CN118333629A - Identity signing method and device for financial transaction and electronic equipment - Google Patents
Identity signing method and device for financial transaction and electronic equipment Download PDFInfo
- Publication number
- CN118333629A CN118333629A CN202410436652.3A CN202410436652A CN118333629A CN 118333629 A CN118333629 A CN 118333629A CN 202410436652 A CN202410436652 A CN 202410436652A CN 118333629 A CN118333629 A CN 118333629A
- Authority
- CN
- China
- Prior art keywords
- verification
- client
- login
- identity
- condition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Marketing (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Development Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses an identity signing method for financial transactions, a device and electronic equipment thereof, which relate to the field of financial science and technology or other related technical fields, wherein the method comprises the following steps: under the condition that a login verification instruction is received, registering the verification instruction to a target application, pushing a login verification notice to a client, wherein the target application is an application for providing an associated identity verification protocol in a financial institution running a financial application APP, under the condition that login verification information fed back by the client is received, performing identity verification operation by adopting a preset token verification function, wherein the preset token verification function is used for generating a random code through a preconfigured development kit, and performing identity verification by utilizing the random code; and entering a financial transaction page under the condition that the identity verification of the client is completed. The invention solves the technical problem that the hardware aging can cause the signature verification failure when the personal internet banking function of the financial institution can not verify the signature through the cipher device in the related technology.
Description
Technical Field
The invention relates to the field of financial science and technology or other related fields, in particular to an identity verification method for financial transactions, a device and electronic equipment thereof.
Background
Currently, the online banking function (i.e., personal online banking) pushed by a financial institution is divided into a static password signature verification mode, a small-amount transfer OTP signature verification mode (i.e., a one-time short message verification code) and a cipher signature verification mode, which are all closed loops in the online banking. The security degree of the cipher device signature verification is highest, but the cipher device hardware is dependent on the client, the signature verification failure is caused by the aging of the hardware, and the situation that the cipher device cannot verify the signature and the client transaction fails occurs in the production environment. The static password signature verification mode uses a login password for verification, and if the login password is stolen, the password is not provided with the function of a second defense line, and is only used for partial transactions with lower safety requirements, so that safety guarantee cannot be provided for left and right transactions. The OTP signature verification for small amount transfer is convenient, but only short message verification codes are verified, the security level is inferior to that of a cipher device, and the security level cannot provide guarantee for transactions with higher security requirements. Meanwhile, a part of customers without ciphers can exist in the production environment, and the customers cannot make important transactions requiring the ciphers to check labels through the personal online banking, so that the financial service support rate is low, and the convenience of the online banking is reduced.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides an identity signing method for financial transactions, a device thereof and electronic equipment, which at least solve the technical problem that hardware aging can cause signing failure when personal internet banking functions of financial institutions cannot verify signing through a cipher in the related art.
According to an aspect of an embodiment of the present invention, there is provided an identity verification method for a financial transaction, including: under the condition that a login verification instruction is received, registering the verification instruction to a target application, and pushing a login verification notice to a client, wherein the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct predetermined financial transactions, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP; under the condition that login signature verification information fed back by the client is received, carrying out identity signature verification operation by adopting a preset token signature verification function, wherein the preset token signature verification function is used for generating a random code through a pre-configured development kit, and carrying out identity signature verification by utilizing the random code; and entering a financial transaction page under the condition that the identity verification of the client is completed.
Optionally, the step of pushing the login signature verification notification to the client includes: calling a preset protocol interface, and pushing a login signature verification notification to the client through the preset protocol interface; or pushing a signature verification graphic code to a webpage on which a customer logs in, and pushing a graphic code signature verification notice to the customer side, wherein the signature verification graphic code comprises login signature verification information of the customer before a predetermined financial transaction is carried out.
Optionally, after pushing the login verification notification to the client through the preset protocol interface, the method further includes: monitoring whether the client feeds back a signature verification operation or not; under the condition that the client-side feedback signature verification operation is monitored, analyzing the signature verification operation to obtain client login information; and generating the login verification information under the condition that the client login information meets the first login requirement.
Optionally, after pushing the graphic code label verification notification to the client, the method further includes: inquiring whether graphic code scanning information provided by the client is received or not under the condition that the login signature verification notification is the graphic code signature verification notification; under the condition that the query result indicates that the graphic code scanning information provided by the client is received, analyzing the graphic code scanning information to obtain login verification information; and generating the login verification information under the condition that the login verification information meets the second login requirement.
Optionally, the step of performing identity verification operation by adopting a preset token verification function includes: under the condition that the client is confirmed to open the preset token verification function, calling the development kit which is pre-configured, and generating a random code by the development kit; verifying the random code fed back by the client; and under the condition that the random code passes verification, confirming that the identity verification of the client passes.
Optionally, after the identity verification operation is performed by adopting the preset token verification function, the method further comprises: and calling the target application under the condition that the identity verification passes, and updating the instruction state of the verification instruction registered in the target application to be finished.
Optionally, after the identity verification operation is performed by adopting the preset token verification function, the method further comprises: receiving a polling inquiry command of a check page, wherein the polling inquiry command is used for inquiring the command state of the check command every preset time interval; under the condition that the customer identity verification passes, confirming that the instruction state is finished; and feeding back the instruction state of the signature verification instruction to the client as completed.
