identifier of the first account, a second account identifier of the second account, a first device identifier of the computer device, and a transfer value in the resource value transfer request.
- the server may extract, from the received resource value transfer request, the first account identifier, the second account identifier, the device identifier, and the transfer value, and identify that the account identified by the first account identifier is an account that initiates resource value transfer (returning out Account), the account identified by the second account identifier is the account (transfer account) that receives the transfer value.
- the server may determine that the first account identifier is the transfer account and the second account identifier is the transfer account according to the location of the field in which the two accounts identify the request. For example, it may be determined that the account identified by the account identifier is the transfer account, and the subsequent account is the second account identifier.
- Step S206 Acquire a maximum transfer threshold value for performing resource value transfer for the first account initiated by the computer device identified by the first device identifier.
- the maximum transfer threshold represents the maximum value that can be transferred out of the first account initiated by the computer device.
- the server pre-stores the same transfer account, and the maximum transfer threshold corresponding to the resource value transfer request initiated by each different device.
- the server may query the corresponding maximum transfer threshold according to the first account identifier and the device identifier.
- the server may query the number of successful transfer operations initiated by the corresponding computer device for resource transfer of the first account, and calculate a corresponding maximum transfer threshold according to the number of successful transfer times.
- the maximum transition threshold is positively correlated with the number of successful transitions. The greater the number of successful transitions, the larger the corresponding maximum transition threshold.
- Step S208 When the transfer value does not exceed the maximum transfer threshold, transfer the transfer value from the first account identified by the first account identifier to the second account identified by the second account identifier.
- the server may compare the transfer value with the size of the maximum transfer threshold, and determine whether to perform resource value transfer based on the comparison result.
- the server may invoke a preset comparator to compare the transfer value with a maximum transfer threshold to obtain a comparison result.
- the comparison result is that the transfer value does not exceed the maximum transfer threshold, it is determined that the resource value transfer is allowed, and the transfer value is transferred from the first account identified by the first account identifier to the second account identified by the second account identifier.
- the comparison result is that the transfer value is greater than the maximum transfer threshold, it is determined that the transfer is not allowed.
- a prompt message that cannot perform a value transfer of the resource can be generated and sent to the computer device. For example, you can send "Sorry, your transfer operation failed.”
- the prompt information may also include a reason why the transfer cannot be made, for example, “From the comparison, your transfer amount is too large, and you need to further verify your identity”.
- the transfer password verification is performed, and after the verification is performed, the first account identified by the first account identifier is transferred to the second account identified by the second account identifier.
- the resource value transfer method described above sets a corresponding maximum transfer threshold for the resource value transfer request initiated by the first account by setting different computer devices, and is transferred when the transfer value required in the request does not exceed the maximum transfer threshold.
- the first account identified by the first account identifier is transferred to the second account identified by the second account identifier.
- the password or verification code set by the user for the first account can be prevented from being retrieved by others, and the operation of transferring a larger value by another person through the computer device can be performed, thereby improving the security of resource value transfer or reducing the resource value of the user. Loss.
- the method further includes: updating a number of successful transfers initiated by the computer device identified by the first device identifier, performing resource value transfer for the first account; and updating a maximum transfer threshold according to the number of successful transitions, The updated maximum transfer threshold is used as the maximum transfer threshold of the first account through the computer device for the next time the resource value is transferred to the second account.
- the server can call the preset accumulator or computer to update the number of successful transfer times of the original statistics and increase the number of successful transfer times by one. For example, before the step S208, the number of successful transfer attempts is 8, and the number of successful transfer after the update is 9.
- the server may count, for each outgoing account, the outgoing account, a resource value transfer request initiated by a different computer device, and transfer the resource value to the number of successful transfer attempts of each transferred account. And according to each transfer operation, update the corresponding number of successful transfer.
- the server may pre-establish the correspondence between the number of successful transfer times (or the number of transfer times) and the maximum preset threshold. For different successful transfer times, the corresponding maximum transfer threshold may not be the same. According to the correspondence, the corresponding threshold value can be queried, and the queried threshold value is used as the updated maximum transition threshold.
- the calculation model of the maximum transfer threshold is preset in the server, and the updated success number is used as the input of the calculation model, and the obtained output value can be used as the updated maximum transfer threshold.
- updating the maximum transfer threshold according to the number of successful transitions includes: acquiring a preset first upper threshold and a second upper threshold; updating according to the first upper threshold, the second upper threshold, and the updated successful number of transitions
- the maximum transition threshold is between the first upper threshold and the second upper threshold.
- the first upper limit threshold and the second upper limit threshold respectively represent a minimum upper limit threshold and a maximum upper limit threshold of the set transfer value, that is, the change range of the maximum transfer threshold may be within a threshold interval in which the first upper limit threshold and the second upper limit threshold are located .
- the server further establishes a relationship between the maximum transfer threshold and the first upper threshold, the second upper threshold, and the number of successful transitions.
- the first upper threshold and the second upper threshold may be fixed values preset by the server, and may also be user-defined values. When it is a fixed threshold, it can correspond to multiple account identifiers, which is an upper threshold applicable to multiple accounts. When it is a custom value, it can be the upper threshold applicable to the first account.
- the server may receive the calculation model modification request submitted by the corresponding device, and after verifying that the device has the modification authority, the first upper threshold and the second upper threshold that are set in the modification request may be set to correspond to the first account identifier.
- the maximum transition threshold is closer to the second upper threshold as the number of successful transitions increases.
- the server may obtain a first upper threshold and a second upper threshold corresponding to the first account identifier, and use the first upper threshold, the second upper threshold, and the updated successful number of transitions as preset calculations.
- the input of the model, through the operation of the calculation model, the output value is the updated maximum transfer threshold.
- the security of resource value transfer can be further improved.
- the method before updating the maximum transition threshold according to the first upper threshold, the second upper threshold, and the updated number of successful transitions, the method further includes: acquiring a first coefficient that affects the preset number of transitions; and acquiring the preset A second coefficient that affects the degree of change in the maximum transfer threshold.
- the first coefficient represents a coefficient that affects the degree of sensitivity of the number of successful transitions
- the second coefficient represents a coefficient that affects the degree of change of the maximum transfer threshold. Similar to the upper threshold, the first coefficient and the second coefficient may be fixed values preset by the server, and may also be user-defined values. When it is a fixed threshold, it can correspond to multiple account identifiers, which is a coefficient applicable to multiple accounts. When it is a custom value, it can be a coefficient applicable to the first account.
- the server may receive a calculation model modification request submitted by the corresponding device, and after verifying that the device has the modification authority, the first coefficient and the second coefficient included in the modification request may be set to be corresponding to the first account identifier. A coefficient and a second coefficient.
- the maximum transition threshold including: according to the first coefficient, the second coefficient, the first upper threshold, the second upper threshold, and the updated number of successful transitions , update the maximum transfer threshold.
- the server may obtain the first coefficient and the second coefficient corresponding to the first account identifier, and further use the first coefficient and the second coefficient as input of the calculation model, that is, the calculation model includes the first coefficient, the second coefficient, and the first The upper threshold, the second upper threshold, and the number of successful transitions, these five input parameters.
- the server may use the acquired first coefficient, the second coefficient, the first upper threshold, the second upper threshold, and the updated number of successful transitions as input of a preset calculation model, and calculate the calculation model to obtain an output. The value is set to the updated maximum transition threshold.
- the calculation model can be the following formula (1)
- k 1 , k 2 , n 1 and n 2 respectively represent the first upper limit threshold, the second upper limit threshold, the first coefficient and the second coefficient, wherein x represents the latest number of successful transfer times and y represents the maximum transfer threshold.
- the first coefficient may have a positive range and the second coefficient may have a negative range.
- the first coefficient is positively correlated with the rate of change of the maximum transition threshold; the second coefficient is inversely correlated with the rate of change of the maximum transition threshold.
- the maximum transfer threshold can be increased as the number of successful transitions increases, and the security of resource value transfer can be improved.
- the method before updating the maximum transfer threshold according to the number of successful transfers, the method further includes: detecting whether the second account identified by the second account identifier is a common transfer account of the first account; The third coefficient corresponding to the commonly used transfer account; updating the maximum transfer threshold according to the number of successful transfers includes: updating the maximum transfer threshold according to the number of successful transfers and the third coefficient.
