CN113918905A - Service processing method and device and electronic equipment - Google Patents

Service processing method and device and electronic equipment Download PDF

Info

Publication number
CN113918905A
CN113918905A CN202111404875.4A CN202111404875A CN113918905A CN 113918905 A CN113918905 A CN 113918905A CN 202111404875 A CN202111404875 A CN 202111404875A CN 113918905 A CN113918905 A CN 113918905A
Authority
CN
China
Prior art keywords
security authentication
service request
target user
user
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111404875.4A
Other languages
Chinese (zh)
Inventor
窦方钰
沈涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202111404875.4A priority Critical patent/CN113918905A/en
Publication of CN113918905A publication Critical patent/CN113918905A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides a service processing method, a service processing device and electronic equipment, wherein in the service processing method, after a service request sent by a target user is received, the current geographical position of the target user is determined according to the service request, and then whether the target user carries out security authentication at the current geographical position within a first preset time before the current time is judged; if the target user does not perform security authentication at the current geographical position within a first preset time before the current time, acquiring a trusted user of the target user according to the type of the service request, and acquiring a security authentication record of the trusted user; and finally, processing the service request according to the security authentication record of the trusted user.

Description

Service processing method and device and electronic equipment
[ technical field ] A method for producing a semiconductor device
The embodiment of the specification relates to the technical field of internet, in particular to a service processing method and device and electronic equipment.
[ background of the invention ]
In the prior art, e-commerce companies perform risk control to guarantee the safety of accounts and transactions of users. When risk control is performed, judgment is generally performed based on base station information and/or geographical location information frequently used by a user, and when the user is found to be in a brand-new geographical location, the risk that the account of the user is stolen is very high, so that various kinds of identity verification can be started, for example, the input of a mobile phone check code is performed.
However, such a risk control scenario often disturbs the normal use of the user, for example, when the user travels, the user may be verified due to the change of the geographic location information; even when the user is out of the way and international roaming is not opened, the check can directly influence normal user operation behaviors and block normal transaction behaviors.
[ summary of the invention ]
The embodiment of the specification provides a service processing method, a service processing device and electronic equipment, so that a service request of a target user is processed according to a security authentication record of a trusted user of the target user, the operation disturbance rate of the security authentication on the service request of the target user is reduced, and the use experience of the target user is improved.
In a first aspect, one or more embodiments of the present specification provide a service processing method, including: receiving a service request sent by a target user; determining the current geographic position of the target user according to the service request; judging whether the target user is subjected to security authentication at the current geographical position within a first preset time before the current time; if the target user is not subjected to security authentication at the current geographical position within a first preset time before the current time, acquiring a trusted user of the target user according to the type of the service request, and acquiring a security authentication record of the trusted user; and processing the service request according to the security authentication record of the trusted user.
In one possible implementation manner, the processing the service request according to the security authentication record of the trusted user includes: acquiring the geographical position, the authentication time and the security authentication level of the trusted user for security authentication from the security authentication record of the trusted user; if the geographic position of the trusted user for performing security authentication and the geographic position of the target user currently belong to the same area, the distance is within a preset range, the difference between the authentication time of the trusted user for performing security authentication and the time of the target user for sending the service request is less than or equal to a second preset time, and the security authentication level of the trusted user is not lower than the security authentication level required by the service request, performing security authentication on the target user; and processing the service request after the target user passes the security authentication.
In one possible implementation manner, the performing security authentication on the target user includes: exempt the target user from security authentication of the service request; or, reducing the security authentication level of the service request performed by the target user.
In one possible implementation manner, the obtaining, according to the type of the service request, the trusted user of the target user includes: determining the safety authentication level required by the service request according to the type of the service request; and acquiring the trusted user matched with the security authentication level required by the service request from the trusted users of the target user.
In one possible implementation manner, before the obtaining, according to the type of the service request, the trusted user of the target user, the method further includes: acquiring historical data of the target user; performing data cleaning on the historical data, and calculating by using the cleaned data to obtain a trusted user of the target user and a security authentication level corresponding to the trusted user; or, acquiring the trusted user set by the target user and the security authentication level corresponding to the trusted user.
In one possible implementation manner, before obtaining the security authentication record of the trusted user, the method further includes: when the trusted user carries out a service request, carrying out security authentication on the trusted user; and storing the security authentication record of the trusted user, wherein the security authentication record of the trusted user comprises the geographic position, the authentication time and the security authentication level of the security authentication of the trusted user.
In a second aspect, one or more embodiments of the present specification provide a service processing apparatus, including: the receiving module is used for receiving a service request sent by a target user; the acquisition module is used for determining the current geographic position of the target user according to the service request received by the receiving module; the judging module is used for judging whether the target user carries out safety authentication at the current geographic position within a first preset time before the current time; the obtaining module is further configured to, when the target user is not subjected to security authentication at the current geographic location within a first predetermined time period before the current time, obtain a trusted user of the target user according to the type of the service request, and obtain a security authentication record of the trusted user; and the processing module is used for processing the service request according to the security authentication record of the trusted user.