According to another aspect of the embodiments of the present invention, there is also provided an identity verification device for financial transactions, including: the system comprises an instruction registration unit, a target application and a client, wherein the instruction registration unit is used for registering a verification instruction to the target application and pushing a login verification notice to the client under the condition of receiving a login verification instruction, the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct a preset financial transaction, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP; the identity verification unit is used for carrying out identity verification operation by adopting a preset token verification function under the condition of receiving login verification information fed back by the client, wherein the preset token verification function is used for generating a random code through a pre-configured development kit and carrying out identity verification by utilizing the random code; and the transaction entering unit is used for entering a financial transaction page under the condition that the identity verification of the customer is completed.
Optionally, the instruction registration unit, when pushing the login verification notification to the client, includes: the first calling module is used for calling a preset protocol interface and pushing a login signature verification notification to the client through the preset protocol interface; and the graphic code pushing module is used for pushing the signature verification graphic code to a webpage which is logged in by the client and pushing the graphic code signature verification notification to the client, wherein the signature verification graphic code comprises login signature verification information before the client performs the predetermined financial transaction.
Optionally, the identity verification device for financial transaction further comprises: the monitoring unit is used for monitoring whether the client feeds back a signature verification operation or not after pushing a login signature verification notification to the client through the preset protocol interface; the operation analysis unit is used for analyzing the signature verification operation to obtain client login information under the condition that the signature verification operation fed back by the client is monitored; the first generation unit is used for generating the login verification information under the condition that the client login information accords with a first login requirement.
Optionally, the identity verification device for financial transaction further comprises: the information inquiry unit is used for inquiring whether the graphic code scanning information provided by the client is received or not under the condition that the login and signature verification notification is the graphic code signature verification notification after pushing the graphic code signature verification notification to the client; the information analysis unit is used for analyzing the graphic code scanning information to obtain login signature verification information under the condition that the query result indicates that the graphic code scanning information provided by the client is received; and the second generation unit is used for generating the login verification information under the condition that the login verification information meets a second login requirement.
Optionally, the identity verification unit comprises: the second calling module is used for calling the pre-configured development kit and generating a random code by the development kit under the condition that the client is confirmed to have opened the preset token verification function; verifying the random code fed back by the client; and the confirmation module is used for confirming that the identity verification of the client passes under the condition that the random code passes verification.
Optionally, the identity verification device for financial transaction further comprises: and the state updating unit is used for calling the target application under the condition that the identity verification passes after the identity verification operation is carried out by adopting a preset token verification function, and updating the instruction state of the verification instruction registered in the target application to be finished.
Optionally, the identity verification device for financial transaction further comprises: the instruction receiving unit is used for receiving a polling inquiry instruction of the check page after the identity check operation is carried out by adopting a preset token check function, wherein the polling inquiry instruction is used for inquiring the instruction state of the check instruction every preset time; the state confirmation unit is used for confirming that the instruction state is completed under the condition that the customer identity verification passes; and the state feedback unit is used for feeding back the instruction state of the signature verification instruction to the client to be finished.
According to another aspect of the embodiment of the present invention, there is also provided a computer readable storage medium, where the computer readable storage medium includes a stored computer program, and when the computer program runs, controls a device where the computer readable storage medium is located to execute the identity verification method for financial transaction of any one of the above.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device including one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the identity verification method for financial transactions of any of the above.
According to another aspect of embodiments of the present invention, there is also provided a computer program product comprising a computer program, characterized in that the computer program when executed by a processor implements the steps of the identity verification method for financial transactions as described in any one of the above.
Under the condition that a login verification instruction is received, registering the verification instruction to a target application, and pushing a login verification notice to a client, wherein the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct predetermined financial transactions, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP; under the condition that login signature verification information fed back by a client is received, carrying out identity signature verification operation by adopting a preset token signature verification function, wherein the preset token signature verification function is used for generating a random code through a pre-configured development kit, and carrying out identity signature verification by utilizing the random code; and entering a financial transaction page under the condition that the identity verification of the client is completed.
In the method, when an individual performs online banking and signature verification, a customer can realize identity signature verification through the mobile terminal which is used by the customer, the mobile terminal is used as a cipher device, under the condition that login signature verification information fed back by the customer is received, the identity signature verification operation can be completed through a preset token signature verification function, the cipher device is not required to be carried with for identity signature verification, convenience is greatly improved, meanwhile, because a communication bridge of two channels of internet and a financial application APP of the mobile terminal is based on intranet target application service provided by an internal system of a financial institution, safety is not reduced, balance and optimization of safety and usability are realized, and therefore the technical problem that signature verification failure is caused by hardware aging when personal online banking functions of the financial institution cannot be verified through the cipher device in the related technology is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a flow chart of an alternative method of authenticating a financial transaction according to an embodiment of the present invention;
FIG. 2 is a schematic illustration of an alternative customer using a personal online banking for identity verification outside of a country in accordance with an embodiment of the present invention;
FIG. 3 is a schematic illustration of an alternative customer using a personal online banking for identity verification outside of a country in accordance with an embodiment of the present invention;
FIG. 4 is a schematic diagram of an alternative identity verification device for use in financial transactions in accordance with an embodiment of the present invention;
Fig. 5 is a block diagram of a hardware architecture of an electronic device (or mobile device) for an identity verification method for financial transactions according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
To facilitate an understanding of the invention by those skilled in the art, some terms or nouns involved in the various embodiments of the invention are explained below:
The invention relates to a Soft Token label-checking, namely a Soft Token label-checking, which is a label-checking mode suitable for personal financial application APP of financial institutions and a label-checking process for transactions by using personal online banking of financial institutions, wherein the specific process for checking labels by using the personal financial application APP comprises the following steps: after a client inputs a password appointed when opening a Soft Token, a tool kit generates a random code (with timeliness limitation) and submits the random code to a Soft Token verification server at the background, and the server judges whether the verification signature passes or not. Of course, the Soft Token signature verification in the invention refers to the identity signature verification concept, and also refers to the process of performing identity verification for a client by using a Soft Token signature verification process in a mobile terminal in a cross-channel manner when a personal internet banking is used for transaction signature verification by a gold thawing mechanism.
