CN106709733A - Verification strategy selection method and device - Google Patents

Verification strategy selection method and device Download PDF

Info

Publication number
CN106709733A
CN106709733A CN201611163328.0A CN201611163328A CN106709733A CN 106709733 A CN106709733 A CN 106709733A CN 201611163328 A CN201611163328 A CN 201611163328A CN 106709733 A CN106709733 A CN 106709733A
Authority
CN
China
Prior art keywords
server
safety verification
terminal
information
commodity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611163328.0A
Other languages
Chinese (zh)
Inventor
胡苏�
杨超
刘�东
蒲明刚
李伟
孔文果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Migu Cultural Technology Co Ltd
Original Assignee
Migu Cultural Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Migu Cultural Technology Co Ltd filed Critical Migu Cultural Technology Co Ltd
Priority to CN201611163328.0A priority Critical patent/CN106709733A/en
Publication of CN106709733A publication Critical patent/CN106709733A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a verification strategy selection method, which comprises the following steps: a first server receives a security verification policy inquiry request sent by a second server; the first server acquires the information of the commodity supplier mapped by the commodity identification by inquiring the first server database; the first server queries a verification policy selection mapping relation preset in the first server according to the information of the commodity supplier, determines a security verification policy and sends the security verification policy to the second server. The invention also discloses a verification strategy selection device.