In one possible implementation manner, the processing module includes: the information acquisition submodule is used for acquiring the geographical position, the authentication time and the security authentication level of the security authentication of the trusted user from the security authentication record of the trusted user; the safety authentication sub-module is used for performing safety authentication on the target user when the geographical position where the trusted user performs safety authentication and the geographical position where the target user is located belong to the same area, the distance is within a preset range, the difference between the authentication time of the trusted user performing safety authentication and the time when the target user sends a service request is less than or equal to a second preset time length, and the safety authentication level of the trusted user is not lower than the safety authentication level required by the service request; and the service processing submodule is used for processing the service request after the target user passes the security authentication.
In one possible implementation manner, the security authentication sub-module is specifically configured to avoid security authentication of the service request by the target user; or, reducing the security authentication level of the service request performed by the target user.
In one possible implementation manner, the obtaining module is specifically configured to determine, according to the type of the service request, a security authentication level required by the service request; and acquiring the trusted user matched with the security authentication level required by the service request from the trusted users of the target users.
In one possible implementation manner, the obtaining module is further configured to obtain historical data of the target user; performing data cleaning on the historical data, and calculating by using the cleaned data to obtain a trusted user of the target user and a security authentication level corresponding to the trusted user; or, acquiring the trusted user set by the target user and the security authentication level corresponding to the trusted user.
In one possible implementation manner, the apparatus further includes: the security authentication module is used for performing security authentication on the trusted user when the trusted user performs a service request before the security authentication record of the trusted user is acquired by the acquisition module; and storing the security authentication record of the trusted user, wherein the security authentication record of the trusted user comprises the geographic position, the authentication time and the security authentication level of the security authentication of the trusted user.
In a third aspect, one or more embodiments of the present specification provide an electronic device comprising: at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, which when called by the processor are capable of performing the method as described above.
In a fourth aspect, one or more embodiments of the present specification provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the method as described above.
In the technical scheme, after receiving a service request sent by a target user, determining the current geographical position of the target user according to the service request, and then judging whether the target user is subjected to security authentication at the current geographical position within a first preset time before the current time; if the target user does not perform security authentication at the current geographical position within a first preset time before the current time, acquiring a trusted user of the target user according to the type of the service request, and acquiring a security authentication record of the trusted user; and finally, the service request is processed according to the security authentication record of the trusted user, so that the service request of the target user can be processed according to the security authentication record of the trusted user of the target user, the operation disturbance rate of the security authentication on the service request of the target user is reduced, and the use experience of the target user is improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of one or more embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of a business process method of the present specification;
FIG. 2 is a flow chart of another embodiment of a business process method of the present specification;
FIG. 3 is a flow chart of yet another embodiment of a business process method of the present specification;
FIG. 4 is a flow chart of yet another embodiment of a business process method of the present specification;
FIG. 5 is a flow chart of yet another embodiment of a business process method of the present specification;
FIG. 6 is a schematic structural diagram of an embodiment of a service processing apparatus according to the present disclosure;
fig. 7 is a schematic structural diagram of another embodiment of a service processing device in the present specification;
fig. 8 is a schematic structural diagram of an embodiment of an electronic device in the present specification.
[ detailed description ] embodiments
For a better understanding of the technical solutions of one or more embodiments of the present description, one or more embodiments of the present description will be described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the present specification, and not all embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments in the present specification without any inventive step are within the scope of protection of the present specification.
The terminology used in the one or more embodiments of the description is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in one or more embodiments of the specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In general, a user travels with other places, accompanied by family and friends. Therefore, in the relatives and friends who travel together, after the first person performs the stricter security authentication (for example, the face authentication) in the remote operation, the disturbance of the subsequent security authentication of other persons should be reduced.
Based on the above scenario, embodiments of the present specification provide a service processing method, which reduces an operation disturbance rate of a target user when the target user performs a service request according to a security authentication record of a trusted user of the target user.
Fig. 1 is a flowchart of an embodiment of a service processing method in this specification, and as shown in fig. 1, the service processing method may include:
step 101, receiving a service request sent by a target user.
And step 102, determining the current geographic position of the target user according to the service request.
Specifically, the current geographic location of the target user may be determined according to the source address carried in the service request; or the current geographical location of the target user may be determined according to the base station used by the target user to send the service request, and the embodiment does not limit the manner of determining the current geographical location of the target user.
In a specific implementation, the current geographic location of the target user may be a geographic location different from the frequent location of the target user, that is, the target user performs the service request in a different location.
Step 103, judging whether the target user is subjected to security authentication at the current geographic position within a first preset time before the current time.
If yes, go to step 104; if the target user is not securely authenticated at the current geographic location within a first predetermined time period before the current time, step 105 is performed.
The first predetermined time period may be set according to system performance and/or implementation requirements during specific implementation, and the length of the first predetermined time period is not limited in this embodiment, for example, the first predetermined time period may be 5 days.
And 104, processing the service request.
Specifically, a security authentication record of a current geographical location of a target user within a first predetermined time before a current time may be obtained, and a security authentication level in the security authentication record may be obtained, and if the security authentication level is not lower than a security authentication level required by the service request, the service request may be directly processed; and if the security authentication level in the security authentication record is lower than the security authentication level required by the service request, performing security authentication on the target user according to the security authentication level required by the service request, and processing the service request after the target user passes the security authentication.