OEBB application, namely F-OEBB application, is a financial institution internal application for individual customers outside financial institutions, provides management functions of e-banking such as account management and related agreement signing, authentication media management and issuing, channel quota management, channel preference, equipment binding and the like, can only be accessed in the internal network of the financial institutions, and plays a role of an intermediate bridge in a Soft Token label verification process of cross-network banking/mobile phone banking channels.
The service, through the micro-service realized by F-OEBB, different services can provide different business functions, and only the financial institution intranet can access.
User interactions, UC for short, refers to use cases describing interactions between a user and a system, including how the user interacts with the system to achieve a particular function or task.
The application trading service, abbreviated as ATS, refers to an electronic trading platform for trading securities and other financial assets. ATS allows buyers and sellers to transact directly, providing a faster and more convenient transaction experience.
An application component service App l icat ion Component Services, ACS for short, is a service that provides a series of reusable components and services for an application program, including functions such as data access, security management, logging, error handling, etc.
Business object services, abbreviated as BOS, refer to services that provide business object management and processing for an enterprise. They are typically used to assist businesses in managing and processing business objects, such as customers, products, orders, and the like.
It should be noted that, the identity verification method and the device thereof for financial transaction in the present disclosure may be used in the case that the financial technology field realizes the verification of the identity of the customer when the customer operates the financial transaction business across channels, and may also be used in any field other than the financial technology field to realize the verification of the identity of the customer when the customer operates the financial transaction business across channels, and the application field of the identity verification method and the device thereof for financial transaction in the present disclosure is not limited.
It should be noted that, the information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, displayed data, etc.) collected by the present disclosure are information and data authorized by the user or sufficiently authorized by each party, and the relevant data are collected, stored, used, processed, transmitted, provided, disclosed, applied, etc. processed, all comply with relevant laws and regulations and standards of relevant areas, necessary security measures are taken, no prejudice to public order, and corresponding operation entries are provided for the user to select authorization or rejection. For example, an interface is provided between the system and the relevant user or institution, before acquiring the relevant information, the system needs to send an acquisition request to the user or institution through the interface, and acquire the relevant information after receiving the consent information fed back by the user or institution.
It should be noted that, in the present disclosure, customer information is collected, customer information is analyzed, and a corresponding operation entry is provided for a user, so that the user can choose to agree or reject an automated decision result; if the user selects refusal, the expert decision flow is entered.
The following embodiments of the invention are applicable to a variety of systems/applications/devices for identity verification of financial transactions. Aiming at the defect that in the prior art, when personal online banking identity tag verification is carried out, a cipher device can be invalid due to aging, so that tag verification transaction cannot be completed, the identity tag verification scheme provided by the invention has the advantages that when a client personally carries out online banking tag verification, the mobile terminal of the client personally can serve as the function of the cipher device, and convenience is greatly improved. Meanwhile, because the communication bridge of the two channels of the cross-network and the mobile phone bank is based on the intranet service provided by the internal system of the financial institution, the safety is not reduced, and the balance and the optimization of safety and easy use are realized.
The invention considers that the existing Soft Token product is divided into a front end and a rear end, the rear end is provided with a special signature verification server, and the front end is integrated in the financial application APP of the mobile terminal, so that the Soft Token cannot be directly put into an online bank for use. Therefore, the signing verification instruction of the personal network is required to be recorded in an internal database of a financial institution through a secure channel (intranet of the financial institution), then enters into a function (hereinafter referred to as mobile phone authorized transaction) of the mobile terminal for signing the internet banking transaction through a customer owner/passive mode, the mobile terminal completes the signing verification link, the signing verification result is still recorded in the internal database, and finally the personal network can read the state of the signing verification instruction in the internal database to acquire whether the customer signing verification is completed or not, and whether the customer signing passes or not is equivalent to the signing verification of the personal network transaction.
The method includes the steps that a customer actively and passively enters into an authorized transaction mode of the mobile terminal, the method is divided into three modes of clicking a financial application APP column of the mobile terminal by the customer, clicking a signature verification notification message (displayed in a mobile phone message column) sent to the customer by a financial institution, and scanning a signature verification graphic code displayed by a code scanning internet bank by a code scanning function of the financial application APP of the mobile terminal, usability is fully considered on the premise of ensuring safety, and overall experience of the internet bank signature verification pushed by the financial institution is optimized.
The present invention will be described in detail with reference to the following examples.