Description

A kind of authentication policy system of selection and equipment
Technical field
The present invention relates to the E-Payment technology in internet communication, especially a kind of authentication policy system of selection and set It is standby.
Background technology
In the prior art, the commodity that supplier provides can generally sort in sequence by the sales volume of commodity, sales volume Bigger commodity, its commodity are evaluated higher;The commodity that supplier provides include:Supplier is from copyrighted commodity and supplier's generation The commodity provider of reason as copyright side commodity.When user is by the commodity for paying purchase supplier offer by mails, such as scheme 10th, shown in 11, the mode of user's purchase commodity has two kinds:Mode one as shown in Figure 10, user buys supplier from copyrighted During commodity, purchase request is sent to the server of supplier by terminal, vendor server receives purchase and asks backward payment Platform sends request of withholing, and completes purchase;Mode two as shown in figure 11, user is purchased for the commodity provider conduct that should be managed the Shang dynasty During the commodity of copyright side, purchase request is sent to the server of supplier by terminal, vendor server receives purchase request Request of withholing is sent to payment platform afterwards, after withholing successfully, subsequently, payment platform pays expense to copyright side.But, no matter adopt Which kind of buys the mode of commodity with, user often tends to buy the commodity that commodity are had higher rating during commodity are bought. Therefore, the provider of some commodity will utilize this mechanism, employ personnel using different terminals, in a short time repeatedly purchase Commodity are bought, expands sales volume, obtain false favorable comment information, cause consumer by false favorable comment information misguidance, while also breaking It is broken the fair competition between goods providers.
The content of the invention
In view of this, the embodiment of the present invention is expected to provide a kind of authentication policy system of selection and equipment, it is possible to increase provide The degree of accuracy and confidence level to the reference information of user.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
A kind of authentication policy system of selection is the embodiment of the invention provides, including:
First server receives the safety verification policy lookup request that second server sends;
The first server obtains the supply of commodities of commodity sign mapping by inquiring about the first server database The information of business;
The first server is preset in testing in the first server according to the information inquiry of the goods providers Card policy selection mapping relations, determine safety verification strategy and send to the second server.
In such scheme, the safety verification policy lookup request includes:First terminal mark, purchase account identification, canal Road information, APP information, the attribute information and commodity sign of purchase commodity;
The information of the goods providers includes the credit worthiness of goods providers.
In such scheme, also include before the information of the goods providers of the first terminal acquisition commodity sign mapping:
The first server first determines the mark of the first terminal according to safety verification policy lookup request, and Determine the corresponding safety verification strategy of mark of the first terminal.
In such scheme, it is characterised in that the corresponding safety verification strategy of mark for determining first terminal includes:Root According to storage location of the first terminal mark inquiry first terminal mark in first server, then search the storage The corresponding safety verification strategy in position.
In such scheme, the authentication policy Choose for user relation being preset in the first server includes checking plan Omit Choose for user table;The parameter that the authentication policy Choose for user table is included is included but is not limited to:Goods providers code, purchase Request channel code, APP channels code, commodity price.
The embodiment of the present invention additionally provides a kind of authentication policy system of selection, including:
First terminal sends purchase request to second server;
The first terminal receives and performs the safety verification strategy that the second server sends, and to the described second clothes Business device sends the user's operating result corresponding to the safety verification strategy;The safety verification strategy, by the second service Device determines according to the information of commodity provider;
The first terminal receives the operating result of withholing that the 3rd server forwarded via the second server sends; 3rd server is used to carry out operation of withholing to the purchase request being verified.
In such scheme, the purchase request is included but is not limited to:Buy the affiliated supplier of the second server direct The commodity of the affiliated supplier agency of commodity, and/or the purchase second server of offer.
In such scheme, the safety verification strategy is included but is not limited to:Paid without password, short message verification code is verified, figure The checking of shape identifying code, the checking of account encrypted code;
The operating result of withholing includes:Withhold success or failure.
The embodiment of the present invention additionally provides a kind of authentication policy system of selection, including:
Second server receives the purchase request that first terminal sends, and is sent out to first server according to the purchase request Safety verification policy lookup is sent to ask;
The second server receives the safety verification strategy that the first server sends, and is forwarded to described first eventually End, and receive the user's operating result corresponding to the safety verification strategy that the first terminal sends;
When judging that the user's operating result corresponding to the safety verification strategy is correct, button is sent to the 3rd server Money is asked, and receives the operating result of withholing of the request of withholing that the 3rd server sends, and is forwarded to described first Terminal.
The embodiment of the present invention additionally provides a kind of first server, including:First information transceiver module, first information treatment Module;Wherein,
First information transceiver module, the safety verification policy lookup request for receiving second server transmission;Will be described The safety verification strategy that first information processing module determines is sent to the second server;
First information processing module, for by inquiring about the first server database, obtaining commodity sign mapping The information of goods providers, and the checking plan in the first server is preset according to the information inquiry of the goods providers Slightly Choose for user table, determines safety verification strategy.
In such scheme, the first information processing module is additionally operable to obtain the goods providers of commodity sign mapping The mark of the first terminal is determined according to safety verification policy lookup request before information, and determines the first terminal The corresponding safety verification strategy of mark.
In such scheme, the first information processing module determines the corresponding safety verification strategy bag of the mark of first terminal Include:According to storage location of the first terminal mark inquiry first terminal mark in first server, then search institute State the corresponding safety verification strategy of storage location.
The embodiment of the present invention additionally provides a kind of first terminal, including:Second signal dispatcher module, the second information processing mould Block;Wherein,