- the server may detect the number of times of transfer between the first account and the second account, and the number of times of transfer may include, but is not limited to, the number of successful transfer of the resource value transfer of the first account to the second account (the first number of times),
- the second account performs any one or more of the number of successful transfer of the resource value transfer to the second account (the second number of times).
- the first number of times and the second number of times may be the number of times counted in the preset time period, and the preset time period may be a period of time of the last 3 years or any period of time from the beginning of 5 years.
- the server may determine, according to the transfer number information, whether the corresponding second account is a common transfer account of the first account.
- whether the second account is a commonly used transfer account may be determined according to the value of the first number of times and/or the second number of times. For example, when the first time exceeds the preset first time threshold, the second account may be determined to be a commonly used transfer account; or when the first number of times exceeds the corresponding preset first time threshold and the second number is determined When the threshold corresponding to the preset second time is also exceeded, it is determined that the second account is a commonly used transfer account.
- the first number of thresholds and the second number of thresholds may be the same or different, and may be, for example, 10 times.
- the third coefficient may also be a fixed value preset by the server, and may also be a user-defined value. When it is a fixed threshold, it can correspond to multiple account identifiers, which are coefficients applicable to multiple accounts. When it is a custom value, it can be a coefficient applicable to the first account.
- the server receives the calculation model modification request submitted by the corresponding device, and after verifying that the device has the modification authority, the third coefficient set in the modification request may be set as the third of the common transfer account corresponding to the first account identifier. coefficient.
- the maximum transition threshold may be updated based on the first upper threshold, the second upper threshold, the third coefficient, and the number of successful transitions after the update.
- the maximum transition threshold may be updated based on the first coefficient, the second coefficient, the third coefficient, the first upper threshold, the second upper threshold, and the number of successful transitions after the update.
- the above calculation model may be any one of the following formula (2) or formula (3).
- n 3 is the third coefficient.
- the third coefficient may be a positive number, and the speed of change of the maximum transfer threshold for the common transfer account may be increased by the above formula (2) or formula (3).
- the method before the transferring the first account identified by the first account identifier to the second account identified by the second account identifier, includes: detecting whether the first device identifier is a trusted device identifier, When the first device identifier is the trusted device identifier, the first account whose transfer value is identified by the first account identifier is transferred to the second account identified by the second account identifier.
- the trusted device identifier indicates that the computer device identified by the device identifier is a trusted computer device.
- the server may detect, after step S204, whether the first device identifier is a trusted device identifier. When the device is identified as a trusted device, the transfer account may be directly transferred from the first account identified by the first account identifier to the second account identified by the second account identifier.
- the third upper threshold corresponding to the trusted device identifier may be further obtained, and the size of the transfer value and the third upper threshold are compared, when the transfer value does not exceed the third upper threshold. And transferring the transfer value from the first account identified by the first account identifier to the second account identified by the second account identifier.
- the third upper threshold may be a value greater than or equal to the second upper threshold. Similarly, it can also be a fixed value preset by the server, and can also be a user-defined value. When it is a fixed threshold, it can correspond to multiple account identifiers, which is an upper threshold of trusted devices applicable to multiple accounts. When it is a custom value, it can be the upper threshold of the trusted device applicable to the first account.
- the server may receive the calculation model modification request submitted by the corresponding device, and after verifying that the device has the modification authority, the first upper threshold and the second upper threshold that are set in the modification request may be set to correspond to the first account identifier. The first upper threshold and the second upper threshold.
- the server may set a corresponding whitelist for storing the trusted device identifier for each first account, and establish an association relationship between each whitelist and the corresponding first account identifier. After obtaining the first account identifier and the first device identifier, the first device identifier may be queried in the whitelist associated with the first account identifier, and if yes, the first device identifier is determined to be the trusted device identifier.
- the foregoing resource value transfer method further includes a process of trusting device management, and the process may be performed before step S202 or performed after step S208.
- the process includes:
- Step S302 Receive a trusted device management request sent by the computer device where the first account is located, where the management request includes the first device identifier and the second device identifier of the managed device.
- the trusted device management request is a trust management request of a device that performs resource value transfer on the first account.
- the trust management request may include, but is not limited to, operations such as trust addition, trust deletion, and the like to the corresponding device.
- the device management request includes the device identifier of the device that sent the request (ie, the first device identifier), and the device identifier of the managed device (ie, the second device identifier). It can be understood that the first device identifier can be the same device identifier or a different device identifier.
- the method before step S302, the method further includes: receiving, by the computer device, a resource value transfer query request for the first account, and sending, according to the query request, a historically initiated resource value transfer to the first account according to the query request.
- Device Information e.g., Device Information
- the computer device may send a resource value transfer query request to the first account to the server, where the query request carries the first account identifier of the first account.
- the server may use the first account identifier to query the recorded history-initiated device information for performing resource value transfer on the first account, and send the device information to the computer device, so that the user can view the device information.
- the device information includes the device identifier.
- Step S304 detecting whether the computer device has the management authority.
- the server may detect whether the obtained trusted device management request further includes an authorization identifier, and when the authorization identifier is obtained, determine that the computer device has management authority.
- the authorization identifier may be an identification code generated by the U-Shield, and the U-Shield is a tool for online banking electronic signature and digital authentication.
- the computer device may obtain an identification code generated by the U shield by sending an external U shield or by sending an identification code generated by the U shield before or after initiating the trusted device management request, and transmitting the identification code to the server. After verifying that the identification code is correct, the server can determine that the computer device has management authority.
- Step S306 when the management authority is provided, the trusted device management is performed on the second device identifier according to the management request.
- the second device identifier may be set as the trusted device identifier, so that the device corresponding to the second device identifier is the trusted device when initiating the resource value transfer to the first account.
- the trusted device management request is a trusted deletion request
- the second device identifier may be set as the untrusted device identifier, the device corresponding to the second device identifier is cancelled, and the trusted device that transfers the resource value of the first account is initiated.
- the second device identifier when the management request is an add request, the second device identifier may be added to the whitelist; when the request is deleted, the second device identifier may be deleted from the whitelist.
- the prompt information that does not have the management authority may be returned to the computer device.
- another resource value transfer method is provided, and the method includes:
- Step S402 receiving a resource value transfer request sent by the computer device where the first account is located.
- Step S404 Acquire a first account identifier of the first account, a second account identifier of the second account, a first device identifier of the computer device, and a transfer value in the resource value transfer request.
- Step S406 Acquire a maximum transfer threshold value for performing resource value transfer for the first account initiated by the computer device identified by the first device identifier.
- the server establishes a corresponding device identification information table for each first account, and establishes an association relationship between the device identification information table and the first account identifier.
- the device identification information table may store a plurality of device identifiers, a number of successful transfer times of the first account corresponding to each device identifier, and a maximum transfer threshold.
- the server may query the maximum transfer threshold corresponding to the corresponding device identifier from the device identifier information table.
- Table 1 it is a device identification information table in one embodiment.
- the device identifier corresponding to the first account identifier when the device identifier corresponding to the first account identifier does not exist in the corresponding device identifier information table, it indicates that the device indicates that the corresponding device has not successfully performed resource value transfer on the first account.
- the maximum transition threshold corresponding to the device identifier may be the first upper threshold value described above.
- Step S408 when the transfer value does not exceed the maximum transfer threshold, transfer the transfer value from the first account identified by the first account identifier to the second account identified by the second account identifier.
- Step S410 Update the number of successful transfer times of resource value transfer initiated by the computer device identified by the first device identifier for the first account.
- the server may increment the number of successful transfers by one and update the corresponding device identification information table. For example, if the resource value of the first account identified by the account identifier A is initiated by the computer device corresponding to the device identifier B, the corresponding successful transfer number “10” in the above table 1 may be changed to “11”. When the corresponding device identification information table does not exist in the computer device, the corresponding device identifier may be added in the device identification information table, and the number of successful transfer times is “1”.
- Step S412 acquiring a preset first upper limit threshold, a second upper limit threshold, a first coefficient, and a second coefficient.
- Step S414 updating the maximum transition threshold according to the first coefficient, the second coefficient, the first upper threshold, the second upper threshold, and the updated number of successful transitions.