Example 1
In accordance with an embodiment of the present invention, there is provided an embodiment of an identity verification method for financial transactions, it being noted that the steps illustrated in the flowchart of the figures may be performed in a computer system, such as a set of computer executable instructions, and, although a logical sequence is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in a different order than that illustrated herein.
FIG. 1 is a flow chart of an alternative method of verifying identity for a financial transaction, as shown in FIG. 1, according to an embodiment of the present invention, the method comprising the steps of:
step S101, under the condition that a login verification instruction is received, registering the verification instruction to a target application, and pushing a login verification notice to a client, wherein the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct predetermined financial transactions, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP.
Step S102, under the condition that login signature verification information fed back by a client is received, an identity signature verification operation is performed by adopting a preset token signature verification function, wherein the preset token signature verification function is used for generating a random code through a pre-configured development kit, and the identity signature verification is performed by utilizing the random code.
Step S103, entering a financial transaction page under the condition that the identity verification of the customer is completed.
Through the steps, under the condition that a login verification instruction is received, registering the verification instruction to a target application, and pushing a login verification notice to a client, wherein the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct predetermined financial transactions, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP; under the condition that login signature verification information fed back by a client is received, identity signature verification operation is carried out by adopting a preset token signature verification function, the preset token signature verification function is used for generating a random code through a pre-configured development kit, the random code is utilized for carrying out identity signature verification, and under the condition that identity signature verification of a client is completed, a financial transaction page is entered. In this embodiment, when a customer performs online banking and signature verification, the customer can use his mobile terminal as a cipher device, and under the condition of receiving login and signature verification information fed back by the customer, the identity signature verification operation can be completed through the preset token signature verification function, the cipher device is not required to be carried with the customer to perform the identity signature verification, so that convenience is greatly improved.
The embodiment can be applied to a system or equipment for carrying out identity verification on cross-channel financial transactions of various financial institutions. The implementation subject that relates to includes: the customer (the financial transaction service is operated through the mobile terminal, the financial application APP is installed in the mobile terminal), the overseas personal banking, the overseas personal financial application APP and the application transaction service ATS. Of course, the system for performing identity verification on cross-channel financial transactions provided in this embodiment may be equally applicable to a user interaction UC system, an application component service ACS system, and a business object service BOS system.
Embodiments of the present invention will be described in detail with reference to the following steps.
Step S101, under the condition that a login verification instruction is received, registering the verification instruction to a target application, and pushing a login verification notification to a client.
The login verification instruction refers to a verification instruction generated before a client logs in a financial application APP across channels to conduct predetermined financial transactions, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP.
It should be noted that, the cross-channel login mentioned in this embodiment may refer to that the client realizes the operation of the financial transaction service through the overseas personal internet banking, or that the client realizes the login and the identity verification through the overseas personal financial application APP. Foreign personal internet banking may refer to personal internet banking that may be used outside of a country in an overseas area. Personal online banking pushed by a financial institution can comprise an intranet and an extranet, identity verification is convenient when the personal online banking is used in the environment, and when the personal online banking is used in the outside environment, the personal online banking is required to be used in the prior art, and the technical scheme provided by the embodiment is that the personal online banking is logged in through an extranet application APP installed in a mobile terminal, and then identity verification and subsequent financial transactions are carried out across channels.
Optionally, the transaction types of the predetermined financial transaction mentioned in this embodiment include, but are not limited to: transfer, remittance, loan, purchase of funds, checkout, and the like. The present embodiment is not limited to a specific predetermined financial transaction.
In this embodiment, the customer may log in the foreign personal internet banking to perform the predetermined financial transaction such as transfer, and then determine that the customer has opened the Soft Token signature verification mode and the service switch is opened, and use the Soft Token to perform verification.
The target application mentioned in this embodiment may refer to an application characterized by OEBB applications. Optionally, the step of pushing the login signature verification notification to the client includes: calling a preset protocol interface, and pushing a login verification notice to the client through the preset protocol interface; or pushing a signature verification graphic code to a page of a webpage logged in by the client and pushing a graphic code signature verification notification to the client, wherein the signature verification graphic code comprises login signature verification information of the client before the client performs the predetermined financial transaction.
It should be noted that, the embodiment provides two signature verification modes, the first is a push signature verification mode, that is, the personal internet banking will execute push login signature verification notification after invoking signature verification instruction registration service; the second mode is a graphic code signature verification mode, namely, after logging in and calling a signature verification instruction registration service, a message is not pushed, but a graphic code is generated on a webpage, and after the graphic code is scanned by a financial application APP, the financial application APP can enter ST signature verification transaction of a mobile phone bank like the push signature verification mode.
For the first signature verification mode, the push signature verification mode, a schematic description is provided below.
In this embodiment, when it is determined that the Soft Token signature verification mode is turned on and the service switch is turned on, the Soft Token is used for verification, the signature verification instruction is registered to the template application, and the preset protocol interface is called to push the login signature verification notification to the client through the preset protocol interface, for example, the login signature verification notification is pushed to the client mobile banking client through the F-MIMS interface.
Optionally, after pushing the login verification notification to the client through the preset protocol interface, the method further includes: monitoring whether the client feeds back the label checking operation; under the condition that the feedback signature verification operation of the client is monitored, analyzing the signature verification operation to obtain client login information; and generating login verification information under the condition that the client login information meets the first login requirement.