Second signal dispatcher module, for sending purchase request to second server;Receive via the second server The safety verification strategy that the first server of forwarding sends, and tested corresponding to the safety to described in second server transmission Demonstrate,prove user's operating result of strategy;Receive the operation knot of withholing that the 3rd server forwarded via the second server sends Really;The safety verification strategy, is determined by the second server according to the information of commodity provider;
Second message processing module, for performing the safety that the first server forwarded via the second server sends Authentication policy;3rd server is used to carry out operation of withholing to the purchase request being verified.
The embodiment of the present invention additionally provides a kind of second server, including:3rd signal dispatcher module, the 3rd information processing Module;Wherein,
3rd signal dispatcher module, the purchase request for receiving first terminal transmission;And according to it is described purchase request to First server sends safety verification policy lookup request;The safety verification strategy that the first server sends is received, forwarding To the first terminal, and receive the user's operating result corresponding to the safety verification strategy that the first terminal sends; When judging that the user's operating result corresponding to the safety verification strategy is correct, request of withholing is sent to the 3rd server, And the operating result of withholing of the request of withholing that the 3rd server sends is received, and it is forwarded to the first terminal;
Second message processing module, for whether judging the user's operating result corresponding to the safety verification strategy Correctly.
Authentication policy system of selection provided in an embodiment of the present invention and equipment, first server receive second server and send Safety verification policy lookup request;First server obtains commodity sign mapping by inquiring about first server database The information of goods providers;First server is preset in the checking plan in first server according to the information inquiry of goods providers Slightly Choose for user relation, determines safety verification strategy and sends to second server.In this way, can not only ensure that user normally purchases By paying completion payment by mails when buying commodity, additionally it is possible to which the information according to goods providers determines different safety verification plans Slightly, effectively prevent bad commodity provider is to obtain commodity evaluation higher and supplier's prestige higher and maliciously buy business The brush single act of product, such that it is able to improve the degree of accuracy and the confidence level of the reference information for being supplied to user, it is to avoid mislead user, keep away Exempt from the unnecessary loss of user.
The embodiment of the present invention can be directly realized by authentication policy system of selection and equipment, it is not necessary to limit use environment, real Existing simple and convenient, the scope of application is wider, while improve the experience of user.
Brief description of the drawings
Fig. 1 realizes schematic flow sheet for the authentication policy system of selection of embodiment of the present invention first terminal side;
Fig. 2 realizes schematic flow sheet for the authentication policy system of selection of embodiment of the present invention second server side;
Fig. 3 carries out authentication policy selection for embodiment of the present invention first server side according only to the information of goods providers Method realizes schematic flow sheet;
Fig. 4 realizes schematic flow sheet for the server side authentication policy system of selection of the embodiment of the present invention the 3rd;
Fig. 5 is the composition structural representation of embodiment of the present invention first terminal;
Fig. 6 is the composition structural representation of embodiment of the present invention second server;
Fig. 7 is the composition structural representation of embodiment of the present invention first server;
Fig. 8 is the composition structural representation of the server of the embodiment of the present invention the 3rd;
Fig. 9 is safety verification strategy determination process in the authentication policy system of selection of embodiment of the present invention first server side Realize schematic flow sheet;
Figure 10 is user in the prior art by paying the schematic diagram of a scenario of the commodity that purchase supplier provides by mails;
Figure 11 is non-from copyrighted commodity scene by pay that purchase supplier provides by mails for user in the prior art Schematic diagram;
Figure 12 is the application scenarios schematic diagram of embodiment of the present invention authentication policy system of selection.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present invention and technology contents, below in conjunction with the accompanying drawings to this hair The realization of bright embodiment is described in detail, appended accompanying drawing purposes of discussion only for reference, not for limiting the present invention.
The embodiment of the present invention is applied to include first terminal, first server and second server, the net of the 3rd server In network environment, wherein, first terminal can be terminal that user uses as user side terminal, and first terminal can be for can The equipment being connected with server, including but not limited to:Mobile terminal such as mobile phone, panel computer, desktop computer, Intelligent hardware set Standby, first terminal quantity is at least one;
Second server can respectively connect first terminal and first server, the as the corresponding server of supplier All data interactions between three servers, first terminal and first server, the 3rd server, including various requests send With the return of request results etc., all by the forwarding and storage of second server, so it is easy to supplier to the whole purchase of user Buy the monitoring of commodity process;
First server can be as the server that safety verification strategy is provided for supplier and first terminal, the 3rd service Device can be as the server withholdd;Specifically, first server is receiving the safety verification of second server transmission After strategy request, determine safety verification strategy and send to second server, and first terminal is forwarded to by second server;The One terminal is sent to second service the user's operating result for corresponding to the safety verification strategy after completing safety verification strategy Device, second server are then sent out if it is determined that correct corresponding to user's operating result of the safety verification strategy to the 3rd server Go out request of withholing, the request execution of withholing being verified by the 3rd server correspondence is withholdd operation, afterwards will execution the behaviour that withholds Sent to second server as result, first terminal is forwarded to by second server.
In actual applications, first server can determine safety verification strategy according only to the information of goods providers, the One server determines that the process of safety verification strategy is according only to the information of goods providers:First server is receiving second After the safety verification strategy request that server sends, obtained by inquiring about first server database by first server first The information of the goods providers of commodity sign mapping;Then first server is preset according to the information inquiry of the goods providers In the authentication policy Choose for user table in first server, determine safety verification strategy and send to second server.Due to business The information of product supplier includes the credit worthiness of goods providers, and different credit worthinesses correspond in authentication policy mapping relations Different safety verification strategies, the more low safety verification strategy for needing security higher of credit worthiness of goods providers.
As can be seen that three functions of server are each independent, the purchase by cooperation each other to first terminal Request is managed, verifies, withholing, and completes the primary electron delivery operation of first terminal.