And 105, acquiring a trusted user of the target user according to the type of the service request, and acquiring a security authentication record of the trusted user.
And 106, processing the service request according to the security authentication record of the trusted user.
In the service processing method, after receiving a service request sent by a target user, the current geographical position of the target user is determined according to the service request, and then whether the target user carries out security authentication at the current geographical position within a first preset time before the current time is judged; if the target user does not perform security authentication at the current geographical position within a first preset time before the current time, acquiring a trusted user of the target user according to the type of the service request, and acquiring a security authentication record of the trusted user; and finally, the service request is processed according to the security authentication record of the trusted user, so that the service request of the target user can be processed according to the security authentication record of the trusted user of the target user, the operation disturbance rate of the security authentication on the service request of the target user is reduced, and the use experience of the target user is improved.
Fig. 2 is a flowchart of another embodiment of the service processing method in this specification, as shown in fig. 2, in this embodiment shown in fig. 1, step 106 may include:
step 201, obtaining the geographical location, the authentication time and the security authentication level of the security authentication performed by the trusted user from the security authentication record of the trusted user.
In this embodiment, when a user is in a different location and needs to perform a service request such as an account operation or a payment operation, the server may find the risk of the user performing the different location operation, so as to perform a relatively strict security authentication on the user. After the user performs security authentication, the server stores a security authentication record of the user, where the security authentication record may include the following fields: user identification (Identifier; hereinafter, referred to as ID), geographical location where security authentication is performed, authentication time, and security authentication level. Specifically, one example of a security authentication record may be as shown in table 1.
TABLE 1
Figure BDA0003372462700000051
The security authentication level may be a level of a security authentication product, and the security authentication product may include dozens of passwords, short message check codes, face recognition, answer authentication of reserved questions, and the like. The level of the security certification product can be as shown in table 2, and the higher the security certification level is, the higher the disturbance rate representing the security certification is, and the lower the risk after the certification is passed.
TABLE 2
Security certification product Level of security authentication
Short message check code 3
Reserving answers to questions 3
Cipher code 3
Face recognition 5
Step 202, if the geographic location where the trusted user performs the security authentication and the geographic location where the target user is currently located belong to the same area and the distance is within a predetermined range, the difference between the authentication time of the trusted user performing the security authentication and the time when the target user sends the service request is less than or equal to a second predetermined time, and the security authentication level of the trusted user is not lower than the security authentication level required by the service request, performing the security authentication on the target user.
Specifically, the fact that the geographic location where the trusted user performs the security authentication and the geographic location where the target user is currently located belong to the same area may be: the geographic location where the trusted user performs security authentication and the geographic location where the target user is currently located are located in the same administrative area, for example: the same county or city, etc.; the predetermined range may be set according to system performance and/or implementation requirements during specific implementation, and the size of the predetermined range is not limited in this embodiment, for example, the predetermined range may be 10 kilometers;
the second predetermined time period may be set according to system performance and/or implementation requirements during specific implementation, and the length of the second predetermined time period is not limited in this embodiment, for example, the second predetermined time period may be 1 day;
as described above, the security authentication level is a level of a security authentication product, and different service requests need to use different security authentication products for security authentication, so that the security authentication levels required by different service requests are different, for example, a non-fund type service request may only need to use a password or a short message check code for security authentication, as shown in table 2, the security authentication level required by the non-fund type service request is 3, and for a fund type service request, face recognition may be required for security authentication, as shown in table 2, the security authentication level required by the fund type service request is 5.
Specifically, the performing of the security authentication on the target user may be: the target user is exempted from the safety certification of the service request; or, the security authentication level of the service request of the target user is reduced.
In a specific implementation, it is assumed that a geographic location where the trusted user performs security authentication and a geographic location where a target user is currently located are in the same city and within a distance of 10 kilometers, a difference between authentication time of the trusted user performing security authentication and time of sending a service request by the target user is less than or equal to 1 day, a security authentication level of the trusted user is 5, and a security authentication level required by the service request is 3, so that it can be determined that the security level of performing the service request by the target user is greater than the security authentication level required by the service request, and it is considered that the target user has a higher reliability in the current geographic location.
Furthermore, the target user can be saved from performing the safety certification of the service request; or, the security authentication level of the service request made by the target user is lowered, for example: the target user carries out a service request, wherein face recognition is originally required, and only a password is required at present; therefore, the operation disturbance rate of the service request of the target user by the security authentication can be reduced, and the use experience of the target user is improved.
Step 203, after the target user passes the security authentication, the service request is processed.
Fig. 3 is a flowchart of a further embodiment of the service processing method in this specification, and as shown in fig. 3, in the embodiment shown in fig. 1 in this specification, step 105 may include:
step 301, determining the security authentication level required by the service request according to the type of the service request.
The first safety certification record comprises a safety certification record of the current geographical position of the target user within a first preset time before the current time.
Specifically, different service requests need to be securely authenticated using different security authentication products, so that the security authentication levels required by the different service requests are different, for example, a non-fund type service request may only need to use a password or a short message check code for security authentication, as shown in table 2, the security authentication level required by the non-fund type service request is 3, and for a fund type service request, face recognition may be required for security authentication, as shown in table 2, the security authentication level required by the fund type service request is 5.
Step 302, obtaining a trusted user matched with the security authentication level required by the service request from the trusted users of the target users.