After receiving the login signature verification notification, the client informs the client of the need of signature verification operation in the modes of notification ringtone, notification bright screen, notification short message and the like, and after receiving the login signature verification notification of the client, the client can click the notification to start the financial application APP of the client through the client (such as a mobile terminal) to inquire the instruction to be signed. Under the condition that the feedback signature verification operation of the client is monitored, the signature verification operation is analyzed to obtain client login information, and under the condition that the client login information meets the first login requirement, the login signature verification information is generated.
The second signature verification mode, the graphic code signature verification mode, is schematically described below.
It should be noted that, the types of the graphic codes mentioned in this embodiment may include, but are not limited to: one-dimensional codes, two-dimensional codes, and other multi-dimensional codes, the two-dimensional codes are used for schematic illustration in the invention.
Optionally, after pushing the graphic code label verification notification to the client, the method further includes: under the condition that the login signature verification notification is a graphic code signature verification notification, inquiring whether graphic code scanning information provided by a client is received or not; under the condition that the query result indicates that graphic code scanning information provided by the client is received, the graphic code scanning information is analyzed to obtain login signature verification information; and generating the login verification information under the condition that the login verification information meets the second login requirement.
The graphic code label checking does not push a message after logging in and calling a label checking instruction registration service, but generates a graphic code on a webpage, and the graphic code can enter the ST label checking transaction of the financial application APP like a push label checking mode after being scanned by the financial application APP.
For example, a client starts a mobile phone banking client to scan a two-dimension code of a webpage by using a scanning function, automatically enters a 'mobile security code authorization' transaction after identifying the two-dimension code as a signature verification, and inquires an instruction to be signed.
Step S102, under the condition that login signature verification information fed back by a client is received, an identity signature verification operation is performed by adopting a preset token signature verification function, wherein the preset token signature verification function is used for generating a random code through a pre-configured development kit, and the identity signature verification is performed by utilizing the random code.
Optionally, the step of performing identity verification operation by adopting a preset token verification function includes: under the condition that the client is confirmed to have opened a preset token signature verification function, calling a pre-configured development kit, and generating a random code by the development kit; verifying the random code fed back by the client; and under the condition that the random code passes verification, confirming that the identity verification of the client passes.
In order to replace the identity verification mode performed by the cipher device, the embodiment adopts a preset Token verification function Soft Token mode, after the preset Token verification function Soft Token mode is opened, a development kit SDK can be called, a random code is generated by the development kit, and then the random code fed back by the client is verified. And under the condition that the random code passes verification, confirming that the identity verification of the client passes.
Optionally, after the identity verification operation is performed by adopting the preset token verification function, the method further comprises: and under the condition that the identity verification passes, calling the target application, and updating the instruction state of the verification instruction registered in the target application to be finished.
Optionally, after the identity verification operation is performed by adopting the preset token verification function, the method further comprises: receiving a polling inquiry command of the check page, wherein the polling inquiry command is used for inquiring the command state of the check command every interval of a preset time length; under the condition that the customer identity verification passes, confirming that the instruction state is finished; and feeding back the instruction state of the signature verification instruction to the client side to be completed.
In this embodiment, a polling function is provided on the individual web check page, and the client is prompted by polling the status of the check instruction if the status is completed, and if the status is overtime. This is because the Soft Token signature verification method has a time limit, and the random code generated by the development kit sdk needs to be polled and queried, and if the time limit is exceeded, the signature verification process needs to be performed again.
Step S103, entering a financial transaction page under the condition that the identity verification of the customer is completed.
Through the embodiment, the personal online banking signature verification can be realized through the intranet service of the financial institution, and the client can serve as a cipher device by using the client/mobile terminal (for example, a mobile phone), so that convenience is greatly improved.
The following detailed description is directed to alternative embodiments.
FIG. 2 is a schematic diagram of an alternative customer using a personal online banking outside the country for identity verification, as shown in FIG. 2, providing a customer using a Soft Token verification-message push mode outside the country on a personal online banking.
As shown in fig. 2, the specific identity verification step includes:
(1) The customer logs in to the foreign personal online banking to enter into transactions such as transfer and remittance.
(2) And (3) transferring money and checking a signature, judging that the client has opened a Soft Token signature checking mode, and if a business switch is opened, using the Soft Token to verify, registering a signature checking instruction to OEBB application, and simultaneously calling an F-MIMS interface to push a message to a client of a mobile phone bank.
(3) The client starts the mobile banking client to automatically enter a 'mobile security code authorization' transaction by clicking a message on the mobile phone to inquire an instruction to be checked.
(4) Judging whether the client opens the Soft Token, if so, carrying out Soft Token verification according to stock logic, and calling OEBB a service update verification instruction to be verified after the verification is passed.
(5) And the personal network signature verification page polls, inquires and verifies the signature command state, and enters the next step if the signature command state is completed. If the time is out, the client is prompted.
(6) Between the transfer remittance check-in check-out instruction registration services illustrated in fig. 2, a customer selection check-out mode flow is omitted, and a customer can select a stock cipher check-out (the cross-channel check-out is not involved), or a Soft Token push check-out or a Soft Token two-dimensional code check-out is omitted.