Fig. 1 realizes schematic flow sheet for the authentication policy system of selection of embodiment of the present invention first terminal side, such as Fig. 1 institutes Show, first terminal side authentication policy system of selection realizes that schematic flow sheet is comprised the following steps:
Step 101:First terminal sends purchase request to second server;
In actual applications, the first terminal quantity is at least one;The purchase request is included but is not limited to:Purchase The commodity of the affiliated supplier agency of commodity, and/or the second server that the affiliated supplier of second server directly provides;The Two servers can allow first terminal to complete purchase request after it is determined that the purchase request is not malicious operation.
Step 102:First terminal receives and performs the peace that the first server forwarded via the second server sends Full authentication policy;
In actual applications, the safety verification strategy is included but is not limited to:Verified without password payment, short message verification code, Graphical verification code checking, the checking of account encrypted code;Wherein, the security highest of account encrypted code checking, user is needing input just True account encrypted code can be by safety verification;Secondly for graphical verification code is verified, user needs what is shown according to terminal Figure is input into correct graphical verification code can be by safety verification, and the graphical verification code includes but is not limited to word, word At least one icon of female, numeral or selection;Thirdly for short message verification code is verified, user needs short according to the checking for being received The shown content of letter is input into correct short-message verification information can be included by safety verification, the content of the checking short message But it is not limited to numeral, letter, word;Security it is minimum be without password pay, including terminal directly send purchase request;Purchase The malicious operation possibility of the first terminal of request is higher, more needs safe safety verification strategy.
Step 103:First terminal sends the user corresponding to the safety verification strategy to the second server Operating result;
Step 104:First terminal receives the operation of withholing that the 3rd server forwarded via the second server sends As a result;
In actual applications, the operating result of withholing includes:Withhold success or failure, if withholdd unsuccessfully, Yong Huke To initiate purchase request again.
Fig. 2 realizes schematic flow sheet for the authentication policy system of selection of embodiment of the present invention second server side;Such as Fig. 2 institutes Show, second server side authentication policy system of selection realizes that flow is comprised the following steps:
Step 201:Second server receives the purchase request that first terminal sends;
In actual applications, the first terminal quantity is at least one;The purchase request is included but is not limited to:Purchase The commodity of the affiliated supplier agency of commodity, and/or the second server that the affiliated supplier of second server directly provides.
Step 202:Second server sends safety verification policy lookup and asks to first server;
In actual applications, first server can determine whether safety verification plan after safety verification policy lookup request is received Slightly, while the function of first server can also be realized by increasing safety verification policy module in second server, so that First server is eliminated, the applied environment of this kind of mode can only have first terminal, second server, the 3rd server.
Step 203:Second server receives the safety verification strategy that the first server sends, and is forwarded to described the One terminal;
In actual applications, the safety verification strategy is included but is not limited to:Verified without password payment, short message verification code, Graphical verification code checking, the checking of account encrypted code;Wherein, the checking of account encrypted code, graphical verification code checking, short message verification code are tested Card, the security paid without password are reduced successively, and the malicious operation possibility for sending the first terminal of purchase request is higher, more needs Want safe safety verification strategy.
Step 204:Second server receives the user corresponding to the safety verification strategy that the first terminal sends Operating result;
In practical application, second server can allow first after it is determined that the purchase request is not malicious operation Terminal completes purchase request.
Step 205:When judging that the user's operating result corresponding to the safety verification strategy is correct, second clothes Business device sends request of withholing to the 3rd server;
In actual applications, when second server judges the user's operating result corresponding to the safety verification strategy During mistake, user's operating result error notification corresponding to the safety verification strategy can also be sent to first terminal, by the One terminal decides whether to send purchase request again.
Step 206:First terminal receives the operating result of withholing that the 3rd server sends, and is forwarded to described first Terminal;
In actual applications, the operating result of withholing includes:Withhold success or failure, if withholdd unsuccessfully, Yong Huke To initiate purchase request again.
Fig. 3 carries out authentication policy selection for embodiment of the present invention first server side according only to the information of goods providers Method realizes schematic flow sheet;As shown in figure 3, first server side carries out authentication policy according only to the information of goods providers The method of selection realizes that flow is comprised the following steps:
Step 301:First server receives the safety verification policy lookup request that second server sends;
Step 302:First server obtains the commodity of commodity sign mapping by inquiring about the first server database The information of supplier;
Step 303:First server is preset in the first server according to the information inquiry of the goods providers Authentication policy Choose for user relation, determine safety verification strategy and send to the second server;
In actual applications, first server side can carry out authentication policy selection according only to the information of goods providers; The safety verification strategy is included but is not limited to:Paid without password, short message verification code is verified, graphical verification code is verified, account adds Password authentification;Wherein, the checking of account encrypted code, graphical verification code checking, short message verification code checking, the security paid without password Reduce successively, the malicious operation possibility for sending the first terminal of purchase request is higher, more needs safe safety verification Strategy.
In actual applications, the embodiment of the present invention can also include the 3rd server, and the 3rd server is used for correspondence The purchase request being verified carries out operation of withholing.
Fig. 4 realizes schematic flow sheet for the server side authentication policy system of selection of the embodiment of the present invention the 3rd;Such as Fig. 4 institutes Show, the 3rd server side authentication policy system of selection realizes that flow is comprised the following steps:
Step 401:3rd server receives the request of withholing that second server sends;
Step 402:3rd server performs the request of withholing, and operating result of being withholdd described in transmission is taken to described second Business device;
In actual applications, the operating result of withholing includes:Withhold success or failure, if withholdd unsuccessfully, Yong Huke To initiate purchase request again.
Fig. 5 is the composition structural representation of embodiment of the present invention first terminal;As shown in figure 5, the composition knot of first terminal Structure includes:Second signal dispatcher module 501, the second message processing module 502, wherein,