Specifically, the server stores a trusted user list for the target user, and stores, in the trusted user list, an identifier of the trusted user and a security authentication level corresponding to the trusted user, as shown in table 3.
TABLE 3
Figure BDA0003372462700000071
Therefore, after the security authentication level required by the service request is determined, the trusted user matching the security authentication level required by the service request can be obtained from the trusted user list of the target user.
Step 303, obtaining the security authentication record of the trusted user.
Further, before the security authentication record of the trusted user is obtained, when the trusted user makes a service request, the security authentication of the trusted user is performed, and the security authentication record of the trusted user is stored, where the security authentication record of the trusted user includes a geographic location, an authentication time, and a security authentication level at which the trusted user performs the security authentication.
Fig. 4 is a flowchart of a further embodiment of the service processing method in this specification, as shown in fig. 4, in the embodiment shown in fig. 1 in this specification, before step 105, the method may further include:
step 401, obtaining historical data of the target user; performing data cleaning on the historical data, and calculating by using the cleaned data to obtain a trusted user of the target user and a security authentication level corresponding to the trusted user; or, acquiring the trusted user set by the target user and the security authentication level corresponding to the trusted user.
Specifically, referring to table 3, the security authentication levels corresponding to different trusted relatives and friends are different, for example, for a trusted user who is close to a target user, the security authentication level may be 3, and when the target user makes a non-fund type service request, the security level of the service request made by the target user may be determined according to the security authentication records of the close trusted user; for a trusted user with a relationship with a target user, for example: the security level of the parent, the couple, the child or the brother and sister of the target user can be 5, and when the target user makes a fund type service request, the security level of the service request made by the target user can be determined according to the security authentication record of the credible user having the relationship with the target user.
In this embodiment, this trust relationship between the target user and the trusted user is unidirectional and non-transitive.
In specific implementation, the trusted user of the target user and the security authentication level corresponding to the trusted user are obtained, data cleaning can be performed on the historical data of the target user in an off-line mode, and a product entrance can be developed to enable the user to set the product entrance. For example: for the fund type of the third-party payment platform, the fact that the user A and the user B are in a parent-child relationship can be calculated off line according to data such as consumption, receipt, house and/or bill, and the like, and an entrance can be opened to enable the user to set the fund type by himself.
Fig. 5 is a schematic diagram of a further embodiment of a service processing method in this specification, and as shown in fig. 5, the service processing method may include:
step 501, receiving a service request sent by a target user.
Step 502, determining the current geographical position of the target user according to the service request.
Judging whether the target user is subjected to security authentication at the current geographical position within a first preset time before the current time, and if so, processing the service request; if the target user has not been securely authenticated at the current geographic location within a first predetermined time period before the current time, step 503 is performed.
The first predetermined time period may be set according to system performance and/or implementation requirements during specific implementation, and the length of the first predetermined time period is not limited in this embodiment, for example, the first predetermined time period may be 5 days.
Step 503, obtaining the trusted user of the target user according to the type of the service request, and obtaining the security authentication record of the trusted user.
The first safety certification record comprises a safety certification record of the current geographical position of the target user within a first preset time before the current time. That is, if the target user does not perform security authentication at the current geographic location within a first predetermined time period before the current time, it is required to acquire a trusted user of the target user and acquire a security authentication record of the trusted user.
And step 504, acquiring the geographical position, the authentication time and the security authentication level of the security authentication of the trusted user from the security authentication record of the trusted user.
Step 505, if the geographic location where the trusted user performs the security authentication and the geographic location where the target user is currently located belong to the same area and the distance is within a predetermined range, the difference between the authentication time of the trusted user performing the security authentication and the time when the target user sends the service request is less than or equal to a second predetermined time, and the security authentication level of the trusted user is not lower than the security authentication level required by the service request, the target user is exempted from performing the security authentication of the service request; or, the security authentication level of the service request of the target user is reduced.
Step 506, the service request is processed.
Fig. 6 is a schematic structural diagram of an embodiment of a service processing apparatus in this specification, where the service processing apparatus in this embodiment may be used as an electronic device, or a part of the electronic device to implement the service processing method provided in this specification. As shown in fig. 6, the service processing apparatus may include: the device comprises a receiving module 61, an obtaining module 62, a judging module 63 and a processing module 64;
the receiving module 61 is configured to receive a service request sent by a target user.
An obtaining module 62, configured to determine, according to the service request received by the receiving module 61, a current geographic location of the target user; specifically, the obtaining module 62 may determine the current geographic location of the target user according to the source address carried in the service request; or the obtaining module 62 may determine the current geographic location of the target user according to the base station used by the target user to send the service request, and the embodiment does not limit the manner in which the obtaining module 62 determines the current geographic location of the target user.
In a specific implementation, the current geographic location of the target user may be a geographic location different from the frequent location of the target user, that is, the target user performs the service request in a different location.
The first predetermined time period may be set according to system performance and/or implementation requirements during specific implementation, and the length of the first predetermined time period is not limited in this embodiment, for example, the first predetermined time period may be 5 days.
The judging module 63 is configured to judge whether the target user performs security authentication at the current geographic location within a first predetermined time period before the current time;
the obtaining module 62 is further configured to, when the target user is not subjected to security authentication at the current geographic location within a first predetermined time period before the current time, obtain a trusted user of the target user according to the type of the service request, and obtain a security authentication record of the trusted user.
And the processing module 64 is configured to process the service request according to the security authentication record of the trusted user.
And the security level is used for indicating the security degree of the service request performed by the target user.
In the service processing device, after a receiving module 61 receives a service request sent by a target user, an obtaining module 62 determines a current geographical position of the target user according to the service request, and then a judging module 63 judges whether the target user has performed security authentication at the current geographical position within a first predetermined time before the current time; if the target user does not perform security authentication at the current geographic location within a first predetermined time period before the current time, the obtaining module 62 obtains a trusted user of the target user according to the type of the service request, and obtains a security authentication record of the trusted user; and finally, the processing module 64 processes the service request according to the security authentication record of the trusted user, so that the service request of the target user can be processed according to the security authentication record of the trusted user of the target user, the operation disturbance rate of the security authentication on the service request of the target user is reduced, and the use experience of the target user is improved.
Fig. 7 is a schematic structural diagram of another embodiment of a service processing apparatus in this specification, and compared with the service processing apparatus shown in fig. 6, a difference is that in the service processing apparatus provided in this embodiment, a processing module 64 may include: an information obtaining sub-module 641, a security authentication sub-module 642 and a business processing sub-module 643.
The information obtaining sub-module 641 is configured to obtain, from the security authentication record of the trusted user, a geographic location, an authentication time, and a security authentication level of the trusted user for performing security authentication.
In this embodiment, when a user is in a different location and needs to perform a service request such as an account operation or a payment operation, the service processing apparatus may find a risk of the user performing the different location operation, so as to perform a relatively strict security authentication on the user. After the user performs security authentication, the service processing apparatus may store a security authentication record of the user, where the security authentication record may include the following fields: user identification (Identifier; hereinafter, abbreviated as ID), geographical location for performing security authentication, authentication time, and security authentication level. Specifically, one example of a security authentication record may be as shown in table 1.
The security authentication level may be a level of a security authentication product, and the security authentication product may include dozens of passwords, short message check codes, face recognition, answer authentication of reserved questions, and the like. The level of the security certification product can be as shown in table 2, and the higher the security certification level is, the higher the disturbance rate representing the security certification is, and the lower the risk after the certification is passed.
And the security authentication sub-module 642 is configured to perform security authentication on the target user when a geographic location where the trusted user performs security authentication and a geographic location where the target user is currently located belong to the same area and are within a predetermined range, a difference between an authentication time of the trusted user performing security authentication and a time when the target user sends a service request is less than or equal to a second predetermined time, and a security authentication level of the trusted user is not lower than a security authentication level required by the service request.
Specifically, the fact that the geographic location where the trusted user performs the security authentication and the geographic location where the target user is currently located belong to the same area may be: the geographic location where the trusted user performs security authentication and the geographic location where the target user is currently located are located in the same administrative area, for example: the same county or city, etc.; the predetermined range may be set according to system performance and/or implementation requirements during specific implementation, and the size of the predetermined range is not limited in this embodiment, for example, the predetermined range may be 10 kilometers;
the second predetermined time period may be set according to system performance and/or implementation requirements during specific implementation, and the length of the second predetermined time period is not limited in this embodiment, for example, the second predetermined time period may be 1 day;
as described above, the security authentication level is a level of a security authentication product, and different service requests need to use different security authentication products for security authentication, so that the security authentication levels required by different service requests are different, for example, a non-fund type service request may only need to use a password or a short message check code for security authentication, as shown in table 2, the security authentication level required by the non-fund type service request is 3, and for a fund type service request, face recognition may be required for security authentication, as shown in table 2, the security authentication level required by the fund type service request is 5.
In this embodiment, the security authentication sub-module 642 is specifically configured to avoid the security authentication of the service request performed by the target user; or, the security authentication level of the service request performed by the target user is reduced.
In a specific implementation, it is assumed that the geographic location where the trusted user performs the security authentication and the geographic location where the target user is currently located are in the same city and within a distance of 10 kilometers, a difference between the authentication time of the trusted user performing the security authentication and the time when the target user sends the service request is less than or equal to 1 day, the security authentication level of the trusted user is 5, and the security authentication level required by the service request is 3, so that the security authentication sub-module 642 may determine that the security level of the target user performing the service request is not lower than the security authentication level required by the service request, and consider that the target user has a higher reliability in the current geographic location.
Furthermore, the security authentication sub-module 642 may avoid the security authentication of the service request by the target user; or, the security authentication level of the service request made by the target user is lowered, for example: the target user carries out a service request, wherein face recognition is originally required, and only a password is required at present; therefore, the operation disturbance rate of the service request of the target user by the security authentication can be reduced, and the use experience of the target user is improved.
A service processing sub-module 643, configured to process the service request after the target user passes the security authentication.
In this embodiment, the obtaining module 62 is specifically configured to determine, according to the type of the service request, a security authentication level required by the service request; and acquiring the trusted user matched with the security authentication level required by the service request from the trusted users of the target users.
Specifically, different service requests need to be securely authenticated using different security authentication products, so that the security authentication levels required by the different service requests are different, for example, a non-fund type service request may only need to use a password or a short message check code for security authentication, as shown in table 2, the security authentication level required by the non-fund type service request is 3, and for a fund type service request, face recognition may be required for security authentication, as shown in table 2, the security authentication level required by the fund type service request is 5.