In this embodiment, the difference between the message pushing mode and the two-dimensional code label checking mode is that in the pushing mode, the personal internet banking will execute the step of pushing the message after invoking the label checking instruction registration service (the specific pushing function is implemented by the networking application of the financial institution), while the two-dimensional code label checking does not push the message after logging in and invoking the label checking instruction registration service, but generates a two-dimensional code on the web page, and the mobile phone bank can enter the ST label checking transaction of the mobile phone bank like the pushing label checking mode after scanning the two-dimensional code.
Fig. 3 is a schematic diagram of an alternative customer using a personal internet banking for identity verification outside the country according to an embodiment of the present invention, and as shown in fig. 3, a customer using a Soft Token verification-two-dimensional code verification mode outside the country is provided.
As shown in fig. 3, the specific identity verification step includes:
(1) The customer logs in to the foreign personal online banking to enter into transactions such as transfer and remittance.
(2) And (3) transferring money and checking a signature, judging that the client has opened a Soft Token signature checking mode, and if a business switch is opened, using the Soft Token to verify, registering a signature checking instruction to OEBB application, and displaying a two-dimensional code on a page to prompt the client to scan by a mobile banking client for the next step.
(3) The client starts the mobile phone banking client to scan the two-dimension code of the web page by using the scanning function, automatically enters the mobile security code authorization transaction after identifying the two-dimension code as the signature checking two-dimension code, and inquires the instruction to be checked.
(4) And starting the client to scan the code to enter ST label checking transaction. Judging whether the client opens the Soft Token, if so, carrying out Soft Token verification according to stock logic, and calling OEBB a service update verification instruction to be verified after the verification is passed.
In this embodiment, a polling function is provided on the individual web check page, and the client is prompted by polling the status of the check instruction if the status is completed, and if the status is overtime. Because of the Soft Token signature verification method, the random code generated by the development kit sdk has time limit, so that the query needs to be polled, and if the time limit is exceeded, the signature verification process needs to be carried out again.
Through the embodiment, the invention solves the defects of personal online banking transaction signature verification of the financial institutions in the prior art: the cryptographic device may fail due to aging, and since the cryptographic device is a separate hardware device, it is not always carried around by the customer, resulting in a transaction requiring verification of the signature being difficult to complete. The embodiment of the invention provides a new identity label checking mode, and when personal online banking label checking is carried out, a customer realizes cross-channel identity label checking through the function of taking a mobile terminal as a cipher device, thereby greatly improving convenience. Meanwhile, because the communication bridge of the two channels of the cross-network and the mobile phone bank is based on the intranet service provided by the internal system of the financial institution, the safety is not reduced, and the balance and the optimization of safety and easy use are realized.
The following describes in detail another embodiment.
Example two
An identity verification device for financial transactions provided in this embodiment includes a plurality of implementation units, each implementation unit corresponding to each implementation step in the first embodiment.
FIG. 4 is a schematic diagram of an alternative identity verification device for financial transactions, as shown in FIG. 4, according to an embodiment of the present invention, which may include: an instruction registration unit 41, an identity verification unit 42, a transaction entry unit 43.
The instruction registration unit 41 is configured to register a sign-on verification instruction to a target application and push a sign-on verification notification to a client when receiving a sign-on verification instruction, where the sign-on verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to perform a predetermined financial transaction, and the target application is an application that provides an associated identity sign-on verification protocol inside a financial institution running the financial application APP.
The identity verification unit 42 is configured to perform identity verification operation by adopting a preset token verification function under the condition that login verification information fed back by the client is received, where the preset token verification function is configured to generate a random code through a pre-configured development kit, and perform identity verification by using the random code.
The transaction entering unit 43 is configured to enter a financial transaction page when the identity verification of the customer has been completed.
The above-mentioned identity verification device for financial transaction can register the verification instruction to the target application through the instruction registration unit 41 under the condition of receiving the login verification instruction, and push the login verification notification to the client, wherein the login verification instruction is a verification instruction generated before the client logs in the financial application APP across channels to perform the predetermined financial transaction, the target application provides an application of an associated identity verification protocol for the inside of a financial institution running the financial application APP, and performs identity verification operation through the identity verification unit 42 under the condition of receiving the login verification information fed back by the client, and adopts a preset token verification function, wherein the preset token verification function is used for generating a random code through a preconfigured development kit, performing identity verification by using the random code, and entering a financial transaction page through the transaction entry unit 43 under the condition that the identity verification of the client is completed. In the embodiment, when a customer personally performs online banking and signature verification, the mobile terminal of the customer personally can serve as a cipher device, under the condition that login and signature verification information fed back by the customer end is received, identity signature verification operation can be completed through a preset token signature verification function, the cipher device is not required to be carried with the customer personally for carrying out identity signature verification, convenience is greatly improved, meanwhile, the safety is not reduced due to the communication bridge of two channels of internet Application (APP) of a cross-internet and mobile terminal, and balance and optimization of safety and usability are achieved based on intranet target application service provided by an internal system of a financial institution, so that the technical problem that signature verification failure is caused by hardware aging when the personal online banking function of the financial institution passes through the cipher device in the related art is solved.
Optionally, the instruction registration unit, when pushing the login verification notification to the client, includes: the first calling module is used for calling a preset protocol interface and pushing a login signature verification notification to the client through the preset protocol interface; the graphic code pushing module is used for pushing the signature verification graphic code to the page of the webpage logged in by the client and pushing the graphic code signature verification notification to the client, wherein the signature verification graphic code comprises login signature verification information before the client performs the predetermined financial transaction.