Second signal dispatcher module 501, for sending purchase request to second server;Receive via the second service The safety verification strategy that device sends, and send the user behaviour corresponding to the safety verification strategy to the second server Make result, receive the operating result of withholing that the 3rd server forwarded via the second server sends;
In actual applications, the first terminal quantity is at least one;The purchase request is included but is not limited to:Purchase The commodity of the affiliated supplier agency of commodity, and/or the second server that the affiliated supplier of second server directly provides;The Two servers can allow first terminal to complete purchase request after it is determined that the purchase request is not malicious operation;It is described Safety verification strategy is included but is not limited to:Paid without password, short message verification code is verified, graphical verification code is verified, account encrypted code Checking;Wherein, account encrypted code checking, graphical verification code checking, short message verification code checking, without password pay security successively Reduce, the malicious operation possibility for sending the first terminal of purchase request is higher, more needs safe safety verification strategy.
Second message processing module 502, for performing the safety verification strategy sent via the first server;
In actual applications, second signal dispatcher module 501, the second message processing module 502 function can be by position In central processing unit (CPU, Central Processing Unit), microprocessor (MPU, Micro on first terminal Processor Unit), digital signal processor (DSP, Digital Signal Processor) or field-programmable gate array Row (FPGA, Field Programmable Gate Array) etc. are realized by performing code.
Fig. 6 is the composition structural representation of embodiment of the present invention second server;As shown in fig. 6, the group of second server Include into structure:3rd signal dispatcher module 601, the 3rd message processing module 602, wherein,
3rd signal dispatcher module 601, the purchase request for receiving first terminal transmission;And according to the purchase request Safety verification policy lookup is sent to first server to ask;The safety verification strategy that the first server sends is received, is turned It is sent to the first terminal;And receive the user's operation knot corresponding to the safety verification strategy that the first terminal sends Really;When judging that the user's operating result corresponding to the safety verification strategy is correct, send to withhold to the 3rd server and ask Ask;And the operating result of withholing that third terminal sends is received, and it is forwarded to the first terminal;
3rd message processing module 602, for judging the user's operating result corresponding to the safety verification strategy It is whether correct;
In actual applications, the first terminal quantity is at least one;The purchase request is included but is not limited to:Purchase The commodity of the affiliated supplier agency of commodity, and/or the second server that the affiliated supplier of second server directly provides, the Two servers can allow first terminal to complete purchase request after it is determined that the purchase request is not malicious operation;The peace Full authentication policy is included but is not limited to:Paid without password, short message verification code is verified, graphical verification code is verified, account encrypted code is tested Card;Wherein, the checking of account encrypted code, graphical verification code checking, short message verification code checking, the security without password payment drop successively Low, the malicious operation possibility for sending the first terminal of purchase request is higher, more needs safe safety verification strategy;
In actual applications, the 3rd signal dispatcher module 601, the 3rd message processing module 602 function can be by position Realized by performing code in CPU, MPU, DSP or FPGA on server etc..
Fig. 7 is the composition structural representation of embodiment of the present invention first server;As shown in fig. 7, the group of first server Include into structure:First information transceiver module 701, first information processing module 702, wherein,
First information transceiver module 701, the safety verification policy lookup request for receiving second server transmission;And will 3rd message processing module is sent to the second server according to the safety verification strategy that presetting rule determines;
First information processing module 702, for determining safety verification strategy according to presetting rule;Specifically for elder generation according to institute State safety verification policy lookup request and determine the first terminal mark;Further according to first terminal mark inquiry described first Storage location of the terminal iidentification in first server, and search the corresponding safety verification strategy of the storage location;Described One message processing module 702, is additionally operable to fail to inquire the first terminal mark first according to first terminal mark During storage location in server, by inquiring about the database of the first server, it is determined that and the commodity sign phase that gets The credit worthiness of the goods providers of mapping;It is preset in the first server according to goods providers credit worthiness inquiry Authentication policy Choose for user table, determines safety verification strategy;The authentication policy selection being preset in the first server The parameter that mapping table is included is included but is not limited to:Goods providers code, purchase request channel code, APP channels code, commodity Price.
In actual applications, the first terminal quantity is at least one;The purchase request is included but is not limited to:Purchase The commodity of the affiliated supplier agency of commodity, and/or the second server that the affiliated supplier of second server directly provides, the Two servers can allow first terminal to complete purchase request after it is determined that the purchase request is not malicious operation;The peace Full authentication policy is included but is not limited to:Paid without password, short message verification code is verified, graphical verification code is verified, account encrypted code is tested Card;Wherein, the checking of account encrypted code, graphical verification code checking, short message verification code checking, the security without password payment drop successively Low, the malicious operation possibility for sending the first terminal of purchase request is higher, more needs safe safety verification strategy;
In actual applications, the first information transceiver module 701, first information processing module 702 function can be by position Realized by performing code etc. in CPU, MPU, DSP or the FPGA on server.
In actual applications, the embodiment of the present invention can also include the 3rd server, and the 3rd server is used for correspondence The purchase request being verified carries out operation of withholing.
Fig. 8 is the composition structural representation of the server of the embodiment of the present invention the 3rd;As shown in figure 8, the group of the 3rd server Include into structure:4th signal dispatcher module 801, the 4th message processing module 802, wherein,
4th signal dispatcher module 801, the request of withholing for receiving second server transmission;And by the 4th information Operating result to the second server of withholing performed by processing module;
4th message processing module 802, for request of being withholdd described in the execution of the 3rd server;
In actual applications, the operating result of withholing includes:Withhold success or failure, if withholdd unsuccessfully, Yong Huke To initiate purchase request again;
In actual applications, the 4th signal dispatcher module 801, the 4th message processing module 802 function can be by position Realized by performing code in CPU, MPU, DSP or FPGA on server etc..