- the preset calculation model may be the above formula (1), and the server may use the first coefficient, the second coefficient first upper threshold, and the second upper threshold according to the preset formula (1). And the number of successful transitions after the update, as the input of the calculation model corresponding to the formula (1), and run the calculation model, the obtained output value is taken as the updated maximum transition threshold, and the updated maximum transition threshold is taken as the first The maximum transfer threshold of an account through a computer device at the next resource value transfer to the second account.
- the device identification information table described above may be updated to change the maximum transfer threshold corresponding to the corresponding device identification to the current output value.
- the first coefficient may be set to 2; the second coefficient is -2; the first upper threshold is 100, and the second upper threshold is 2000.
- the relationship between the number of successful transitions and the maximum transition threshold can be as shown in FIG. 5.
- the abscissa indicates the number of successful transitions, and the ordinate indicates the maximum transition threshold. It can be shown that as the number of successful transitions increases, the maximum transition threshold approaches the second upper threshold.
- the resource value transfer method described above sets a corresponding maximum transfer threshold for the resource value transfer request initiated by the first account by setting different computer devices, and is transferred when the transfer value required in the request does not exceed the maximum transfer threshold.
- the first account identified by the first account identifier is transferred to the second account identified by the second account identifier.
- the maximum transfer threshold may be updated according to the first coefficient, the second coefficient, the first upper threshold, the second upper threshold, and the updated number of successful transitions, thereby preventing the user from setting the first account.
- the password or verification code is retrieved by others, and the operation of transferring a large value by another person through the computer device can improve the security of the resource value transfer or reduce the loss of the user's resource value.
- a resource value transfer device includes:
- the transfer request receiving module 602 is configured to receive a resource value transfer request sent by the computer device where the first account is located.
- the transfer information obtaining module 604 is configured to obtain a first account identifier of the first account, a second account identifier of the second account, a first device identifier of the computer device, and a transfer value in the resource value transfer request; The maximum transfer threshold for resource value transfer initiated by the identified computer device for the first account.
- the transfer execution module 606 is configured to: when the transfer value does not exceed the maximum transfer threshold, transfer the transfer value from the first account identified by the first account identifier to the second account identified by the second account identifier.
- another resource value transfer device is provided, the device further comprising:
- the maximum transfer threshold update module 608 is configured to update the number of successful transfer times of the resource value transfer initiated by the computer device identified by the first device identifier for the first account; and update the maximum transfer threshold according to the number of successful transfer times, and the updated maximum value The transfer threshold is used as the maximum transfer threshold of the first account through the computer device for the next time the resource value is transferred to the second account.
- the transfer information obtaining module 604 is further configured to acquire a preset first upper limit threshold and a second upper limit threshold.
- the maximum transition threshold update module 608 is further configured to update the maximum transition threshold according to the first upper threshold, the second upper threshold, and the updated number of successful transitions, where the maximum transition threshold is between the first upper threshold and the second upper threshold.
- the transfer information obtaining module 604 is further configured to acquire a preset first coefficient that affects the number of transitions; and obtain a preset second coefficient that affects a degree of change of the maximum transition threshold.
- the maximum transition threshold update module 608 is further configured to update the maximum transition threshold according to the first coefficient, the second coefficient, the first upper threshold, the second upper threshold, and the updated number of successful transitions.
- another resource value transfer device is provided, the device further comprising:
- the common transfer account detection module 610 is configured to detect whether the second account identified by the second account identifier is a common transfer account of the first account.
- the transfer information obtaining module 604 is further configured to acquire a third coefficient corresponding to the common transfer account when the account is a commonly used transfer account.
- the maximum transition threshold update module 608 is further configured to update the maximum transition threshold based on the number of successful transitions and the third coefficient.
- another resource value transfer device is provided, the device further comprising:
- the trust management module 612 is configured to detect whether the first device identifier is a trusted first device identifier.
- the transfer execution module 606 is further configured to: when the first device identifier is the trusted device identifier, perform the transfer of the first account identified by the first account identifier to the second account identified by the second account identifier.
- the trust management module 612 is further configured to receive a trusted device management request sent by the computer device where the first account is located, where the management request includes the first device identifier and the second device identifier of the managed device; and detecting whether the computer device is Have the management authority; when the management authority is available, the device identification is managed by the second device identifier according to the management request.
- Each of the above-described devices may be implemented in whole or in part by software, hardware, and combinations thereof.
- the above modules may be embedded in the hardware in the processor or in the memory in the server, or may be stored in the memory in the server, so that the processor calls the corresponding operations of the above modules.
- the processor can be a central processing unit (CPU), a microprocessor, a microcontroller, or the like.
- one or more non-transitory computer readable storage media comprising computer readable instructions, when executed by one or more processors, causing a processor to perform any of the above The steps of the resource value transfer method in the embodiment.
- a server including a memory and a processor, wherein the memory stores computer readable instructions, and when executed by the processor, causes the processor to execute the resource value transfer method in any of the above embodiments. A step of.
- FIG. 10 it is a schematic diagram of the internal structure of a server in one embodiment.
- the server can be implemented with a stand-alone server or a server cluster consisting of multiple servers.
- the server includes a processor, memory, and network interface connected by a system bus. Among them, the processor is used to provide computing and control capabilities to support the operation of the entire server.
- the memory is used to store data, programs, and/or instruction code, etc., and the memory stores at least one computer readable instruction executable by the processor to implement the server-specific resources provided in the embodiments of the present application. Numerical transfer method.
- the memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (ROM), or the like.
- the memory includes a non-volatile storage medium and an internal memory.
- Non-volatile storage media stores operating systems, databases, and computer readable instructions.
- the database stores data related to a resource value transfer method provided by each of the above embodiments, such as an account identifier corresponding to each account, a number of successful transfers, and a maximum transfer threshold.
- the computer readable instructions are executable by a processor for implementing a resource value transfer method provided by the various embodiments above.
- the internal memory provides a cached operating environment for operating systems, databases, and computer readable instructions in a non-volatile storage medium.
- the network interface can be an Ethernet card or a wireless network card, etc., for communicating with external devices.
- FIG. 10 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the server to which the solution of the present application is applied.
- the specific server may include More or fewer components are shown in the figures, or some components are combined, or have different component arrangements.
- Non-volatile memory Any reference to a memory, storage, database, or other medium used herein may include non-volatile memory. Suitable non-volatile memories can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- ROM read only memory
- PROM programmable ROM
- EPROM electrically programmable ROM
- EEPROM electrically erasable programmable ROM
- flash memory any reference to a memory, storage, database, or other medium used herein may include non-volatile memory.