Optionally, the identity verification device for financial transaction further comprises: the monitoring unit is used for monitoring whether the client feeds back the signature verification operation or not after pushing the login signature verification notification to the client through a preset protocol interface; the operation analysis unit is used for analyzing the signature verification operation to obtain client login information under the condition that the feedback signature verification operation of the client is monitored; the first generation unit is used for generating login verification information under the condition that the client login information meets the first login requirement.
Optionally, the identity verification device for financial transaction further comprises: the information inquiry unit is used for inquiring whether the graphic code scanning information provided by the client is received or not under the condition that the login and signature verification notification is the graphic code signature verification notification after pushing the graphic code signature verification notification to the client; the information analysis unit is used for analyzing the graphic code scanning information to obtain login signature verification information under the condition that the query result indicates that the graphic code scanning information provided by the client is received; the second generating unit is used for generating login verification information under the condition that the login verification information meets a second login requirement.
Optionally, the identity verification unit comprises: the second calling module is used for calling a pre-configured development kit under the condition that the client is confirmed to have opened a preset token signature verification function, and generating a random code by the development kit; verifying the random code fed back by the client; and the confirmation module is used for confirming that the identity verification of the client passes under the condition that the random code passes verification.
Optionally, the identity verification device for financial transaction further comprises: and the state updating unit is used for calling the target application under the condition that the identity verification passes after the identity verification operation is carried out by adopting the preset token verification function, and updating the instruction state of the verification instruction registered in the target application to be finished.
Optionally, the identity verification device for financial transaction further comprises: the instruction receiving unit is used for receiving a polling inquiry instruction of the check page after the identity check operation is carried out by adopting a preset token check function, wherein the polling inquiry instruction is used for inquiring the instruction state of the check instruction every preset time; the state confirmation unit is used for confirming that the instruction state is completed under the condition that the customer identity verification passes; and the state feedback unit is used for feeding back the instruction state of the signature verification instruction to the client to be finished.
The above-mentioned identification tag device for financial transaction may further include a processor and a memory, the above-mentioned instruction registration unit 41, identification tag unit 42, transaction entry unit 43, etc. are stored in the memory as program units, and the processor executes the above-mentioned program units stored in the memory to realize the corresponding functions.
The processor includes a kernel, and the kernel fetches a corresponding program unit from the memory. The kernel can be provided with one or more than one, and the cross-channel customer identity label checking function is realized by adjusting kernel parameters.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (f-ash RAM), and the memory includes at least one memory chip.
According to another aspect of the embodiments of the present invention, there is also provided a computer readable storage medium, the computer readable storage medium including a stored computer program, wherein the computer readable storage medium is controlled to execute the identity verification method for financial transactions according to any one of the above embodiments when the computer program is run.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device including one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the authentication method for financial transactions of any of the above embodiments.
The present application also provides a computer program product comprising a computer program which when executed by a processor performs the steps of the identity verification method for financial transactions of the various embodiments of the present application comprising: under the condition that a login verification instruction is received, registering the verification instruction to a target application, and pushing a login verification notice to a client, wherein the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct predetermined financial transactions, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP; under the condition that login signature verification information fed back by a client is received, carrying out identity signature verification operation by adopting a preset token signature verification function, wherein the preset token signature verification function is used for generating a random code through a pre-configured development kit, and carrying out identity signature verification by utilizing the random code; and entering a financial transaction page under the condition that the identity verification of the client is completed.
The present application also provides a computer program product comprising a non-volatile computer readable storage medium storing a computer program which when executed by a processor implements the steps of the identity verification method for financial transactions described in various embodiments of the application.
Fig. 5 is a block diagram of a hardware architecture of an electronic device (or mobile device) for an identity verification method for financial transactions according to an embodiment of the present invention. As shown in fig. 5, the electronic device may include one or more processors 502 (shown in fig. 5 as 502a, 502b, … …,502 n) (the processor 502 may include, but is not limited to, a microprocessor MCU, a programmable logic device FPGA, etc.) a memory 504 for storing data. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a keyboard, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 5 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the electronic device may also include more or fewer components than shown in FIG. 5, or have a different configuration than shown in FIG. 5.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a Read-only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.
Claims (10)
1. An identity verification method for a financial transaction, comprising:
Under the condition that a login verification instruction is received, registering the verification instruction to a target application, and pushing a login verification notice to a client, wherein the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct predetermined financial transactions, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP;
Under the condition that login signature verification information fed back by the client is received, carrying out identity signature verification operation by adopting a preset token signature verification function, wherein the preset token signature verification function is used for generating a random code through a pre-configured development kit, and carrying out identity signature verification by utilizing the random code;
And entering a financial transaction page under the condition that the identity verification of the client is completed.
2. The identity verification method of claim 1, wherein the step of pushing the login verification notification to the client comprises:
calling a preset protocol interface, and pushing a login signature verification notification to the client through the preset protocol interface; or alternatively
And pushing a signature verification graphic code to a webpage on which a customer logs in, and pushing a graphic code signature verification notice to the customer side, wherein the signature verification graphic code comprises login signature verification information of the customer before a predetermined financial transaction is carried out.