The service processing apparatus stores a trusted user list for the target user, and stores the identifier of the trusted user and the security authentication level corresponding to the trusted user in the trusted user list, as shown in table 3.
Therefore, after the obtaining module 62 determines the security authentication level required by the service request, the trusted user matching the security authentication level required by the service request can be obtained from the trusted user list of the target user.
In this embodiment, the obtaining module 62 is further configured to obtain historical data of the target user; performing data cleaning on the historical data, and calculating by using the cleaned data to obtain a trusted user of the target user and a security authentication level corresponding to the trusted user; or, acquiring the trusted user set by the target user and the security authentication level corresponding to the trusted user.
Specifically, referring to table 3, the security authentication levels corresponding to different trusted relatives and friends are different, for example, for a trusted user who is close to a target user, the security authentication level may be 3, and when the target user makes a non-fund type service request, the security level of the service request made by the target user may be determined according to the security authentication records of the close trusted user; for a trusted user with a relationship with a target user, for example: the security level of the parent, the couple, the child or the brother and sister of the target user can be 5, and when the target user makes a fund type service request, the security level of the service request made by the target user can be determined according to the security authentication record of the credible user having the relationship with the target user.
In this embodiment, this trust relationship between the target user and the trusted user is unidirectional and non-transitive.
In a specific implementation, the obtaining module 62 obtains the trusted user of the target user and the security authentication level corresponding to the trusted user, may perform data cleaning on the historical data of the target user in an offline manner, and may also develop a product entry for the user to set. For example: for the fund type of the third-party payment platform, the fact that the user A and the user B are in a parent-child relationship can be calculated off line according to data such as consumption, receipt, house and/or bill, and the like, and an entrance can be opened to enable the user to set the fund type by himself.
Further, the service processing apparatus may further include: a security authentication module 64;
a security authentication module 64, configured to perform security authentication on the trusted user when the trusted user performs a service request before the obtaining module 62 obtains the security authentication record of the trusted user; and storing the security authentication record of the trusted user, wherein the security authentication record of the trusted user comprises the geographic position, the authentication time and the security authentication level of the security authentication of the trusted user.
FIG. 8 is a block diagram illustrating an embodiment of an electronic device according to the present disclosure, which may include at least one processor, as shown in FIG. 8; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, and the processor calls the program instructions to execute the service processing method provided by the embodiment of the specification.
The electronic device may be a server, for example: the cloud server, in this embodiment, does not limit the form of the electronic device.
FIG. 8 illustrates a block diagram of an exemplary electronic device suitable for use in implementing one or more embodiments of the present specification. The electronic device shown in fig. 8 is only an example, and should not bring any limitation to the function and the scope of use of one or more embodiments of the present description.
As shown in fig. 8, the electronic device is in the form of a general purpose computing device. Components of the electronic device may include, but are not limited to: one or more processors 410, a memory 430, and a communication bus 440 that connects the various system components (including the memory 430 and the processing unit 410).
Communication bus 440 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. These architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, to name a few.
Electronic devices typically include a variety of computer system readable media. Such media may be any available media that is accessible by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 430 may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) and/or cache Memory. The electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media. Although not shown in FIG. 8, a disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk Read Only Memory (CD-ROM), a Digital versatile disk Read Only Memory (DVD-ROM), or other optical media) may be provided. In these cases, each drive may be connected to the communication bus 440 by one or more data media interfaces. Memory 430 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the present description.
A program/utility having a set (at least one) of program modules, including but not limited to an operating system, one or more application programs, other program modules, and program data, may be stored in memory 430, each of which examples or some combination may include an implementation of a network environment. The program modules generally perform the functions and/or methodologies of the embodiments described herein.
The electronic device may also communicate with one or more external devices (e.g., keyboard, pointing device, display, etc.), one or more devices that enable a user to interact with the electronic device, and/or any devices (e.g., network card, modem, etc.) that enable the electronic device to communicate with one or more other computing devices. Such communication may occur via communication interface 420. Furthermore, the electronic device may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public Network such as the Internet) via a Network adapter (not shown in FIG. 8) that may communicate with other modules of the electronic device via the communication bus 440. It should be appreciated that although not shown in FIG. 8, other hardware and/or software modules may be used in conjunction with the electronic device, including but not limited to: microcode, device drivers, Redundant processing units, external disk drive Arrays, disk array (RAID) systems, tape Drives, and data backup storage systems, among others.
The processor 410 executes various functional applications and data processing, for example, implementing a business processing method provided by one or more embodiments of the present specification, by executing programs stored in the memory 430.
Embodiments of the present specification further provide a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the service processing method provided in the embodiments of the present specification.
The non-transitory computer readable storage medium described above may take any combination of one or more computer readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM), a flash Memory, an optical fiber, a portable compact disc Read Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present description may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of Network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
In the description of the specification, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the specification. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of one or more embodiments of the present specification, "a plurality" means at least two, e.g., two, three, etc., unless explicitly limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of one or more embodiments of the present specification in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of one or more embodiments of the specification.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that the terminal referred to in one or more embodiments of the present disclosure may include, but is not limited to, a Personal Computer (PC), a Personal Digital Assistant (PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and the like.
In the several embodiments provided in this specification, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present description may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods described in the embodiments of the present disclosure. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (18)

1. A method for processing a service, comprising:
receiving a service request sent by a target user;
determining the current geographic position of the target user according to the service request;
judging whether the target user is subjected to security authentication at the current geographical position within a first preset time before the current time;
if the target user is not subjected to security authentication at the current geographical position within a first preset time before the current time, acquiring a trusted user of the target user according to the type of the service request, and acquiring a security authentication record of the trusted user;
and processing the service request according to the security authentication record of the trusted user.
2. The method of claim 1, wherein the processing the service request according to the security authentication record of the trusted user comprises:
acquiring the geographical position, the authentication time and the security authentication level of the trusted user for security authentication from the security authentication record of the trusted user;
if the geographic position of the trusted user for performing security authentication and the geographic position of the target user currently belong to the same area, the distance is within a preset range, the difference between the authentication time of the trusted user for performing security authentication and the time of the target user for sending the service request is less than or equal to a second preset time, and the security authentication level of the trusted user is not lower than the security authentication level required by the service request, performing security authentication on the target user;
and processing the service request after the target user passes the security authentication.
3. The method of claim 2, wherein the securely authenticating the target user comprises:
exempt the target user from security authentication of the service request; alternatively, the first and second electrodes may be,
and reducing the security authentication level of the service request of the target user.
4. The method of claim 1, wherein the obtaining the trusted user of the target user according to the type of the service request comprises:
determining the safety authentication level required by the service request according to the type of the service request;
and acquiring the trusted user matched with the security authentication level required by the service request from the trusted users of the target user.
5. The method according to claim 1 or 4, wherein before obtaining the trusted user of the target user according to the type of the service request, the method further comprises:
acquiring historical data of the target user; performing data cleaning on the historical data, and calculating by using the cleaned data to obtain a trusted user of the target user and a security authentication level corresponding to the trusted user;
alternatively, the first and second electrodes may be,
and acquiring the trusted user set by the target user and the security authentication level corresponding to the trusted user.
6. The method according to any one of claims 1 to 4, wherein before obtaining the security authentication record of the trusted user, the method further comprises:
when the trusted user carries out a service request, carrying out security authentication on the trusted user;
and storing the security authentication record of the trusted user, wherein the security authentication record of the trusted user comprises the geographic position, the authentication time and the security authentication level of the security authentication of the trusted user.
7. The method of claim 1, wherein the determining whether the target user has been securely authenticated at the current geographic location within a first predetermined time period before the current time further comprises:
and if the target user is subjected to security authentication at the current geographical position within a first preset time before the current time, processing the service request.
8. The method of claim 7, wherein the processing the service request comprises:
acquiring a security authentication record of the current geographical position of the target user within a first preset time before the current time, acquiring a security authentication level in the security authentication record, and directly processing the service request if the security authentication level is not lower than the security authentication level required by the service request; and if the security authentication level in the security authentication record is lower than the security authentication level required by the service request, performing security authentication on the target user according to the security authentication level required by the service request, and processing the service request after the target user passes the security authentication.
9. A traffic processing apparatus, comprising:
the receiving module is used for receiving a service request sent by a target user;
the acquisition module is used for determining the current geographic position of the target user according to the service request received by the receiving module;
the judging module is used for judging whether the target user carries out safety authentication at the current geographic position within a first preset time before the current time;
the obtaining module is further configured to, when the target user is not subjected to security authentication at the current geographic location within a first predetermined time period before the current time, obtain a trusted user of the target user according to the type of the service request, and obtain a security authentication record of the trusted user;
and the processing module is used for processing the service request according to the security authentication record of the trusted user.
10. The apparatus of claim 9, wherein the processing module comprises:
the information acquisition submodule is used for acquiring the geographical position, the authentication time and the security authentication level of the security authentication of the trusted user from the security authentication record of the trusted user;
the safety authentication sub-module is used for performing safety authentication on the target user when the geographical position where the trusted user performs safety authentication and the geographical position where the target user is located belong to the same area, the distance is within a preset range, the difference between the authentication time of the trusted user performing safety authentication and the time when the target user sends a service request is less than or equal to a second preset time length, and the safety authentication level of the trusted user is not lower than the safety authentication level required by the service request;
and the service processing submodule is used for processing the service request after the target user passes the security authentication.
11. The apparatus of claim 10,
the safety certification submodule is specifically used for avoiding the safety certification of the target user for the service request; or, reducing the security authentication level of the service request performed by the target user.
12. The apparatus of claim 9,
the obtaining module is specifically configured to determine, according to the type of the service request, a security authentication level required by the service request; and acquiring the trusted user matched with the security authentication level required by the service request from the trusted users of the target users.
13. The apparatus of claim 9 or 12,
the acquisition module is further used for acquiring historical data of the target user; performing data cleaning on the historical data, and calculating by using the cleaned data to obtain a trusted user of the target user and a security authentication level corresponding to the trusted user; or, acquiring the trusted user set by the target user and the security authentication level corresponding to the trusted user.
14. The apparatus of any one of claims 9-12, further comprising:
the security authentication module is used for performing security authentication on the trusted user when the trusted user performs a service request before the security authentication record of the trusted user is acquired by the acquisition module; and storing the security authentication record of the trusted user, wherein the security authentication record of the trusted user comprises the geographic position, the authentication time and the security authentication level of the security authentication of the trusted user.
15. The apparatus of claim 9, wherein,
the processing module is further configured to process the service request when the target user performs security authentication at the current geographic location within a first predetermined time period before the current time.
16. The apparatus of claim 15, wherein,
the processing module is specifically configured to obtain a security authentication record of a current geographical location of the target user within a first predetermined time before a current time, obtain a security authentication level in the security authentication record, and directly process the service request if the security authentication level is not lower than a security authentication level required by the service request; and if the security authentication level in the security authentication record is lower than the security authentication level required by the service request, performing security authentication on the target user according to the security authentication level required by the service request, and processing the service request after the target user passes the security authentication.
17. An electronic device, comprising:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 8.
18. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1 to 8.
CN202111404875.4A 2019-12-24 2019-12-24 Service processing method and device and electronic equipment Pending CN113918905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111404875.4A CN113918905A (en) 2019-12-24 2019-12-24 Service processing method and device and electronic equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911348873.0A CN111125656B (en) 2019-12-24 2019-12-24 Service processing method and device and electronic equipment
CN202111404875.4A CN113918905A (en) 2019-12-24 2019-12-24 Service processing method and device and electronic equipment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201911348873.0A Division CN111125656B (en) 2019-12-24 2019-12-24 Service processing method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN113918905A true CN113918905A (en) 2022-01-11