- ROM read only memory
- PROM programmable ROM
- EPROM electrically programmable ROM
- EEPROM electrically erasable programmable ROM
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
一种资源数值转移方法,包括:接收第一账户所在的计算机设备发送的资源数值转移请求;获取所述资源数值转移请求中的所述第一账户的第一账户标识、第二账户的第二账户标识、所述计算机设备的第一设备标识以及转移数值;获取由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户的进行资源数值转移的最大转移阈值;当所述转移数值不超过所述最大转移阈值时,将所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
Description
本申请要求于2017年10月27日提交中国专利局、申请号为2017110219593、发明名称为“资源数值转移方法、装置、存储介质和服务器”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及信息处理技术领域,特别是涉及一种资源数值转移方法、装置、存储介质和服务器。
随着互联网的高速发展,采用网络进行资源数值转移正变得越来越普遍。资源数值转移是指资源从第一帐户转移到第二帐户,用于标识资源数量的资源数值相应变化的过程。在实际生活中,表现为转账、支付或交易等。数值转移的资源包括但不限于电子钱包、虚拟红包、电子券、积分券、积分、电子代金券、游戏币、虚拟物品等。
传统在进行资源数值转移的过程中,通常需要进行密码验证和短信验证。服务器在接收到发起数值转移请求的终端的密码以及短信验证码后,进行验证,在验证正确后,即实现该资源数值的转移。
然而由于SIM(Subscriber Identification Module,用户身份识别模块)卡会被他人复制,而采用复制的SIM卡也能收到相应的验证码。因此,传统的只进行短信验证码的验证方式,会存在SIM卡被复制后,采用导致被他人篡取,导致资源数值转移的安全性不高。
发明内容
基于此,本申请实施例提供一种资源数值转移方法、装置、存储介质和服务器,可以提高资源数值转移的安全性。
一种资源数值转移方法,所述方法包括:接收第一账户所在的计算机设备发送的资源数值转移请求;获取所述资源数值转移请求中的所述第一账户的第一账户标识、第二账户的第二账户标识、所述计算机设备的第一设备标识以及转移数值;获取由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户的进行资源数值转移的最大转移阈值;及当所述转移数值不超过所述最大转移阈值时,将所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
一种资源数值转移装置,所述装置包括:转移请求接收模块,用于接收第一账户所在的计算机设备发送的资源数值转移请求;转移信息获取模块,用于获取所述资源数值转移请求中的所述第一账户的第一账户标识、第二账户的第二账户标识、所述计算机设备的第一设备标识以及转移数值;获取由所述第一设备标识所标识的计算机设备发起的,针对所 述第一账户的进行资源数值转移的最大转移阈值;及转移执行模块,用于当所述转移数值不超过所述最大转移阈值时,将所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
一种服务器,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器本申请任意一种资源数值转移方法的步骤。
一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,当所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行本申请任意一种资源数值转移方法的步骤。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征、目的和优点将从说明书、附图以及权利要求书变得明显。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为一个实施例中资源数值转移方法的应用环境图;
图2为一个实施例中资源数值转移方法的流程示意图;
图3为一个实施例中信任设备管理的过程的流程示意图;
图4为另一个实施例中资源数值转移方法的流程示意图;
图5为一个实施例中成功转移次数和最大转移阈值之间的关系图;
图6为一个实施例中资源数值转移装置的结构框图;
图7为另一个实施例中资源数值转移装置的结构框图;
图8为又一个实施例中资源数值转移装置的结构框图;
图9为再一个实施例中资源数值转移装置的结构框图;
图10为一个实施例中服务器的内部结构图。
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
可以理解,本申请所使用的术语“第一”、“第二”等可在本文中用于描述各种元件,但这些元件不受这些术语限制。这些术语仅用于将第一个元件与另一个元件区分。举例来说,在不脱离本申请的范围的情况下,可以将第一账户称为第二账户,且类似地,可将第 二账户称为第一账户。第一账户和第二账户两者都是账户。
本申请实施例所提供的资源数值转移方法,可应用于如图1所示的应用环境中。参考图1所示,该应用环境包括计算机设备110和服务器120,计算机设备110和服务器120可通过网络进行通信。计算机设备110为发起资源数值转移请求的设备,包括但不限于手机、平板电脑、便携式笔记本或智能穿戴设备等。服务器为可执行与账户之间资源数据转移的设备,比如可为微信、支付宝或银行等具有资源数值转移权限的服务器。计算机设备110可向服务器120发送资源数值转移请求,该资源数值转移请求包含发起请求的第一账户的账户标识(即第一账户标识)、第二账户的账户标识(即第二账户标识)、计算机设备的设备标识(即第一设备标识)以及转移数值。服务器120可根据该资源数值转移请求进行校验,以决定是否将该转移数值从第一账户转移到第二账户。
在一个实施例中,如图2所示,提供了一种资源数值转移方法。本实施例以该方法应用于如图1所示的服务器为例进行举例说明。参照图2,该方法包括:
步骤S202,接收第一账户所在的计算机设备发送的资源数值转移请求。
资源数值转移表示将一定数量的资源数值从第一账户转到第二账户的过程,如将一定的资金从第一账户转账至第二账户的一个过程,在日常生活中通常表现为转账。第一账户为资源数值的转出账户,计算机设备为发起资源数值转移请求的设备。计算机设备可进行资源数值转移中,密码或者验证码验证通过之后,发起资源数值转移请求。也可进行密码或者验证码验证之前,即开始发起资源数值转移请求。
资源数值转移请求中包含该计算机设备的设备标识、第一账户的账户标识、接收转移数值的第二账户的账户标识以及转移数值。其中,该设备标识和账户标识均用于唯一标识对应的计算机设备和账户,可由相应位数的数字、字母、或其它特殊字符等其中的一种或多种构成。设备标识可为设备识别码,比如当计算机设备为手机时,该设备标识可为手机的IMSI(International Mobile Subscriber Identification Number,国际移动用户识别码)。账户标识可为对应账户唯一的账号。转移数值可为任意的数值,比如为1000元人民币。
计算机设备可接收用户输入的转移数值以及转入账号等信息,并在侦测到提交资源数值转移的操作后,触发资源数值转移指令。根据该资源数值转移指令获取所输入的转移数值、转出账户的账户标识、转入账户的账户标识以及设备自身的设备标识等字段信息,根据该字段信息生成资源数值转移请求,发送至服务器。服务器可通过预设的接口接收该计算机设备发送的资源数值转移请求。
步骤S204,获取资源数值转移请求中的第一账户的第一账户标识、第二账户的第二账户标识、计算机设备的第一设备标识以及转移数值。
服务器可从接收到的资源数值转移请求中,提取第一账户标识、第二账户标识、设备标识以及转移数值,并识别出第一账户标识所标识的账户为发起资源数值转移的账户(转出账户),第二账户标识所标识的账户为接收转移数值的账户(转入账户)。可选地,服务器可根据其中两个账户标识在该请求中的字段位置,来判定出第一账户标识为转出账户、第 二账户标识为转入账户。比如可判定在前的为账户标识所标识的账户为转出账户,在后的对应为第二账户标识。
步骤S206,获取由第一设备标识所标识的计算机设备发起的,针对第一账户的进行资源数值转移的最大转移阈值。
最大转移阈值表示由该计算机设备所发起的,对第一账户可转出的最大数值。服务器预先存储了同一转出账户,由各个不同设备所发起资源数值转移请求下,对应的最大转移阈值。服务器可根据该第一账户标识与设备标识,查询出对应的最大转移阈值。
在一个实施例中,服务器可查询由对应计算机设备发起的,对第一账户进行资源转出的转移成功次数,根据该转移成功次数来计算出对应的最大转移阈值。其中,最大转移阈值与转移成功次数正相关,转移成功次数越大,则对应的最大转移阈值也越大。
步骤S208,当转移数值不超过最大转移阈值时,将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
服务器可比较该转移数值与最大转移阈值的大小,根据该比较结果判定是否进行资源数值转移。可选地,服务器可调用预设的比较器对该转移数值与最大转移阈值进行对比,得到对比结果。当对比结果为转移数值不超过最大转移阈值,则判定允许进行资源数值转移,可将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
若对比结果为转移数值大于最大转移阈值,则判定不允许转移。可生成无法执行该资源数值转移的提示信息,并将该提示信息发送至该计算机设备。比如可发送“对不起,您的转账操作失败”。可选地,该提示信息中还可包含不能转账的原因,比如可为:“对比起,您的转账金额过大,需要进一步核实您的身份”等。
在一个实施例中,在将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中之前,可检测是否已通过转移密码的验证,若否,则进行转移密码验证,在通过验证后,再执行该转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