3. The identity verification method according to claim 2, further comprising, after pushing a login verification notification to the client through the preset protocol interface:
monitoring whether the client feeds back a signature verification operation or not;
under the condition that the client-side feedback signature verification operation is monitored, analyzing the signature verification operation to obtain client login information;
and generating the login verification information under the condition that the client login information meets the first login requirement.
4. The method for verifying identity according to claim 2, further comprising, after pushing a graphic code verification notification to the client:
inquiring whether graphic code scanning information provided by the client is received or not under the condition that the login signature verification notification is the graphic code signature verification notification;
Under the condition that the query result indicates that the graphic code scanning information provided by the client is received, analyzing the graphic code scanning information to obtain login verification information;
And generating the login verification information under the condition that the login verification information meets the second login requirement.
5. The identity verification method according to claim 1, wherein the step of performing the identity verification operation using a preset token verification function includes:
Under the condition that the client is confirmed to open the preset token verification function, calling the development kit which is pre-configured, and generating a random code by the development kit;
Verifying the random code fed back by the client;
and under the condition that the random code passes verification, confirming that the identity verification of the client passes.
6. The identity verification method according to claim 1, further comprising, after the identity verification operation using the preset token verification function:
and calling the target application under the condition that the identity verification passes, and updating the instruction state of the verification instruction registered in the target application to be finished.
7. The identity verification method according to claim 1, further comprising, after the identity verification operation using the preset token verification function:
Receiving a polling inquiry command of a check page, wherein the polling inquiry command is used for inquiring the command state of the check command every preset time interval;
Under the condition that the customer identity verification passes, confirming that the instruction state is finished;
and feeding back the instruction state of the signature verification instruction to the client as completed.
8. An identity verification device for financial transactions, comprising:
The system comprises an instruction registration unit, a target application and a client, wherein the instruction registration unit is used for registering a verification instruction to the target application and pushing a login verification notice to the client under the condition of receiving a login verification instruction, the login verification instruction is a verification instruction generated before a client logs in a financial application APP across channels to conduct a preset financial transaction, and the target application is an application for providing an associated identity verification protocol inside a financial institution running the financial application APP;
The identity verification unit is used for carrying out identity verification operation by adopting a preset token verification function under the condition of receiving login verification information fed back by the client, wherein the preset token verification function is used for generating a random code through a pre-configured development kit and carrying out identity verification by utilizing the random code;
and the transaction entering unit is used for entering a financial transaction page under the condition that the identity verification of the customer is completed.
9. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program, when run, controls a device in which the computer readable storage medium is located to perform the identity verification method for financial transactions according to any one of claims 1 to 7.
10. An electronic device comprising one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the identity verification method for financial transactions of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410436652.3A CN118333629A (en) | 2024-04-11 | 2024-04-11 | Identity signing method and device for financial transaction and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410436652.3A CN118333629A (en) | 2024-04-11 | 2024-04-11 | Identity signing method and device for financial transaction and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118333629A true CN118333629A (en) | 2024-07-12 |
Family
ID=91763536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410436652.3A Pending CN118333629A (en) | 2024-04-11 | 2024-04-11 | Identity signing method and device for financial transaction and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118333629A (en) |
-
2024
- 2024-04-11 CN CN202410436652.3A patent/CN118333629A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230230055A1 (en) | Processing a payment, by a secure computing system, from a payer to a payee operating a merchant computing system | |
US20210374733A1 (en) | Multi-signature verification network | |
KR101952498B1 (en) | Loan service providing method using black chain and system performing the same | |
US12026704B2 (en) | System and method for assessing a digital interaction with a digital third party account service | |
JP6046765B2 (en) | System and method enabling multi-party and multi-level authorization to access confidential information | |
CN111164632A (en) | Information processing method and device based on block chain and block chain network | |
JP6632717B2 (en) | Financial transaction management system, financial transaction management method and server | |
KR102069002B1 (en) | History management method, apparatus and program for preventing fake using blockchain | |
KR101520511B1 (en) | User authenication system by using personal identification number, user terminal device, inquiry apparatus, authenication server, and user authenication method therefor | |
CN106789436A (en) | A kind of reference report-generating method and system | |
US20230032782A1 (en) | Self-Sovereign Identity Verifiable Credentials for Consent Processing | |
US20190197506A1 (en) | Merchant service for real-time settlement apparatus and method | |
US20250272675A1 (en) | Status system with data security for transactions | |
AU2019339653A1 (en) | Systems and methods for distributed identity verification during a transaction | |
WO2013109470A1 (en) | Method and system for online authentication using a credit/debit card processing system | |
CN113781048B (en) | Transaction information verification and settlement method based on block chain | |
US20190279196A1 (en) | Systems and methods for digitizing payment card accounts | |
CN111681010A (en) | A transaction verification method and device | |
CN118333629A (en) | Identity signing method and device for financial transaction and electronic equipment | |
US20240394709A1 (en) | Unmanned payment processing system for processing payment by using tokens and transaction approval system including same | |
TW201837820A (en) | Automatic financial transaction management system and control method thereof having a processing unit to receive an automatic transaction setting of a registered user, and transmit an adding or enabling message of host to a cloud platform system to request the cloud platform system to add or enable a virtual host | |
KR20180113871A (en) | Method and system for financial goods subscription | |
US12126625B2 (en) | Systems and methods for data security | |
US20240428248A1 (en) | Method and System for Verifying Restricted Purchases | |
US20240289908A1 (en) | System and method for identification document verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |