CN107437181A - Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account - Google Patents

Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account Download PDF

Info

Publication number
CN107437181A
CN107437181A CN201710644915.XA CN201710644915A CN107437181A CN 107437181 A CN107437181 A CN 107437181A CN 201710644915 A CN201710644915 A CN 201710644915A CN 107437181 A CN107437181 A CN 107437181A
Authority
CN
China
Prior art keywords
payment request
account
payment
money
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710644915.XA
Other languages
Chinese (zh)
Inventor
郭锐
赵瑞芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710644915.XA priority Critical patent/CN107437181A/en
Publication of CN107437181A publication Critical patent/CN107437181A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of method for preventing the stolen brush of account, this method includes:When detecting payment request, beneficiary information corresponding to the payment request is obtained;The beneficiary information is compared with the blacklist to prestore;If the beneficiary information is not in blacklist, verify in locally store information whether include the information related to the payment request;If not including the information related to the payment request in the locally store information, judge that the payment request is abnormal, do not perform the operation to account payable.The present invention also provides a kind of device and computer-readable recording medium for preventing the stolen brush of account, and the present invention can prevent the account of user from stealing brush by strange third party in the case where accounts information is not informed other people or defrauded of, protect the property safety of user.

Description

Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account
Technical field
The present invention relates to e-payment field, more particularly to a kind of method, apparatus and computer for preventing the stolen brush of account Readable storage medium storing program for executing.
Background technology
Nowadays, with the popularization that mobile phone is applied, daily life is very easy to, user can pass through mobile phone Realize on electric business shopping platform and do shopping home-confinedly, consumption of going out is without cash is carried, as long as carrying with mobile phone, just It can be paid and transfer operation by the software that mobile phone has payment function using Alipay, wechat and Mobile banking etc., It is simple and convenient.However, due to the hidden danger of userspersonal information's leakage be present, it is possible to cause bank accounts through mobile phones, the branch of user The accounts informations such as precious account or wechat wallet are paid in the case where not informing other people or being defrauded of, the fund of account is by strange Third party assumes another's name to consume or transferred accounts, that is, stolen brush, seriously endangers the property safety of user.
The content of the invention
It is a primary object of the present invention to provide a kind of method, apparatus for preventing the stolen brush of account and computer-readable storage Medium, it is intended to solve the accounts information of user in the case where not informing other people or being defrauded of, the stolen brush of fund of account Technical problem.
To achieve the above object, the present invention provides a kind of method for preventing the stolen brush of account, described to prevent the stolen brush of account Method include:
When detecting payment request, beneficiary information corresponding to the payment request is obtained;
The beneficiary information is compared with the blacklist to prestore;
If the beneficiary information is not in blacklist, verifies whether to include in locally store information and asked with the payment Seek related information;
If not including the information related to the payment request in the locally store information, the payment request is judged It is abnormal, do not perform the operation to account payable.
Alternatively, it is described when detecting payment request, the step of obtaining beneficiary information corresponding to the payment request Include before:
When detecting payment request, the Payment Amount of the payment request is obtained;
Judge whether the Payment Amount is more than or equal to the pre-determined lower limit amount of money and is less than or equal to the preset upper limit amount of money;
If the Payment Amount is more than or equal to the pre-determined lower limit amount of money and is less than or equal to the preset upper limit amount of money, acquisition pair The beneficiary information answered.
Alternatively, it is described to judge whether the Payment Amount is more than or equal to the pre-determined lower limit amount of money and less than or equal to default Also include after the step of upper limit amount of money:
If the Payment Amount is more than the preset upper limit amount of money, payment request corresponding to user's confirmation is prompted;
When being not detected by user's confirmation payment request, judge that the payment request is abnormal, do not perform to dealing with The operation of money.
Alternatively, it is described when being not detected by user's confirmation payment request, judge that the payment request is abnormal, do not perform The step of operation to account payable, includes:
Confirm the payment request when being not detected by user in preset time threshold, then judge that the payment request is different Often, the operation to account payable is not performed.
Alternatively, if the beneficiary information is not in blacklist, verify whether included in locally store information The step of related to payment request information, includes:
If the beneficiary information is not in blacklist, the chat record in locally store information is obtained;
The chat record is compared with beneficiary information, to verify whether the chat record includes user and institute State the communication record of beneficiary.
Alternatively, it is described that the chat record is compared with beneficiary information, whether to verify the chat record Include after comprising user and the step of the communication record of the beneficiary:
If communication record of the chat record not comprising user with the payee, obtains and is treated in locally store information The amount of money of shopping product;
The amount of money of the article to be purchased is compared with the Payment Amount;
If the amount of money of the article to be purchased mismatches with Payment Amount, judge that the payment request is abnormal, do not perform Operation to account payable.
Alternatively, it is described to judge whether the Payment Amount is more than or equal to the pre-determined lower limit amount of money and less than or equal to default Also include after the step of upper limit amount of money:
If the Payment Amount is less than the pre-determined lower limit amount of money, judge whether the current frequency of corresponding payment request is big In default payment request frequency threshold value;
If the current frequency of the payment request is more than default payment request frequency threshold value, judge that the payment request is different Often.
Alternatively, methods described also includes:
When judging the payment request exception, information warning or voice message information warning are shown.
In addition, to achieve the above object, the present invention also provides a kind of device for preventing the stolen brush of account, described to prevent account The device of stolen brush includes:Memory, processor and it is stored on the memory and can runs on the processor and be anti- The only program of the stolen brush of account, it is described to prevent that the stolen program brushed of account is as described above anti-by realization during the computing device Only the step of method of the stolen brush of account.
In addition, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, described computer-readable Being stored with storage medium prevents the program of the stolen brush of account, described to prevent reality when the stolen program brushed of account is executed by processor The step of now preventing the method for the stolen brush of account as described above.
The present invention proposes a kind of method for preventing the stolen brush of account, and this method includes:When detecting payment request, obtain Beneficiary information corresponding to the payment request;The beneficiary information is compared with the blacklist to prestore;If the receipts Money side's information is not in blacklist, then verifies in locally store information whether include the information related to the payment request;If The information related to the payment request is not included in the locally store information, then judges that the payment request is abnormal, not Perform the operation to account payable.By the above-mentioned means, the present invention when mobile terminal detects payment request, obtains this pair first Beneficiary information corresponding to money request, and then the beneficiary information is compared with the blacklist to prestore, the present invention passes through this Kind of mode first verifies that whether beneficiary information be in blacklist, when mobile terminal is by the beneficiary information and the blacklist that prestores When showing that the beneficiary information is not in blacklist after being compared, further verify in mobile terminal locally store information Whether the information related to the payment request is included, if not comprising related to the payment request in checking locally store information Information, mobile terminal judge payment request exception, enter without performing the operation to account payable, provided for the account safety of user Ensure, prevent the account fund of user from being stolen in the case where accounts information is not informed other people or defrauded of by strange third party Brush, protect the property safety of user.
Brief description of the drawings
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 2 is a kind of communications network system Organization Chart that inventive embodiments provide;
Fig. 3 is the schematic flow sheet for the method first embodiment that the present invention prevents the stolen brush of account;
Fig. 4 is the schematic flow sheet for the method second embodiment that the present invention prevents the stolen brush of account;
Fig. 5 is the schematic flow sheet for the method 3rd embodiment that the present invention prevents the stolen brush of account;
Fig. 6 is the schematic flow sheet for the method fourth embodiment that the present invention prevents the stolen brush of account;
Fig. 7 is the schematic flow sheet for the embodiment of method the 5th that the present invention prevents the stolen brush of account;
Fig. 8 is the schematic flow sheet for the method sixth embodiment that the present invention prevents the stolen brush of account;
Fig. 9 is the method application scenarios schematic diagram that the present invention prevents the stolen brush of account;
Figure 10 is the interaction schematic diagram for the method first embodiment application scenarios that the present invention prevents the stolen brush of account;
Figure 11 is the interaction schematic diagram of the another application scene for the method first embodiment that the present invention prevents the stolen brush of account;
Figure 12 is the interaction schematic diagram for the embodiment application scenarios of method the 5th that the present invention prevents the stolen brush of account.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting Dynamic terminal 100 can include:RF (Radio Frevuency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frevuency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
Wi-Fi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or Wi-Fi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Livuid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Evuipment, is used Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc. The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
Reference picture 3, the present invention prevent the method first embodiment offer of the stolen brush of account is a kind of from preventing account to be stolen brush Method, methods described include:
Step S10, when detecting payment request, obtain beneficiary information corresponding to the payment request;
Step S20, the beneficiary information is compared with the blacklist that prestores;
Step S30, if the beneficiary information is not in blacklist, verify in locally store information whether include and institute State the related information of payment request;
Step S40, if not including the information related to the payment request in the locally store information, described in judgement Payment request is abnormal, does not perform the operation to account payable.
The application scenarios of the present embodiment can be:The mobile terminals such as mobile phone, tablet personal computer as user receive foreground or During the payment request on backstage, to ensure the fund of the account such as Alipay, Net silver or wechat wallet of user in above-mentioned mobile terminal Safety, the present embodiment provide a kind of method for preventing the stolen brush of account.
First, mobile terminal obtains beneficiary information corresponding to the payment request when detecting payment request.
In this example, mobile terminal is when detecting the payment request on foreground or backstage, to gathering corresponding to payment request Square information is collected and retrieved.The payment request, which includes payment request or transfer request, the beneficiary information, includes beneficiary The essential informations such as account, name, phone, Email and IP address.Specifically, mobile terminal is when receiving payment request, from Beneficiary information is extracted in payment request.
Mobile terminal is compared after the beneficiary information is obtained, by the beneficiary information with the blacklist to prestore.Should The blacklist to prestore can be the personal blacklist that user pre-establishes, and be that user establishes according to the cheat's information received in the past , wherein, the blacklist includes the information such as account, name, phone, Email and the IP address of cheat.It is specifically, mobile Terminal is retrieved in the personal blacklist of above-mentioned user to the information of beneficiary, i.e., by the account of beneficiary, name, electricity Words, Email and IP address etc. are retrieved in the blacklist of above-mentioned individual subscriber, if in the personal blacklist of user The information to be matched with any one such as the account of beneficiary, name, phone, Email and IP address is not retrieved, that is, is sentenced The fixed beneficiary information is not in blacklist.
As a kind of embodiment, mobile terminal, which can also network, obtains the blacklist that the robber established on the net brushes other people accounts Database, its schematic diagram reference picture 10.The black list database be the personnel that steal brush other people account funds record according to having and its The foundation such as related personal information and account, gather cheat's information that all users upload.The acquisition for mobile terminal black name The black list database is stored after single database, and the information of beneficiary information entered in above-mentioned black list database Row retrieval, appoints if not retrieved in black list database with the account of beneficiary, name, phone, Email and IP address etc. One information to match of meaning, that is, judge that the beneficiary information is not in blacklist.
In more implement, when payment request correspond into beneficiary information being compared with blacklist, for increasing comparison Scope, mobile terminal, can be in above-mentioned black list database and the personal blacklist of user after the beneficiary information is obtained In retrieved, when black list database and user personal blacklist do not retrieve with the account of beneficiary, name, The information that any one such as phone, Email and IP address match, that is, judge that the beneficiary information is not in blacklist.
In the specific implementation, when any one such as the account of beneficiary, name, phone, Email and IP address or several The information of item is coincide with the information in above-mentioned blacklist, that is, judges that the beneficiary information is in blacklist, and then judge the payment Request is abnormal, and mobile terminal does not perform the operation to account payable.
As another embodiment, mobile terminal is when detecting payment request, the payment gold first to payment request Volume size is judged, corresponding operation is made according to judged result, only when Payment Amount meets default amount of money scope Just perform the step of obtaining beneficiary information.Specifically, the lower limit amount of money and upper limit gold of payment are pre-set in the terminal Volume.For example the lower limit amount of money of payment is arranged to 100 yuan, the upper limit amount of money is arranged to 1000 yuan, of course, it is possible to according to actual need The suitable lower limit amount of money and the upper limit amount of money are set.When mobile terminal judge Payment Amount be more than or equal to the pre-determined lower limit amount of money and During less than or equal to the upper limit amount of money, then beneficiary information corresponding to payment request is obtained, and then will obtain in the manner described above Beneficiary information is compared with the blacklist to prestore.
In the present embodiment, if beneficiary information is not in blacklist, mobile terminal is further verified in locally store information Whether the information related to the payment request is included.The related information includes all call notes stored in mobile terminal Chat in record, short message record, the chat record in social software, electric business shopping platform or other softwares that can be consumed Communication record in record between the user related to this payment request and beneficiary, and electric business shopping platform or other can The amount of money of article to be purchased in shopping cart or collection in the software consumed.If in the locally store information do not include with The related information of the payment request, then judge that the payment request is abnormal, do not perform the operation to account payable.
Specifically, acquisition for mobile terminal be locally stored message registration, short message record, the chat record in social software, Chat record in electric business shopping platform or other softwares that can be consumed, then by beneficiary information with it is above-mentioned record into Row compares, to verify the communication record that user whether is included in above-mentioned chat record and is paid the bill with beneficiary for this.Such as can So that the message registration in mobile terminal to be compared with the phone of beneficiary, to verify whether user is led to excessively with beneficiary Words.
In more implement, beneficiary information is being compared with above-mentioned chat record, to verify that above-mentioned chat is remembered When recording the communication record for whether including user and beneficiary, it can be combined with entering above-mentioned chat record using keyword or field The mode of row filtering, so that the result is more accurate.Specifically, mobile terminal can with predetermined keyword or field information, than Such as default " transferring accounts ", " remittance ", " collecting money from the audience ", " account " and " * * * members " keyword or field information, what is be locally stored After chat record, search chat record in whether there is with above-mentioned keyword or field information, if in chat record exist and pass The record that keyword or field information are consistent, then the record is compared with beneficiary information.
If the not communication record comprising user and the beneficiary, mobile terminal then obtains the article to be purchased that is locally stored The amount of money.Specifically, to electric business shopping platform in mobile terminal or shopping cart or collection in other softwares that can be consumed In the article amount of money extracted, define the shopping in electric business shopping platform or other softwares that can be consumed in mobile terminal The article amount of money in car or collection is the amount of money of article to be purchased, and the amount of money of above-mentioned article to be purchased and this Payment Amount are carried out Compare, if the amount of money of the article to be purchased mismatches with Payment Amount, judge this payment request exception, mobile terminal does not perform The operation of this payment.Accordingly, if the amount of money of the article to be purchased matches with Payment Amount, this payment request is judged Normally, mobile terminal performs the operation of this payment.
As a kind of embodiment, beneficiary information is compared with chat record in mobile terminal, judges the chat When not including user and the communication record of the beneficiary in record, mobile terminal can also obtain the order letter being locally stored Breath.Specifically, electric business shopping platform in mobile terminal or the sequence information in other softwares that can be consumed are retrieved, And the amount of money in sequence information is extracted, the amount of money in order is compared with Payment Amount, if the gold in the order Volume mismatches with Payment Amount, then judges this payment request exception, do not perform the operation of this payment;If in the order The amount of money matches with Payment Amount, then judges that this described payment request is normal, and mobile terminal performs the operation of this payment.
Certainly, if including user and the communication record of the beneficiary in checking chat record, the payment request is judged Normally, mobile terminal performs the operation of this payment.
In more implement, if mobile terminal judges payment request exception, mobile terminal can issue the user with police Show information, reference picture 11, can be realized in a manner of voice is prompted.Certainly, mobile terminal can also show information warning.
The present embodiment obtains beneficiary corresponding to the payment request and believed first when mobile terminal detects payment request Breath, and then the beneficiary information is compared with the blacklist to prestore, the present invention first verifies that beneficiary in this way Whether information is in blacklist, and the receipts are drawn after the beneficiary information is compared mobile terminal with the blacklist to prestore When money side's information is not in blacklist, further verify in mobile terminal locally store information whether include and the payment request Related information, if not including the information related to the payment request in checking locally store information, mobile terminal judges should Payment request is abnormal, enters without performing the operation to account payable, is provided safeguard for the account safety of user, prevent the account of user Fund steals brush in the case where accounts information is not informed other people or defrauded of by strange third party, protects the property of user to pacify Entirely.
Further, reference picture 4, the present invention prevent the method second embodiment of the stolen brush of account from providing one kind and preventing account The method of stolen brush, based on the embodiment shown in above-mentioned Fig. 4, include before step S10:
Step S11, when detecting payment request, obtain the Payment Amount of the payment request;
Step S12, judges whether the Payment Amount is more than or equal to the pre-determined lower limit amount of money and is less than or equal on default Limit the amount of money;
Step S13, if the Payment Amount is more than or equal to the pre-determined lower limit amount of money and is less than or equal to the preset upper limit amount of money, Beneficiary information corresponding to then obtaining.
In the present embodiment, when mobile terminal detects payment request, the Payment Amount of the payment request is carried out first Extraction, and then the Payment Amount is judged, just perform to obtain only when Payment Amount meets default amount of money scope and receive The step of money side's information.Specifically, the lower limit amount of money and the upper limit amount of money of payment are pre-set in mobile terminal, can be according to user's Need to set the suitable lower limit amount of money and the upper limit amount of money.After mobile terminal obtains Payment Amount, by the Payment Amount respectively with The above-mentioned upper limit amount of money and the lower limit amount of money are compared, when comparison result is that Payment Amount is more than or equal to the pre-determined lower limit amount of money and small When the upper limit amount of money, obtain beneficiary information corresponding to the payment request, the beneficiary information include beneficiary account, The essential informations such as name, phone, Email and IP address.Mobile terminal extracts beneficiary information from payment request.Such as The payment lower limit amount of money of setting is 100 yuan, and the upper limit amount of money is 1000 yuan, only when the Payment Amount of payment request is to be more than or wait During in 100 yuan and less than or equal to 1000 yuan, mobile terminal just further obtains beneficiary information.
The present embodiment mobile terminal judged the Payment Amount of payment request first when detecting payment request, Only when Payment Amount meets default amount of money scope, just carry out obtaining the operation of beneficiary information.
Further, reference picture 5, the present invention prevent the method 3rd embodiment of the stolen brush of account from providing one kind and preventing account The method of stolen brush, based on above-described embodiment, also include after step S12:
Step S120, if the Payment Amount is more than the preset upper limit amount of money, user is prompted to confirm corresponding pay the bill Request, its schematic diagram reference picture 12;
Step S121, when detecting user's payment request unconfirmed, judge that the payment request is abnormal, do not hold Operation of the row to account payable.
Step S1210, confirm the payment request when being not detected by user in preset time threshold, then judge described pay Money request is abnormal, does not perform the operation to account payable;
In the present embodiment, mobile terminal is provided with to be chosen whether to confirm the function of paying for user.Specifically, when mobile whole When end judges that Payment Amount is more than the preset upper limit amount of money, the display interface of terminal can eject the window for whether confirming payment.Meanwhile The time threshold also to whether the time for confirming to pay is preset with time threshold, is generally arranged to 60 seconds, specifically by mobile terminal It can be configured during implementation according to being actually needed, it will be appreciated by persons skilled in the art that when being configured to time threshold, Time threshold is not easy too small, is not easy to excessive.If mobile terminal is not detected by user in preset time threshold confirms described pay Money is asked, then judges that the payment request is abnormal, and payment operation corresponding to rejection.
In more implement, if mobile terminal detects that user confirms the payment request in preset time threshold When, then judge that the payment request is normal, payment operation corresponding to mobile terminal execution.
For example the preset upper limit amount of money that mobile terminal is set is 1000 yuan, preset time threshold is 60 seconds, works as mobile terminal When the payment request detected is 1800 yuan, whether the display interface of mobile terminal ejects immediately confirms that the window of payment supplies user Selection, if mobile terminal is not detected by user's confirmation payment in 60 seconds, judge that the payment request is abnormal, and rejection is corresponding Payment operation;If being detected in 60 seconds, user confirms payment, judges that the payment request is normal, and mobile terminal performs 1800 yuan of payment operation.
The present embodiment prompts user to confirm this when mobile terminal judges that this Payment Amount is more than the preset upper limit amount of money Payment request, and the time of confirmation is limited, it is further ensured that the safety of account fund.
Further, reference picture 6, the present invention prevent the method fourth embodiment of the stolen brush of account from providing one kind and preventing account The method of stolen brush, based on above-described embodiment, step S30 includes:
Step S31, if the beneficiary information is not in blacklist, obtain the chat record in locally store information;
Step S32, the chat record is compared with beneficiary information, to verify whether the chat record includes User and the communication record of the beneficiary.
The beneficiary information is compared with the blacklist to prestore in mobile terminal for the present embodiment, and judges beneficiary When information is not in blacklist, the chat record in acquisition for mobile terminal locally store information.The chat record includes mobile whole Chat record in all message registrations in end, short message record, social software, electric business shopping platform or other can be consumed Software in chat record etc..After above-mentioned chat record is obtained, obtained beneficiary information and above-mentioned chat are remembered Record is compared, to verify whether the chat record includes user and the communication record of the beneficiary.Such as can be by movement Message registration in terminal is compared with the phone of beneficiary, to verify whether user carried out call with beneficiary.
In more implement, beneficiary information is being compared with above-mentioned chat record, to verify that the chat is remembered When whether record includes user and the communication record of the beneficiary, it can be combined with using keyword or field to above-mentioned chat record The mode filtered, so that the result is more accurate.Specifically, mobile terminal can with predetermined keyword or field information, Such as keyword or the field information such as default " transferring accounts ", " remittance ", " collecting money from the audience ", " account " and " * * * members ", it is being locally stored Chat record after, search chat record in whether there is and above-mentioned keyword or field information.If in chat record exist with The record that keyword or field information are consistent, then the record is compared with beneficiary information.
When verifying in above-mentioned chat record comprising the communication record between user and beneficiary, mobile terminal judges this pair Money request is normal, payment operation corresponding to execution.
The present embodiment judges chat note by way of beneficiary information is compared with the chat record being locally stored In record whether the communication record comprising user and the beneficiary so that the more one layer of guarantee of the operation of payment, to avoid to different Normal payment request is operated.
Further, reference picture 7, the present invention prevent the embodiment of method the 5th of the stolen brush of account from providing one kind and preventing account The method of stolen brush, based on above-described embodiment, include after step S32:
Step S320, if communication record of the chat record not comprising user with the payee, obtains local deposit Store up the amount of money of article to be purchased in information;
Step S321, the amount of money of the article to be purchased is compared with Payment Amount;
Step S322, if the amount of money of the article to be purchased mismatches with Payment Amount, judge that the payment request is abnormal, The operation to account payable is not performed.
In the present embodiment, beneficiary information is compared with chat record in mobile terminal, obtained result is chatted to be somebody's turn to do When user and the communication record of the beneficiary are not included in its record, the gold for the article to be purchased that acquisition for mobile terminal is locally stored Volume.The amount of money of the article to be purchased includes electric business shopping platform in mobile terminal or the shopping cart in other softwares that can be consumed Or the article amount of money in collection.Specifically, in electric business shopping platform in mobile terminal or other softwares that can be consumed Shopping cart or collection in the article amount of money extracted, the above-mentioned article amount of money is compared with this Payment Amount, if The article amount of money mismatches with Payment Amount, then judges this payment request exception, do not perform the operation of this payment.Than Such as, the Payment Amount of payment request is 888 yuan, and the article amount of money in the shopping cart that mobile terminal obtains only has 700 yuan, then sentences This fixed payment request is abnormal, does not perform the operation of this payment.
In more implement, if the article amount of money matches with Payment Amount, judge that this described payment request is normal, Mobile terminal performs the operation of this payment.
As a kind of embodiment, beneficiary information is compared with chat record in mobile terminal, judges the chat When not including user and the communication record of the beneficiary in record, mobile terminal can also obtain the order letter being locally stored Breath.Specifically, electric business shopping platform in mobile terminal or the sequence information in other softwares that can be consumed are retrieved, And the amount of money in sequence information is extracted, the amount of money in order is compared with Payment Amount, if the gold in the order Volume mismatches with Payment Amount, then judges this payment request exception, do not perform the operation of this payment;If in the order The amount of money matches with Payment Amount, then judges that this described payment request is normal, and mobile terminal performs the operation of this payment.
Beneficiary information is compared with chat record in mobile terminal for the present embodiment, judges not wrap in the chat record During communication record containing user and the beneficiary, further by the amount of money for the article to be purchased being locally stored and this Payment Amount It is compared, the amount of money of article to be purchased then judges this payment request exception, entered without performing sheet with being mismatched with Payment Amount The operation of secondary payment, avoid operating abnormal payment request.
Further, reference picture 8, the present invention prevent the method sixth embodiment of the stolen brush of account from providing one kind and preventing account The method of stolen brush, based on above-described embodiment, also include after step S12:
Step S122, if the Payment Amount is less than the pre-determined lower limit amount of money, judge the current of corresponding payment request Whether the frequency is more than default payment request frequency threshold value;
Step S123, if the current frequency of the payment request, which is more than, presets payment request frequency threshold value, described in judgement Payment request is abnormal, does not perform the operation to account payable.
In the present embodiment, mobile terminal is also preset with payment frequency threshold value, is less than the pre-determined lower limit amount of money for Payment Amount Payment request situation, payment frequency threshold value can be set, if Payment Amount is less than the pre-determined lower limit amount of money but payment request The current frequency is more than default payment frequency threshold value, then judges payment request exception, enter without payment operation corresponding to execution.Only There is the current frequency for being less than the pre-determined lower limit amount of money and this payment request when Payment Amount to be less than or equal to the default payment frequency During threshold value, just judge that the payment request is normal, and then payment operation corresponding to execution.If the Payment Amount of payment request is small In the pre-determined lower limit amount of money, but the current frequency of the payment request is more than default payment request frequency threshold value, then judges that the payment please Ask abnormal, mobile terminal does not perform payment operation.When it is implemented, the payment frequency threshold value can be set according to being actually needed Put.For example it is less than 100 yuan of payment request for Payment Amount, the frequency threshold value of default payment is arranged to every by mobile terminal It 3 times, only when the current frequency that Payment Amount is less than 100 yuan and the payment request is the first time on the same day, second or the Payment operation corresponding to just being performed when three times.
The present embodiment is when mobile terminal judges that this Payment Amount is less than the pre-determined lower limit amount of money, the payment to this kind of situation The frequency is limited, and more one layer of protection are provided safely for the account fund of user.
To be best understood from the present embodiment, reference picture 9, Fig. 9 is the method application scenarios that establishment of fund of the present invention throws plan surely Schematic diagram, citing application scenarios are as follows:
When mobile terminal detects the payment request on foreground or backstage, payment gold corresponding to the payment request is obtained first Volume, and then the Payment Amount is judged, if Payment Amount further obtains the payment without departing from default amount of money scope Beneficiary information corresponding to request.
If mobile terminal judges that Payment Amount is more than the preset upper limit amount of money, payment request corresponding to user's confirmation is prompted, if When mobile terminal detects that user confirms the payment request in preset time threshold, then judge that the payment request is normal, Payment operation corresponding to mobile terminal execution;If mobile terminal is not detected by user in preset time threshold confirms that the payment please Ask, then judge payment request exception, payment operation corresponding to execution.
In mobile terminal after beneficiary information is got, the beneficiary information and mobile terminal are prestored in blacklist Information is compared, to verify whether the information of the beneficiary is in blacklist, if the result is the beneficiary information In blacklist, then payment request exception is judged, mobile terminal does not perform the payment operation;If the result is the gathering Whether the information of side is not in blacklist, then comprising user and gathering in the information that further checking mobile terminal is locally stored Side is for the related communication record of this payment request;If the result be in locally store information comprising user and beneficiary it Between the communication record related to this payment request, mobile terminal then judges that the payment request is normal, and mobile terminal performs this pair Money operates;If the result is not comprising related for this payment request between user and beneficiary in locally store information Communication record, then the amount of money of article to be purchased in the shopping cart or collection that mobile terminal is locally stored further is obtained, this is treated The amount of money of shopping product is compared with Payment Amount corresponding to this payment request, if the amount of money of article to be purchased please with this payment Payment Amount matching, then judge that the payment request is normal corresponding to asking, and mobile terminal performs the payment operation, if article to be purchased Amount of money Payment Amount corresponding with this payment request mismatches, then judges payment request exception, and mobile terminal does not perform this Payment operation.
In addition, when mobile terminal is judged Payment Amount, if mobile terminal judges that Payment Amount is less than pre-determined lower limit The amount of money, determines whether the current frequency of corresponding payment request is more than default payment request frequency threshold value, the payment request The current frequency be less than or equal to it is default payment the frequency threshold value when, judge that the payment request is normal, so perform corresponding to pay Money operates, and otherwise judges payment request exception, and mobile terminal does not perform the payment operation.
In the case of above-mentioned mobile terminal judges that payment request is abnormal, mobile terminal can issue the user with warning letter Breath, prompted by voice or realized in a manner of display interface shows information warning.
The present invention provides safeguard for the account safety of user through the above way, prevents the account fund of user from believing in account Breath is stolen by strange third party in the case of not informing other people or being defrauded of and brushed, and protects the property safety of user.
In addition, the embodiment of the present invention also proposes a kind of device for preventing the stolen brush of account, it is described to prevent account to be stolen brush Device includes:Memory, processor and what is be stored on the memory and can run on the processor prevent account quilt The program of brush is stolen, it is described to prevent the equation of the stolen brush of account is realized during the computing device from preventing account as described above The step of method of stolen brush.
Wherein, the program for preventing the stolen brush of account that the present invention prevents from storing in the device of the stolen brush of account is held by processor Capable specific embodiment and the above-mentioned each embodiment of method for preventing the stolen brush of account are essentially identical, and therefore not to repeat here.
In addition, the embodiment of the present invention also proposes a kind of computer-readable recording medium.
Being stored with computer-readable recording medium of the present invention prevents the method program of the stolen brush of account, described to prevent account The program of stolen brush realizes the step of method as described above for preventing account to be stolen brush when being executed by processor.
Wherein, the program for preventing the stolen brush of account stored in computer-readable recording medium of the present invention is executed by processor Specific embodiment and it is above-mentioned prevent the stolen brush of account each embodiment of method it is essentially identical, therefore not to repeat here.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

  1. A kind of 1. method for preventing the stolen brush of account, it is characterised in that the described method comprises the following steps:
    When detecting payment request, beneficiary information corresponding to the payment request is obtained;
    The beneficiary information is compared with the blacklist to prestore;
    If the beneficiary information is not in blacklist, verify in locally store information whether include and the payment request phase The information of pass;
    If not including the information related to the payment request in the locally store information, judge that the payment request is different Often, the operation to account payable is not performed.
  2. 2. the method as claimed in claim 1 for preventing the stolen brush of account, it is characterised in that described to detect payment request When, include before the step of obtaining beneficiary information corresponding to the payment request:
    When detecting payment request, the Payment Amount of the payment request is obtained;
    Judge whether the Payment Amount is more than or equal to the pre-determined lower limit amount of money and is less than or equal to the preset upper limit amount of money;
    If the Payment Amount is more than or equal to the pre-determined lower limit amount of money and is less than or equal to the preset upper limit amount of money, corresponding to acquisition Beneficiary information.
  3. 3. the method as claimed in claim 2 for preventing the stolen brush of account, it is characterised in that described to judge that the Payment Amount is Also include after no the step of being more than or equal to the pre-determined lower limit amount of money and being less than or equal to the preset upper limit amount of money:
    If the Payment Amount is more than the preset upper limit amount of money, payment request corresponding to user's confirmation is prompted;
    When being not detected by user's confirmation payment request, judge that the payment request is abnormal, do not perform to account payable Operation.
  4. 4. the as claimed in claim 3 method for preventing the stolen brush of account, it is characterised in that described when being not detected by user's confirmation During payment request, the step of judging that the payment request is abnormal, not performing the operation to account payable, includes:
    Confirm the payment request when being not detected by user in preset time threshold, then judge that the payment request is abnormal, and The operation to account payable is not performed.
  5. 5. the method as claimed in claim 1 for preventing the stolen brush of account, it is characterised in that if the beneficiary information is not In blacklist, then verify that the step of whether including the information related to the payment request in locally store information includes:
    If the beneficiary information is not in blacklist, the chat record in locally store information is obtained;
    The chat record is compared with beneficiary information, to verify the chat record whether comprising user and the receipts The communication record of money side.
  6. 6. the method as claimed in claim 5 for preventing the stolen brush of account, it is characterised in that described by the chat record and receipts Money side's information is compared, with verify the chat record whether communication record comprising user and the beneficiary the step of it After include:
    If communication record of the chat record not comprising user with the payee, obtains and waits to do shopping in locally store information The amount of money of product;
    The amount of money of the article to be purchased is compared with the Payment Amount;
    If the amount of money of the article to be purchased mismatches with Payment Amount, judge that the payment request is abnormal, do not perform correspondence The operation of payment.
  7. 7. the method as claimed in claim 2 for preventing the stolen brush of account, it is characterised in that described to judge that the Payment Amount is Also include after no the step of being more than or equal to the pre-determined lower limit amount of money and being less than or equal to the preset upper limit amount of money:
    If the Payment Amount is less than the pre-determined lower limit amount of money, judge whether the current frequency of corresponding payment request is more than in advance If payment request frequency threshold value;
    If the current frequency of the payment request is more than default payment request frequency threshold value, judge that the payment request is abnormal, The operation to account payable is not performed.
  8. 8. the method for preventing the stolen brush of account as any one of claim 1 to 7, it is characterised in that methods described is also Including:
    When judging the payment request exception, information warning or voice message information warning are shown.
  9. 9. a kind of device for preventing the stolen brush of account, it is characterised in that the device for preventing the stolen brush of account includes:Storage Device, processor and the program for preventing the stolen brush of account that is stored on the memory and can run on the processor, institute Stating prevents the program of the stolen brush of account is realized during the computing device from being prevented as any one of claim 1 to 8 The step of method of the stolen brush of account.
  10. 10. a kind of computer-readable recording medium, it is characterised in that being stored with the computer-readable recording medium prevents account The program of the stolen brush in family, the program for preventing that account is stolen brush are realized when being executed by processor as any in claim 1 to 8 Described in the step of preventing the method for the stolen brush of account.
CN201710644915.XA 2017-07-31 2017-07-31 Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account Pending CN107437181A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710644915.XA CN107437181A (en) 2017-07-31 2017-07-31 Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710644915.XA CN107437181A (en) 2017-07-31 2017-07-31 Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account

Publications (1)

Publication Number Publication Date
CN107437181A true CN107437181A (en) 2017-12-05

Family

ID=60460347

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710644915.XA Pending CN107437181A (en) 2017-07-31 2017-07-31 Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account

Country Status (1)

Country Link
CN (1) CN107437181A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234644A (en) * 2017-12-29 2018-06-29 北京乐盟互动科技有限公司 The control method and device of business risk
CN108280358A (en) * 2018-02-12 2018-07-13 北京金山安全软件有限公司 Information reminding method and device and electronic equipment
CN108320154A (en) * 2018-02-12 2018-07-24 北京金山安全软件有限公司 Digital wallet asset protection method and device, electronic equipment and storage medium
CN108960058A (en) * 2018-05-31 2018-12-07 平安科技(深圳)有限公司 Invoice method of calibration, device, computer equipment and storage medium
CN109670812A (en) * 2018-09-11 2019-04-23 深圳平安财富宝投资咨询有限公司 Method of payment, device, terminal and storage medium
CN110033362A (en) * 2018-11-14 2019-07-19 阿里巴巴集团控股有限公司 One kind beating money method, device and equipment
CN110766549A (en) * 2018-07-27 2020-02-07 翟红鹰 Digital asset safe transaction method and device, computer equipment and storage medium
CN110838012A (en) * 2018-08-16 2020-02-25 腾讯科技(深圳)有限公司 Payment method, storage medium and related equipment
CN111126989A (en) * 2019-12-31 2020-05-08 中国银行股份有限公司 Transfer transaction processing method and device
CN111292083A (en) * 2020-01-23 2020-06-16 广州酷旅旅行社有限公司 Payment management method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012051032A2 (en) * 2010-10-16 2012-04-19 Visa International Service Association Switchable access device and methods
CN106507352A (en) * 2016-10-28 2017-03-15 北京奇虎科技有限公司 The website identification method of short message verification code and identification terminal
CN106934607A (en) * 2015-12-31 2017-07-07 华为技术有限公司 A kind of method of payment, payment system service end and payment devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012051032A2 (en) * 2010-10-16 2012-04-19 Visa International Service Association Switchable access device and methods
CN106934607A (en) * 2015-12-31 2017-07-07 华为技术有限公司 A kind of method of payment, payment system service end and payment devices
CN106507352A (en) * 2016-10-28 2017-03-15 北京奇虎科技有限公司 The website identification method of short message verification code and identification terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234644A (en) * 2017-12-29 2018-06-29 北京乐盟互动科技有限公司 The control method and device of business risk
CN108280358A (en) * 2018-02-12 2018-07-13 北京金山安全软件有限公司 Information reminding method and device and electronic equipment
CN108320154A (en) * 2018-02-12 2018-07-24 北京金山安全软件有限公司 Digital wallet asset protection method and device, electronic equipment and storage medium
CN108280358B (en) * 2018-02-12 2020-10-30 北京金山安全软件有限公司 Information reminding method and device and electronic equipment
CN108960058A (en) * 2018-05-31 2018-12-07 平安科技(深圳)有限公司 Invoice method of calibration, device, computer equipment and storage medium
CN110766549A (en) * 2018-07-27 2020-02-07 翟红鹰 Digital asset safe transaction method and device, computer equipment and storage medium
CN110838012A (en) * 2018-08-16 2020-02-25 腾讯科技(深圳)有限公司 Payment method, storage medium and related equipment
CN110838012B (en) * 2018-08-16 2023-09-19 腾讯科技(深圳)有限公司 Payment method, storage medium and related equipment
CN109670812A (en) * 2018-09-11 2019-04-23 深圳平安财富宝投资咨询有限公司 Method of payment, device, terminal and storage medium
CN110033362A (en) * 2018-11-14 2019-07-19 阿里巴巴集团控股有限公司 One kind beating money method, device and equipment
CN111126989A (en) * 2019-12-31 2020-05-08 中国银行股份有限公司 Transfer transaction processing method and device
CN111292083A (en) * 2020-01-23 2020-06-16 广州酷旅旅行社有限公司 Payment management method and device, computer equipment and storage medium
CN111292083B (en) * 2020-01-23 2023-09-15 广州酷旅旅行社有限公司 Payment management method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107437181A (en) Prevent the method, apparatus and computer-readable recording medium of the stolen brush of account
CN107527200A (en) A kind of payment management method, mobile terminal and computer-readable recording medium
CN107918850A (en) A kind of express delivery information processing method, terminal and computer-readable recording medium
CN107885474A (en) Multi-screen terminal mobile payment control method, terminal and computer-readable recording medium
CN107507007A (en) One kind pays 2 D code verification method, terminal and computer-readable recording medium
CN107133797A (en) One kind pays abnormal automatic testing method, terminal and computer-readable recording medium
CN107734128A (en) One kind swindle number identification method and equipment
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN108062489A (en) A kind of glance prevention method, terminal and computer readable storage medium
CN107230058A (en) A kind of method of payment, equipment, server and computer-readable recording medium
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN107818459A (en) Red packet sending method, terminal and storage medium based on augmented reality
CN107358432A (en) Mobile terminal is swiped the card method, apparatus and computer-readable recording medium
CN109885999A (en) A kind of account register method, terminal and computer readable storage medium
CN107908617A (en) A kind of consumption statistic method, terminal and computer-readable recording medium
CN107124718A (en) Data transmission method, mobile terminal and storage medium
CN108601004A (en) NFC uses bootstrap technique, mobile terminal and computer readable storage medium
CN107590656A (en) A kind of method, terminal and computer-readable recording medium for obtaining Quick Response Code
CN108510264A (en) Method of payment, mobile terminal and readable storage medium storing program for executing
CN107527036A (en) A kind of Environmental security detection method, terminal and computer-readable recording medium
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN107133795A (en) A kind of method, equipment and computer-readable recording medium for switching payment environment
CN109788131A (en) Notification message processing method, terminal and computer readable storage medium
CN109600714A (en) A kind of method of payment, terminal and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171205