上述的资源数值转移方法,通过设置不同的计算机设备,针对第一账户发起的资源数值转移请求,设置对应的最大转移阈值,且当请求中要求的转移数值不超过该最大转移阈值时,将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。可防止用户对第一账户设置的密码或验证码,被他人篡取,由他人通过自身的计算机设备发起转移较大数值的操作,进而可提高资源数值转移的安全性,或者降低用户的资源数值的损失。
在一个实施例中,在步骤S208之后,还包括:更新由第一设备标识所标识的计算机设备发起的,针对第一账户进行资源数值转移的成功转移次数;根据成功转移次数更新最大转移阈值,将更新后的最大转移阈值作为第一账户通过计算机设备,在下一次对第二账户进行资源数值转移时的最大转移阈值。
服务器可调用预设的累加器或计算机,将原来统计的成功转移次数进行更新,将成功转移次数加1。比如,在该步骤S208之前,对应成功转移次数为8,则更新后的成功转移次数为9。
在一个实施例中,服务器可针对每个转出账户,统计该转出账户,由不同的计算机设备发起的资源数值转移请求,将资源数值转入至各个转入账户的转移成功次数。并根据每次的转移操作,更新对应的转移成功次数。
服务器可预先建立不同的成功转移次数(或转移次数范围)和最大预设阈值之间的对应关系,不同的成功转移次数,对应的最大转移阈值不一定相同。根据该对应关系可查询出对应的阈值,将查询出的阈值作为更新后的最大转移阈值。
在一个实施例中,服务器中预设了最大转移阈值的计算模型,并将更新后的成功次数作为该计算模型的输入,得到的输出值即可作为更新后的最大转移阈值。
在一个实施例中,根据成功转移次数更新最大转移阈值,包括:获取预设的第一上限阈值和第二上限阈值;根据第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值,最大转移阈值处于第一上限阈值、第二上限阈值之间。
第一上限阈值和第二上限阈值分别表示所设置的转移数值的最小上限阈值和最大上限阈值,即最大转移阈值的变化范围可处于第一上限阈值和第二上限阈值所处的阈值区间之内。服务器进一步建立了最大转移阈值与第一上限阈值、第二上限阈值和成功转移次数之间的关系。
在一个实施例中,第一上限阈值和第二上限阈值可为服务器预设的固定的数值,还可为用户自定义的数值。当为固定的阈值时,可与多个账户标识对应,为适用于多个账户的上限阈值。当为自定义的数值时,可为适用于第一账户的上限阈值。服务器可接收对应设备提交的计算模型修改请求,在验证该设备具备修改权限后,可将该修改请求中包含所设置的第一上限阈值和第二上限阈值,设置为与该第一账户标识对应的第一上限阈值和第二上限阈值。其中,最大转移阈值随着成功转移次数的增大,则越逼近第二上限阈值。
在一个实施例中,服务器可获取与该第一账户标识对应的第一上限阈值和第二上限阈值,将该第一上限阈值、第二上限阈值以及更新后的成功转移次数作为预设的计算模型的输入,通过对该计算模型的运算,输出的数值即为更新后的最大转移阈值。
通过进一步引入第一上限阈值和第二上限阈值,使得该最大转移阈值处第一上限阈值和第二上限阈值之内,可进一步提高资源数值转移的安全性。
在一个实施例中,在根据第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值之前,还包括:获取预设的影响转移次数的第一系数;获取预设的影响最大转移阈值的变化程度的第二系数。
第一系数表示影响转成成功次数的敏感程度的系数,第二系数表示影响最大转移阈值的变化程度的系数。与该上限阈值类似,第一系数和第二系数可为服务器预设的固定的数值,还可为用户自定义的数值。当为固定的阈值时,可与多个账户标识对应,为适用于多 个账户的系数。当为自定义的数值时,可为适用于第一账户的系数。服务器可接收对应设备提交的计算模型修改请求,在验证该设备具备修改权限后,可将该修改请求中包含所设置的第一系数和第二系数,设置为与该第一账户标识对应的第一系数和第二系数。
根据第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值,包括:根据第一系数、第二系数、第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值。
服务器可获取与该第一账户标识对应的第一系数和第二系数,进一步将该第一系数和第二系数作为计算模型的输入,即计算模型中包含第一系数、第二系数、第一上限阈值、第二上限阈值以及成功转移次数,这5个输入参数。服务器可将所获取的第一系数、第二系数、第一上限阈值、第二上限阈值和更新后的成功转移次数作为预设的计算模型的输入,对该计算模型进行运算,将得到输出的数值设置为更新后的最大转移阈值。
在一个实施例中,该计算模型可为以下的公式(1)
其中,k
1、k
2、n
1和n
2分别表示上述的第一上限阈值、第二上限阈值、第一系数和第二系数,x表示最新的转移成功次数、y表示最大转移阈值。
在一个实施例中,第一系数的取值范围可为正数,第二系数取值范围可为负数。第一系数与最大转移阈值的变化速度正相关;第二系数与最大转移阈值的变化速度负相关。
通过上述的计算模型,可使得最大转移阈值随着成功转移次数的增大而增大,可提高资源数值转移的安全性。
在一个实施例中,在根据成功转移次数更新最大转移阈值之前,还包括:检测第二账户标识所标识的第二账户是否为第一账户的常用转移账户;当为常用转移账户时,获取与常用转移账户对应的第三系数;根据成功转移次数更新最大转移阈值,包括:根据成功转移次数和第三系数更新最大转移阈值。
服务器可检测第一账户与第二账户之间的转移次数信息,该转移次数信息可包括但不限于第一账户向第二账户进行资源数值转移的转移成功次数(计第一次数)、第二账户向第二账户进行资源数值转移的转移成功次数(计第二次数)等其中的任意一种或多种。可选地,该第一次数和第二次数可为预设时间段内统计到的次数,该预设时间段可为最近3年或者从开始5年等任意时长的时间段。
服务器可根据该转移次数信息来判定对应第二账户是否为第一账户的常用转移账户。可选地,可根据该第一次数和/或第二次数的数值大小,来判定第二账户是否为常用转移账户。如当第一次数超过对应预设的第一次数阈值时,可判定第二账户为常用转移账户;或者当判定第一次数超过对应预设的第一次数阈值、且第二次数也超过对应预设的第二次数阈值时,判定第二账户为常用转移账户。其中,第一次数阈值和第二次数阈值可相同或不同,比如均可为10次。
在一个实施例中,该第三系数同样可为服务器预设的固定的数值,还可为用户自定义的数值。当为固定的阈值时,可与多个账户标识对应,为适用于多个账户的系数。当为自定义的数值时,可为适用于第一账户的系数。服务器接收对应设备提交的计算模型修改请求,在验证该设备具备修改权限后,可将该修改请求中包含所设置的第三系数,设置为与该第一账户标识对应的常用转移账户的第三系数。
在一个实施例中,可根据第一上限阈值、第二上限阈值、第三系数和更新后的成功转移次数,更新最大转移阈值。
在一个实施例中,可根据第一系数、第二系数、第三系数、第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值。
可选地,上述计算模型可为以下公式(2)或公式(3)中的任意一种。
其中,n
3为第三系数。可选地,该第三系数可为正数,通过上述的公式(2)或公式(3),可提高针对常用转移账户的最大转移阈值的变化速度。
在一个实施例中,在将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中之前,包括:检测第一设备标识是否为信任设备标识,当第一设备标识是信任设备标识时,执行转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
信任设备标识表示该设备标识所标识的计算机设备为可信任的计算机设备。服务器可在步骤S204之后,检测该第一设备标识是否为信任设备标识。当为信任设备标识时,可直接将该转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
在一个实施例中,当为信任设备标识时,可进一步获取与信任设备标识对应的第三上限阈值,比较该转移数值与第三上限阈值的大小,当该转移数值不超过第三上限阈值时,将该转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
其中,第三上限阈值可为大于或等于第二上限阈值的数值。类似地,也可为服务器预设的固定的数值,还可为用户自定义的数值。当为固定的阈值时,可与多个账户标识对应,为适用于多个账户的信任设备的上限阈值。当为自定义的数值时,可为适用于第一账户的信任设备的上限阈值。服务器可接收对应设备提交的计算模型修改请求,在验证该设备具备修改权限后,可将该修改请求中包含所设置的第一上限阈值和第二上限阈值,设置为与该第一账户标识对应的第一上限阈值和第二上限阈值。
在一个实施例中,服务器可针对每个第一账户,设置对应的用于存储信任设备标识的白名单,将每个白名单与相应的第一账户标识之间建立关联关系。当获取第一账户标识以及第一设备标识后,可查询该第一设备标识是否存在于与该第一账户标识关联的白名单中,若是,则判定该第一设备标识是信任设备标识。
在一个实施例中,如图3所示,上述的资源数值转移方法还包括信任设备管理的过程,该过程可为上述步骤S202之前执行,或步骤S208之后执行。该过程包括:
步骤S302,接收第一账户所在的计算机设备发送的信任设备管理请求,管理请求中包含第一设备标识和被管理设备的第二设备标识。
信任设备管理请求为对第一账户进行资源数值转移的设备的信任管理请求。该信任管理请求可包括但不限于对相应设备的信任添加、信任删除等操作。设备管理请求中包含发送该请求的设备的设备标识(即该第一设备标识),以及被管理设备的设备标识(即第二设备标识)。可以理解地,该第一设备标识可为相同的设备标识或不同的设备标识。
在一个实施例中,在步骤S302之前,还包括:接收计算机设备发送的对第一账户的资源数值转移查询请求,根据查询请求将向计算机设备发送历史发起的对第一账户进行资源数值转移的设备信息。
计算机设备可在登录第一账户对应的登录信息后,向服务器发送对该第一账户的资源数值转移查询请求,该查询请求中携带第一账户的第一账户标识。服务器可通过该第一账户标识,查询所所记录的历史发起的对第一账户进行资源数值转移的设备信息,将该设备信息发送至该计算机设备,以使得用户可查阅到该设备信息。其中,该设备信息中包括设备标识。
步骤S304,检测计算机设备是否具备管理权限。
服务器可检测所获取的信任设备管理请求中,是否进一步包含授权标识,当具有授权标识时,则判定该计算机设备具有管理权限。其中授权标识可为通过U盾所产生的识别码,U盾是用于网上银行电子签名和数字认证的工具。计算机设备可通过外接U盾,或者通过在发起该信任设备管理请求之前或之后,获取通过U盾生成的识别码,并发送该识别码至服务器。服务器在验证该识别码正确后,可判定该计算机设备具备管理权限。
步骤S306,当具备管理权限时,根据管理请求对第二设备标识进行信任设备管理。
当该信任设备管理请求为信任添加请求时,可将该第二设备标识设置为信任设备标识,使得第二设备标识对应的设备,在发起对该第一账户的资源数值转移时,为信任设备。当该信任设备管理请求为信任删除请求时,可将该第二设备标识设置为非信任设备标识,取消第二设备标识对应的设备,发起对该第一账户的资源数值转移的信任设备。
在一个实施例中,当该管理请求为添加请求时,可将该第二设备标识添加进上述的白名单;当为删除请求时,可将该第二设备标识从该白名单中删除。
在一个实施例中,当不具备管理权限时,可向该计算机设备返回不具备管理权限的提示信息。
通过设置信任设备标识,可提高资源数值转移的便利性。
在一个实施例中,如图4所示,提供了另一种资源数值转移方法,方法包括:
步骤S402,接收第一账户所在的计算机设备发送的资源数值转移请求。
步骤S404,获取资源数值转移请求中的第一账户的第一账户标识、第二账户的第二账户标识、计算机设备的第一设备标识以及转移数值。
步骤S406,获取由第一设备标识所标识的计算机设备发起的,针对第一账户的进行资源数值转移的最大转移阈值。
服务器针对每个第一账户,建立了对应的设备标识信息表,并建立了该设备标识信息表与该第一账户标识之间的关联关系。该设备标识信息表中可存储多个设备标识、每个设备标识对应的第一账户进行资源数值转移的成功转移次数以及最大转移阈值。服务器可从该设备标识信息表中,查询出相应设备标识对应的最大转移阈值。
如下表1所示,为一个实施例中的设备标识信息表。
在一个实施例中,当对应的设备标识信息表中不存在与该第一账户标识对应的设备标识时,则表示该设备表示对应的设备并未成功对该第一账户进行过资源数值转移。此时,与该设备标识对应的最大转移阈值可为上述的第一上限阈值。
步骤S408,当转移数值不超过最大转移阈值时,将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
步骤S410,更新由第一设备标识所标识的计算机设备发起的,针对第一账户进行资源数值转移的成功转移次数。
服务器可将该成功转移次数加1,并更新对应的设备标识信息表。比如,为由设备标识B对应的计算机设备发起的,针对账户标识A所标识的第一账户的资源数值转移,则可将上表1中对应的成功转移次数“10”更改为“11”。当该计算机设备不存在对应的设备标识信息表中,可在该设备标识信息表中添加对应的设备标识,并记录其成功转移次数为“1”。
步骤S412,获取预设的第一上限阈值、第二上限阈值、第一系数以及第二系数。
步骤S414,根据第一系数、第二系数、第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值。
在一个实施例中,预设的计算模型可为上述的公式(1),服务器可根据上述预设的公式(1),将该第一系数、第二系数第一上限阈值、第二上限阈值和更新后的成功转移次数,作 为该公式(1)对应的计算模型的输入,并运行该计算模型,将得到的输出的数值作为更新后的最大转移阈值,将更新后的最大转移阈值作为第一账户通过计算机设备,在下一次对第二账户进行资源数值转移时的最大转移阈值。
在一个实施例中,可更新上述的设备标识信息表,将与相应设备标识对应的最大转移阈值更改为本次的输出数值。
可选地,可设置上述的第一系数为2;第二系数为-2;第一上限阈值为100,第二上限阈值为2000。则在该计算模型中,成功转移次数和最大转移阈值之间的关系可如图5所示。其中,该横坐标表示成功转移次数,纵坐标表示最大转移阈值。可以体现出,最大转移阈值随着成功转移次数的增大,则越逼近第二上限阈值。
上述的资源数值转移方法,通过设置不同的计算机设备,针对第一账户发起的资源数值转移请求,设置对应的最大转移阈值,且当请求中要求的转移数值不超过该最大转移阈值时,将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。且在成功进行资源数值转移后,可根据该第一系数、第二系数、第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值,可防止用户对第一账户设置的密码或验证码,被他人篡取,由他人通过自身的计算机设备发起转移较大数值的操作,进而可提高资源数值转移的安全性,或者降低用户的资源数值的损失。
在一个实施例中,如图6所示,提供了一种资源数值转移装置。该装置包括:
转移请求接收模块602,用于接收第一账户所在的计算机设备发送的资源数值转移请求。
转移信息获取模块604,用于获取资源数值转移请求中的第一账户的第一账户标识、第二账户的第二账户标识、计算机设备的第一设备标识以及转移数值;获取由第一设备标识所标识的计算机设备发起的,针对第一账户的进行资源数值转移的最大转移阈值。
转移执行模块606,用于当转移数值不超过最大转移阈值时,将转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
在一个实施例中,如图7所示,提供了另一种资源数值转移装置,该装置还包括:
最大转移阈值更新模块608,用于更新由第一设备标识所标识的计算机设备发起的,针对第一账户进行资源数值转移的成功转移次数;根据成功转移次数更新最大转移阈值,将更新后的最大转移阈值作为第一账户通过计算机设备,在下一次对第二账户进行资源数值转移时的最大转移阈值。
在一个实施例中,转移信息获取模块604还用于获取预设的第一上限阈值和第二上限阈值。
最大转移阈值更新模块608还用于根据第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值,最大转移阈值处于第一上限阈值、第二上限阈值之间。
在一个实施例中,转移信息获取模块604还用于获取预设的影响转移次数的第一系数;获取预设的影响最大转移阈值的变化程度的第二系数。
最大转移阈值更新模块608还用于根据第一系数、第二系数、第一上限阈值、第二上限阈值和更新后的成功转移次数,更新最大转移阈值。
在一个实施例中,如图8所示,提供了又一种资源数值转移装置,该装置还包括:
常用转移账户检测模块610,用于检测第二账户标识所标识的第二账户是否为第一账户的常用转移账户。
转移信息获取模块604还用于当为常用转移账户时,获取与常用转移账户对应的第三系数。
最大转移阈值更新模块608还用于根据成功转移次数和第三系数更新最大转移阈值。
在一个实施例中,如图9所示,提供了再一种资源数值转移装置,该装置还包括:
信任管理模块612,用于检测第一设备标识是否为信任第一设备标识。
转移执行模块606还用于当第一设备标识是信任设备标识时,执行转移数值由第一账户标识所标识的第一账户,转移到第二账户标识所标识的第二账户中。
在一个实施例中,信任管理模块612还用于接收第一账户所在的计算机设备发送的信任设备管理请求,管理请求中包含第一设备标识和被管理设备的第二设备标识;检测计算机设备是否具备管理权限;当具备管理权限时,根据管理请求对第二设备标识进行信任设备管理。
上述装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于服务器中的处理器中,也可以以软件形式存储于服务器中的存储器中,以便于处理器调用执行以上各个模块对应的操作。该处理器可以为中央处理单元(CPU)、微处理器、单片机等。
在一个实施例中,提供了一个或多个包含计算机可读指令的非易失性计算机可读存储介质,当计算机可读指令被一个或多个处理器执行时,使得处理器执行上述任一项实施例中的资源数值转移方法的步骤。
在一个实施例中,提供了一种服务器,包括存储器及处理器,存储器中储存有计算机可读指令,指令被处理器执行时,使得处理器执行上述任一项实施例中的资源数值转移方法的步骤。
如图10所示,为一个实施例中服务器的内部结构示意图。服务器可以用独立的服务器或者是多个服务器组成的服务器集群来实现。该服务器包括通过系统总线连接的处理器、存储器和网络接口。其中,该处理器用于提供计算和控制能力,支撑整个服务器的运行。存储器用于存储数据、程序、和/或指令代码等,存储器上存储至少一个计算机可读指令,该计算机可读指令可被处理器执行,以实现本申请实施例中提供的适用于服务器的资源数值转移方法。存储器可包括磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质等。例如,在一个实施例中,存储器包括非易失性存储介质及内存储器。非易失性存储介质存储有操作系统、数据库和计算机可读指令。该数据库中存储有用于实现以上各个实施例所提供的一种资源数值转移方法相关的数据,比如可存储有每个账 户对应的账户标识、成功转移次数以及最大转移阈值等。该计算机可读指令可被处理器所执行,以用于实现以上各个实施例所提供的一种资源数值转移方法。内存储器为非易失性存储介质中的操作系统、数据库和计算机可读指令提供高速缓存的运行环境。网络接口可以是以太网卡或无线网卡等,用于与外部的设备进行通信。
本领域技术人员可以理解,图10中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的服务器的限定,具体的服务器可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成。该计算机可读指令可存储在存储器上,比如存储于一非易失性计算机可读取存储介质中。该指令被执行时,可实现包括如上述各方法的实施例的流程。
本申请所使用的对存储器、存储、数据库或其它介质的任何引用可包括非易失性存储器。合适的非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。
上述各实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
上述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。
Claims (20)
- 一种资源数值转移方法,所述方法包括:接收第一账户所在的计算机设备发送的资源数值转移请求;获取所述资源数值转移请求中的所述第一账户的第一账户标识、第二账户的第二账户标识、所述计算机设备的第一设备标识以及转移数值;获取由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户的进行资源数值转移的最大转移阈值;及当所述转移数值不超过所述最大转移阈值时,将所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
- 根据权利要求1所述的方法,其特征在于,在所述转移到所述第二账户标识所标识的第二账户中之后,还包括:更新由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户进行资源数值转移的成功转移次数;及根据所述成功转移次数更新所述最大转移阈值,将更新后的最大转移阈值作为所述第一账户通过所述计算机设备,在下一次对第二账户进行资源数值转移时的最大转移阈值。
- 根据权利要求2所述的方法,其特征在于,所述根据所述成功转移次数更新所述最大转移阈值,包括:获取预设的第一上限阈值和第二上限阈值;及根据所述第一上限阈值、第二上限阈值和更新后的成功转移次数,更新所述最大转移阈值,所述最大转移阈值处于所述第一上限阈值、第二上限阈值之间。
- 根据权利要求3所述的方法,其特征在于,在所述根据所述第一上限阈值、第二上限阈值和更新后的成功转移次数,更新所述最大转移阈值之前,还包括:获取预设的影响转移次数的第一系数;及获取预设的影响所述最大转移阈值的变化程度的第二系数;所述根据所述第一上限阈值、第二上限阈值和更新后的成功转移次数,更新所述最大转移阈值,包括:根据所述第一系数、第二系数、第一上限阈值、第二上限阈值和更新后的成功转移次数,更新所述最大转移阈值。
- 根据权利要求2所述的方法,其特征在于,在所述根据所述成功转移次数更新所述最大转移阈值之前,还包括:检测所述第二账户标识所标识的第二账户是否为所述第一账户的常用转移账户;及当为常用转移账户时,获取与所述常用转移账户对应的第三系数;所述根据所述成功转移次数更新所述最大转移阈值,包括:根据所述成功转移次数和所述第三系数更新所述最大转移阈值。
- 根据权利要求1所述的方法,其特征在于,在所述将所述转移数值由所述第一账 户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中之前,包括:检测所述第一设备标识是否为信任第一设备标识;及当所述第一设备标识是信任设备标识时,执行所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
- 根据权利要求6所述的方法,其特征在于,所述方法还包括:接收第一账户所在的计算机设备发送的信任设备管理请求,所述管理请求中包含所述第一设备标识和被管理设备的第二设备标识;检测所述计算机设备是否具备管理权限;及当具备管理权限时,根据所述管理请求对所述第二设备标识进行信任设备管理。
- 一种资源数值转移装置,所述装置包括:转移请求接收模块,用于接收第一账户所在的计算机设备发送的资源数值转移请求;转移信息获取模块,用于获取所述资源数值转移请求中的所述第一账户的第一账户标识、第二账户的第二账户标识、所述计算机设备的第一设备标识以及转移数值;获取由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户的进行资源数值转移的最大转移阈值;及转移执行模块,用于当所述转移数值不超过所述最大转移阈值时,将所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
- 根据权利要求8所述的装置,其特征在于,所述装置还包括:最大转移阈值更新模块,用于更新由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户进行资源数值转移的成功转移次数;根据所述成功转移次数更新所述最大转移阈值,将更新后的最大转移阈值作为所述第一账户通过所述计算机设备,在下一次对第二账户进行资源数值转移时的最大转移阈值。
- 根据权利要求8所述的装置,其特征在于,所述装置还包括:信任管理模块,用于检测所述第一设备标识是否为信任第一设备标识;所述转移执行模块还用于当所述第一设备标识是信任设备标识时,执行所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
- 一种服务器,包括存储器及处理器,所述存储器中储存有计算机可读指令,所述指令被所述处理器执行时,使得所述处理器执行以下步骤:接收第一账户所在的计算机设备发送的资源数值转移请求;获取所述资源数值转移请求中的所述第一账户的第一账户标识、第二账户的第二账户标识、所述计算机设备的第一设备标识以及转移数值;获取由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户的进行资源数值转移的最大转移阈值;及当所述转移数值不超过所述最大转移阈值时,将所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
- 根据权利要求11所述的服务器,其特征在于,所述指令被所述处理器执行时,还使得所述处理器执行以下步骤:更新由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户进行资源数值转移的成功转移次数;及根据所述成功转移次数更新所述最大转移阈值,将更新后的最大转移阈值作为所述第一账户通过所述计算机设备,在下一次对第二账户进行资源数值转移时的最大转移阈值。
- 根据权利要求12所述的服务器,其特征在于,所述指令被所述处理器执行时,还使得所述处理器执行以下步骤:获取预设的第一上限阈值和第二上限阈值;及根据所述第一上限阈值、第二上限阈值和更新后的成功转移次数,更新所述最大转移阈值,所述最大转移阈值处于所述第一上限阈值、第二上限阈值之间。
- 根据权利要求13所述的服务器,其特征在于,所述指令被所述处理器执行时,还使得所述处理器执行以下步骤:获取预设的影响转移次数的第一系数;获取预设的影响所述最大转移阈值的变化程度的第二系数;及根据所述第一系数、第二系数、第一上限阈值、第二上限阈值和更新后的成功转移次数,更新所述最大转移阈值。
- 根据权利要求12所述的服务器,其特征在于,所述指令被所述处理器执行时,还使得所述处理器执行以下步骤:检测所述第二账户标识所标识的第二账户是否为所述第一账户的常用转移账户;当为常用转移账户时,获取与所述常用转移账户对应的第三系数;及根据所述成功转移次数和所述第三系数更新所述最大转移阈值。
- 根据权利要求11所述的服务器,其特征在于,所述指令被所述处理器执行时,还使得所述处理器执行以下步骤:检测所述第一设备标识是否为信任第一设备标识;及当所述第一设备标识是信任设备标识时,执行所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
- 根据权利要求16所述的服务器,其特征在于,所述指令被所述处理器执行时,还使得所述处理器执行以下步骤:接收第一账户所在的计算机设备发送的信任设备管理请求,所述管理请求中包含所述第一设备标识和被管理设备的第二设备标识;检测所述计算机设备是否具备管理权限;及当具备管理权限时,根据所述管理请求对所述第二设备标识进行信任设备管理。
- 一个或多个包含计算机可读指令的非易失性计算机可读存储介质,当所述计算机可读指令被一个或多个处理器执行时,使得所述处理器执行以下步骤:接收第一账户所在的计算机设备发送的资源数值转移请求;获取所述资源数值转移请求中的所述第一账户的第一账户标识、第二账户的第二账户标识、所述计算机设备的第一设备标识以及转移数值;获取由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户的进行资源数值转移的最大转移阈值;及当所述转移数值不超过所述最大转移阈值时,将所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
- 根据权利要求18所述的存储介质,其特征在于,当所述计算机可读指令被一个或多个处理器执行时,还使得所述处理器执行以下步骤:更新由所述第一设备标识所标识的计算机设备发起的,针对所述第一账户进行资源数值转移的成功转移次数;及根据所述成功转移次数更新所述最大转移阈值,将更新后的最大转移阈值作为所述第一账户通过所述计算机设备,在下一次对第二账户进行资源数值转移时的最大转移阈值。
- 根据权利要求18所述的存储介质,其特征在于,当所述计算机可读指令被一个或多个处理器执行时,还使得所述处理器执行以下步骤:检测所述第一设备标识是否为信任第一设备标识;及当所述第一设备标识是信任设备标识时,执行所述转移数值由所述第一账户标识所标识的第一账户,转移到所述第二账户标识所标识的第二账户中。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711021959.3A CN107862526B (zh) | 2017-10-27 | 2017-10-27 | 资源数值转移方法、装置、存储介质和服务器 |
CN201711021959.3 | 2017-10-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019080423A1 true WO2019080423A1 (zh) | 2019-05-02 |
Family
ID=61696985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/077315 WO2019080423A1 (zh) | 2017-10-27 | 2018-02-27 | 资源数值转移方法、装置、存储介质和服务器 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107862526B (zh) |
WO (1) | WO2019080423A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108632089B (zh) * | 2018-05-07 | 2022-09-20 | 平安普惠企业管理有限公司 | 测试终端的管理方法、装置、设备和计算机存储介质 |
CN108848124A (zh) * | 2018-05-21 | 2018-11-20 | 深圳市梵高夫科技有限公司 | 高尔夫球场的资源数据管理方法、服务器及存储介质 |
CN109688048B (zh) * | 2018-12-11 | 2021-08-24 | 广州方硅信息技术有限公司 | 线索资源分享方法和装置 |
CN109711824B (zh) * | 2019-01-02 | 2022-10-25 | 深圳壹账通智能科技有限公司 | 资源转移方法、装置、计算机设备和存储介质 |
CN109829821A (zh) * | 2019-01-16 | 2019-05-31 | 海南新软软件有限公司 | 一种数字资产地址转移异常的处理方法、装置及系统 |
CN110502511A (zh) * | 2019-07-01 | 2019-11-26 | 招联消费金融有限公司 | 数值转移方法及装置、计算机设备和存储介质 |
CN110633969B (zh) * | 2019-08-15 | 2023-02-07 | 平安普惠企业管理有限公司 | 资源数据转移方法、装置、计算机设备和存储介质 |
CN110880107B (zh) * | 2019-11-07 | 2022-11-11 | 南方电网财务有限公司 | 财务资源转移方法、装置、计算机设备和存储介质 |
CN113674018A (zh) * | 2021-07-26 | 2021-11-19 | 山东赤子城网络技术有限公司 | 资源转移方法、装置、计算机设备和存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761484A (zh) * | 2014-01-08 | 2014-04-30 | 腾讯科技(深圳)有限公司 | 一种资源转移管理的方法、装置和系统 |
CN105427169A (zh) * | 2014-09-17 | 2016-03-23 | 中国银联股份有限公司 | 用于资源转移的安全性信息交互方法 |
CN106204003A (zh) * | 2015-04-29 | 2016-12-07 | 阿里巴巴集团控股有限公司 | 虚拟资源的安全转移方法、装置及系统 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002032583A (ja) * | 2000-07-18 | 2002-01-31 | Oki Electric Ind Co Ltd | 入金照合方法及び振込依頼用紙 |
CN103457943B (zh) * | 2013-08-27 | 2016-10-26 | 小米科技有限责任公司 | 数值转移方法、终端、服务器及系统 |
US10540649B2 (en) * | 2014-05-20 | 2020-01-21 | Intellitix Technologies, Inc. | Wearable RFID device for use in an event-based interrogation zone |
CN104951969A (zh) * | 2014-09-01 | 2015-09-30 | 腾讯科技(深圳)有限公司 | 用于虚拟资源转移的数据处理方法和装置 |
CN105631746A (zh) * | 2014-11-03 | 2016-06-01 | 阿里巴巴集团控股有限公司 | 基于计算机系统的网络交易的风险识别方法及其系统 |
CN104537526B (zh) * | 2014-12-23 | 2018-05-18 | 小米科技有限责任公司 | 数值转移的方法、终端及装置 |
CN106097023B (zh) * | 2016-07-01 | 2018-03-27 | 腾讯科技(深圳)有限公司 | 一种数据处理方法及装置 |
-
2017
- 2017-10-27 CN CN201711021959.3A patent/CN107862526B/zh active Active
-
2018
- 2018-02-27 WO PCT/CN2018/077315 patent/WO2019080423A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761484A (zh) * | 2014-01-08 | 2014-04-30 | 腾讯科技(深圳)有限公司 | 一种资源转移管理的方法、装置和系统 |
CN105427169A (zh) * | 2014-09-17 | 2016-03-23 | 中国银联股份有限公司 | 用于资源转移的安全性信息交互方法 |
CN106204003A (zh) * | 2015-04-29 | 2016-12-07 | 阿里巴巴集团控股有限公司 | 虚拟资源的安全转移方法、装置及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN107862526A (zh) | 2018-03-30 |
CN107862526B (zh) | 2020-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019080423A1 (zh) | 资源数值转移方法、装置、存储介质和服务器 | |
US11270306B2 (en) | Asset management method and apparatus, and electronic device | |
US11218325B2 (en) | Asset management method and apparatus, and electronic device | |
US10700861B2 (en) | System and method for generating a recovery key and managing credentials using a smart blockchain contract | |
US20200169547A1 (en) | Authentication method and device, and blockchain-based authentication data processing method and device | |
US10382965B2 (en) | Identity verification using computer-implemented decentralized ledger | |
WO2020087778A1 (zh) | 多系统登录方法、装置、计算机设备和存储介质 | |
US11849051B2 (en) | System and method for off-chain cryptographic transaction verification | |
US20190251075A1 (en) | Asset management method and apparatus, and electronic device | |
TWI667586B (zh) | 用以核對uefi認證變量變化之系統及方法 | |
WO2020073513A1 (zh) | 基于区块链的用户认证方法及终端设备 | |
US11362828B2 (en) | Systems and methods for authenticated communication sessions | |
US11445374B2 (en) | Systems and methods for authenticating a subscriber identity module swap | |
US11930116B2 (en) | Securely communicating service status in a distributed network environment | |
US20190288833A1 (en) | System and Method for Securing Private Keys Behind a Biometric Authentication Gateway | |
WO2019114246A1 (zh) | 一种身份认证方法、服务器及客户端设备 | |
CN109756469B (zh) | 一种公用账号管理方法、装置及计算机可读存储介质 | |
KR101745919B1 (ko) | 패스워드 노출 없는 소프트웨어 방식의 hsm을 이용한 사용자 인증 방법 및 시스템 | |
CN111147235B (zh) | 对象访问方法、装置、电子设备及机器可读存储介质 | |
CN112053159A (zh) | 交易数据验证方法、装置、风险控制服务器及业务服务器 | |
WO2022193494A1 (zh) | 权限控制方法及服务器、终端、存储介质和计算机程序 | |
US11930014B2 (en) | Information security using multi-factor authorization | |
US20230412588A1 (en) | Detecting credentials abuse of cloud compute services | |
US20220038459A1 (en) | Blind authenticator | |
US20240048551A1 (en) | Computer access control using registration and communication secrets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18870549 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 24.09.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18870549 Country of ref document: EP Kind code of ref document: A1 |