Fig. 9 is safety verification strategy determination process in the authentication policy system of selection of embodiment of the present invention first server side Schematic flow sheet is realized, as shown in figure 9, safety verification plan in the authentication policy system of selection of embodiment of the present invention first server side That omits determination process realizes that flow is comprised the following steps:
Step 901:First server receives safety verification policy lookup request;
In actual applications, the safety verification policy lookup request includes:First terminal mark, purchase account identification, Channel information, APP information, the price of purchase commodity and commodity sign;
Step 902:Storage location of the first server inquiry purchase account identification in the first server, and search The corresponding safety verification strategy of the storage location;
In actual applications, first server supplier is provided with different storage locations in first server, including But it is not limited to be labeled as:Blacklist, gray list and Red List, if during Query Result appears in blacklist for purchase account identification, Flow can then be terminated;If Query Result is appeared in Red List for purchase account identification, safety verification strategy can be determined It is to be paid without password;If Query Result is appeared in gray list for purchase account identification, can determine that safety verification strategy is Graphical verification code verifies (safe class is higher) or account encrypted code checking (safe class highest).
Wherein, the blacklist set by the supplier of first server, transaction row has been identified for recording in advance It is the purchase account that there is risk (risk as identified by risk identification algorithm of the prior art buys account) Purchase account identification;Red List, for recording buying behavior relatively more active (such as recent purchase frequency is higher) and trading activity The terminal iidentification of normal users;Gray list is higher (although as do not identified transaction row clearly for recording trading activity risk It is the presence of risk, but has the trading activity of certain exception --- if purchase account is in special time period, with upper frequency frequent requests Buy same commodity) purchase account identification.Additionally, in actual applications, it is necessary to explanation, its outside abnormal trading activity His behavior, can be defined as arm's length dealing behavior.
Step 903:Judge whether inquiry succeeds, if it is, performing step 904, otherwise, perform step 905;
Step 904:The corresponding safety verification strategy of the storage location is sent to second server;
Step 905:Determine the prestige of goods providers;
In actual applications, the reputation information of goods providers is stored in the first server, works as first server Inquiry is bought when storage location of the account identification in the first server fails, it is necessary to the prestige for passing through goods providers is looked into Authentication policy Choose for user table is looked for, safety verification strategy is determined;Supplier's prestige can be divided into different brackets, for example by with Family purchase after give goods providers favorable comment, in comment or difference comment, favorable comment, in comment, difference scoring not Dai Biao+1 point, 0 point, -1 point, The prestige of fraction goods providers higher is higher after cumulative addition, or the credit worthiness of goods providers is entered using grading system Row classification, preferred supplier's prestige is divided into 3 grades, respectively I, II, III, correspond to respectively enjoy a good reputation, in credit worthiness, letter Reputation degree is low.
Step 906:Reputation query authentication policy Choose for user table according to the goods providers, determines safety verification plan Slightly;
In actual applications, authentication policy Choose for user table, can be set using various ways, pre-set storage the It is preferred by the way of exhaustion as far as possible in one server, in the authentication policy Choose for user table, the ginseng comprising different parameters The combining parameter values of numerical value composition and the mapping relations of corresponding authentication policy;
For example:Determine that the credit worthiness of goods providers III is low by step 905, ask true by safety verification policy lookup Determine channel information, APP information, the price of purchase commodity to correspond with:The corresponding channel that channel information is represented be " web page access ", APP information is APP titles " miaow cluck music ", the price of commodity belongs to interval " (0,100) ";The authentication policy selection for pre-setting Mapping table includes:
Table 1
When by performing step 906, " CP=III is obtained;Channel=' web page access ';APP=' miaows cluck * * ';Commodity Price<When 100 ", the authentication policy of maps mutually is " graphical verification code checking " in table;So as to first server can determine checking Strategy is verified for graphical verification code.
In actual applications, set of parameter values can have different combining forms, can be goods providers code, purchase The combination of any two or multiple, the number of parameter in request channel code, APP channels code, several parameter values of price of commodity Amount can also be set by first server supplier.
Figure 12 is the application scenarios schematic diagram of embodiment of the present invention authentication policy system of selection, as shown in figure 12, the present invention The application process of embodiment authentication policy system of selection includes:User sends purchase request by terminal to vendor server; Vendor server upon receipt of the purchase request, first sends request, safety verification strategy clothes to safety verification strategic server The safety verification strategy of determination is back to vendor server by business device;Treat that the safety verification Policy Result of terminal input is correct When, vendor server sends request of withholing to payment platform again, completes to withhold;Here, if commodity are the non-own of supplier Copyright commodity, supplier can also pay expense to copyright side.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program producing Product.Therefore, the embodiment of the present invention can be using the embodiment in terms of hardware embodiment, software implementation or combination software and hardware Form.And, the embodiment of the present invention can be used and wherein include the calculating of computer usable program code at one or more The computer program product implemented in machine usable storage medium (including but not limited to magnetic disk storage and optical memory etc.) Form.
The embodiment of the present invention is with reference to method according to embodiments of the present invention, equipment (system) and computer program product Flow chart and/or block diagram describe.It should be understood that during flow chart and/or block diagram can be realized by computer program instructions The combination of flow and/or square frame in each flow and/or square frame and flow chart and/or block diagram.These calculating can be provided Treatment of the machine programmed instruction to all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices Device is producing a machine so that produced by the instruction of computer or the computing device of other programmable data processing devices For the function realizing being specified in one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames Equipment.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger Make the manufacture of equipment, the commander equipment realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
The above, only presently preferred embodiments of the present invention is not intended to limit the scope of the present invention, it is all Any modification, equivalent and improvement for being made within the spirit and principles in the present invention etc., should be included in protection of the invention Within the scope of.

Claims (14)

1. a kind of authentication policy system of selection, it is characterised in that methods described includes:
First server receives the safety verification policy lookup request that second server sends;
The first server obtains the goods providers of commodity sign mapping by inquiring about the first server database Information;
The first server is preset in the checking plan in the first server according to the information inquiry of the goods providers Slightly Choose for user relation, determines safety verification strategy and sends to the second server.
2. method according to claim 1, it is characterised in that the safety verification policy lookup request includes:First eventually End mark, purchase account identification, channel information, APP information, the attribute information and commodity sign of purchase commodity;
The information of the goods providers includes the credit worthiness of goods providers.
3. method according to claim 1, it is characterised in that the commodity that the first terminal obtains commodity sign mapping are supplied Also include before the information for answering business:
The first server first determines the mark of the first terminal according to safety verification policy lookup request, and determines The corresponding safety verification strategy of mark of the first terminal.
4. method according to claim 3, it is characterised in that the corresponding safety verification of mark of the determination first terminal Strategy includes:According to storage location of the first terminal mark inquiry first terminal mark in first server, then Search the corresponding safety verification strategy of the storage location.
5. method according to claim 1, it is characterised in that the authentication policy being preset in the first server Choose for user relation includes authentication policy Choose for user table;The parameter that the authentication policy Choose for user table is included includes but does not limit In:Goods providers code, purchase request channel code, APP channels code, commodity price.
6. a kind of authentication policy system of selection, it is characterised in that methods described includes:
First terminal sends purchase request to second server;
The first terminal receives and performs the safety verification strategy that the second server sends, and to the second server Send the user's operating result corresponding to the safety verification strategy;The safety verification strategy, by the second server root Information according to commodity provider determines;
The first terminal receives the operating result of withholing that the 3rd server forwarded via the second server sends;It is described 3rd server is used to carry out operation of withholing to the purchase request being verified.
7. method according to claim 5, it is characterised in that the purchase request is included but is not limited to:Buy described Commodity, and/or buy the commodity that the affiliated supplier of the second server acts on behalf of that the affiliated supplier of two servers directly provides.
8. method according to claim 5, it is characterised in that the safety verification strategy is included but is not limited to:Without password Pay, short message verification code is verified, graphical verification code is verified, the checking of account encrypted code;
The operating result of withholing includes:Withhold success or failure.
9. a kind of authentication policy system of selection, it is characterised in that methods described includes:
Second server receives the purchase request of first terminal transmission, and sends peace to first server according to the purchase request Full authentication policy inquiry request;
The second server receives the safety verification strategy that the first server sends, and is forwarded to the first terminal, and Receive the user's operating result corresponding to the safety verification strategy that the first terminal sends;
When judging that the user's operating result corresponding to the safety verification strategy is correct, send to withhold to the 3rd server and ask Ask, and receive the operating result of withholing of the request of withholing that the 3rd server sends, and be forwarded to the first terminal.
10. a kind of first server, it is characterised in that the first server includes:First information transceiver module, the first information Processing module;Wherein,
First information transceiver module, the safety verification policy lookup request for receiving second server transmission;By described first The safety verification strategy that message processing module determines is sent to the second server;
First information processing module, for by inquiring about the first server database, obtaining the commodity of commodity sign mapping The information of supplier, and the authentication policy choosing in the first server is preset according to the information inquiry of the goods providers Mapping table is selected, safety verification strategy is determined.
11. first servers according to claim 10, it is characterised in that the first information processing module, are additionally operable to Determine described the according to safety verification policy lookup request before the information of the goods providers for obtaining commodity sign mapping The mark of one terminal, and determine the corresponding safety verification strategy of mark of the first terminal.
12. first servers according to claim 11, it is characterised in that the first information processing module determines first The corresponding safety verification strategy of mark of terminal includes:According to first terminal mark inquiry first terminal mark the Storage location in one server, then search the corresponding safety verification strategy of the storage location.
13. a kind of first terminals, it is characterised in that the first terminal includes:Second signal dispatcher module, the second information processing Module;Wherein,
Second signal dispatcher module, for sending purchase request to second server;Receive and forwarded via the second server The safety verification strategy that sends of first server, and sent to the second server and described correspond to the safety verification plan User's operating result slightly;Receive the operating result of withholing that the 3rd server forwarded via the second server sends;Institute Safety verification strategy is stated, is determined according to the information of commodity provider by the second server;
Second message processing module, for performing the safety verification that the first server forwarded via the second server sends Strategy;3rd server is used to carry out operation of withholing to the purchase request being verified.
14. a kind of second servers, it is characterised in that the second server includes:3rd signal dispatcher module, the 3rd information Processing module;Wherein,
3rd signal dispatcher module, the purchase request for receiving first terminal transmission;And according to the purchase request to first Server sends safety verification policy lookup request;The safety verification strategy that the first server sends is received, institute is forwarded to First terminal is stated, and receives the user's operating result corresponding to the safety verification strategy that the first terminal sends;Judge When user's operating result corresponding to the safety verification strategy is correct, request of withholing is sent to the 3rd server, and connect The operating result of withholing of the request of withholing that the 3rd server sends is received, and is forwarded to the first terminal;
Second message processing module, for whether just to judge the user's operating result corresponding to the safety verification strategy Really.
CN201611163328.0A 2016-12-15 2016-12-15 Verification strategy selection method and device Pending CN106709733A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611163328.0A CN106709733A (en) 2016-12-15 2016-12-15 Verification strategy selection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611163328.0A CN106709733A (en) 2016-12-15 2016-12-15 Verification strategy selection method and device

Publications (1)

Publication Number Publication Date
CN106709733A true CN106709733A (en) 2017-05-24

Family

ID=58937995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611163328.0A Pending CN106709733A (en) 2016-12-15 2016-12-15 Verification strategy selection method and device

Country Status (1)

Country Link
CN (1) CN106709733A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087084A (en) * 2018-08-21 2018-12-25 卓望数码技术(深圳)有限公司 The acquisition methods and system, equipment, storage medium of charging security management and control strategy
CN109684819A (en) * 2018-12-26 2019-04-26 北京字节跳动网络技术有限公司 Data verification method and device
CN111212066A (en) * 2019-12-31 2020-05-29 浙江工业大学 Dynamic allocation request verification method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867475A (en) * 2010-05-27 2010-10-20 华为终端有限公司 Access authentication method and related device of remote control terminal service and communication system
CN102542687A (en) * 2010-12-29 2012-07-04 盛大计算机(上海)有限公司 Micropayment system and implementation method thereof
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103034941A (en) * 2012-12-05 2013-04-10 北京奇虎科技有限公司 Internet payment method and system
CN105391724A (en) * 2015-11-25 2016-03-09 用友网络科技股份有限公司 Authorization management method and authorization management device used for information system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867475A (en) * 2010-05-27 2010-10-20 华为终端有限公司 Access authentication method and related device of remote control terminal service and communication system
CN102542687A (en) * 2010-12-29 2012-07-04 盛大计算机(上海)有限公司 Micropayment system and implementation method thereof
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN103034941A (en) * 2012-12-05 2013-04-10 北京奇虎科技有限公司 Internet payment method and system
CN105391724A (en) * 2015-11-25 2016-03-09 用友网络科技股份有限公司 Authorization management method and authorization management device used for information system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087084A (en) * 2018-08-21 2018-12-25 卓望数码技术(深圳)有限公司 The acquisition methods and system, equipment, storage medium of charging security management and control strategy
CN109684819A (en) * 2018-12-26 2019-04-26 北京字节跳动网络技术有限公司 Data verification method and device
CN111212066A (en) * 2019-12-31 2020-05-29 浙江工业大学 Dynamic allocation request verification method
CN111212066B (en) * 2019-12-31 2022-04-01 浙江工业大学 Dynamic allocation request verification method

Similar Documents

Publication Publication Date Title
US11694207B2 (en) Securing an exchange item associated with fraud
CN105933266B (en) A kind of verification method and server
US7848736B2 (en) Package billing for micro-transactions
US20160104251A1 (en) Method and system for mobile commerce with real-time purchase support
US20180053189A1 (en) Systems and methods for enhanced authorization response
US10776771B2 (en) Electronic resource processing method and device
WO2018026921A1 (en) Cross-brand redemption in an exchange item marketplace network
WO2018026808A1 (en) Consumption based redemption in an exchange item marketplace network
CN110874742B (en) Payment method and device based on block chain and intelligent contract
CN107506987A (en) A kind of processing method of reimbursement information
WO2013181283A1 (en) Data processing
CN106327169A (en) Electronic fund transferring method and apparatus
CN107239994A (en) Order processing method, device, computer equipment and computer-readable recording medium
WO2013130513A1 (en) Method and system for authenticating an entity using transaction processing
JP6667498B2 (en) Remote transaction system, method and POS terminal
US20230050176A1 (en) Method of processing a transaction request
CN108346076A (en) Authentication information transmission, order generation, order method of payment and device
CN106709733A (en) Verification strategy selection method and device
CN108475371A (en) Trading authorization
US20150248673A1 (en) Methods and apparatus for a token management system for transactions
AU2014268112A1 (en) Method of processing a transaction request
CN109544131A (en) A kind of game merchandise control method and device
CN108647971A (en) Account safety method and smart card system in a kind of user payment
CN107528822A (en) A kind of business performs method and device
WO2020154576A1 (en) Cryptographic transactions supporting real world requirements

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524

RJ01 Rejection of invention patent application after publication