Family

ID=70501770

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111404875.4A Pending CN113918905A (en) 2019-12-24 2019-12-24 Service processing method and device and electronic equipment
CN201911348873.0A Active CN111125656B (en) 2019-12-24 2019-12-24 Service processing method and device and electronic equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201911348873.0A Active CN111125656B (en) 2019-12-24 2019-12-24 Service processing method and device and electronic equipment

Country Status (1)

Country Link
CN (2) CN113918905A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111681104A (en) * 2020-06-08 2020-09-18 中国银行股份有限公司 Internet bank self-help registration system and method
CN112231667B (en) * 2020-11-09 2022-02-18 腾讯科技(深圳)有限公司 Identity verification method, device, storage medium, system and equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045634A (en) * 2010-11-12 2011-05-04 深圳市爱贝信息技术有限公司 User safety control method and device based on geographical position abnormality of mobile terminal
CN105450403B (en) * 2014-07-02 2019-09-17 阿里巴巴集团控股有限公司 Identity identifying method, device and server
CN105450600B (en) * 2014-08-19 2018-09-11 阿里巴巴集团控股有限公司 The recognition methods of operation and server
CN106941475B (en) * 2016-01-04 2020-09-25 阿里巴巴集团控股有限公司 Authentication method and device based on trust relationship
US20170316408A1 (en) * 2016-05-02 2017-11-02 Oakley Kambel Bionumerical Authentication Systems
CN109218389B (en) * 2018-07-05 2021-08-27 东软集团股份有限公司 Method, device and storage medium for processing service request and electronic equipment

Also Published As

Publication number Publication date
CN111125656A (en) 2020-05-08
CN111125656B (en) 2021-12-14

Similar Documents

Publication Publication Date Title
US10454924B1 (en) Systems and methods for providing credentialless login using a random one-time passcode
US9098688B1 (en) Location as a second factor for authentication
US10380590B2 (en) Transaction authentication based on metadata
KR20160006185A (en) Two factor authentication
CN109257321B (en) Secure login method and device
US10735198B1 (en) Systems and methods for tokenized data delegation and protection
US8655773B1 (en) Geo-location based underwriting
CN111343162B (en) System secure login method, device, medium and electronic equipment
US9532216B2 (en) Method of authenticating user, server and mobile terminal performing the same
CN107295489B (en) Pseudo base station short message identification method, device, equipment and storage medium
CN111125656B (en) Service processing method and device and electronic equipment
US9049211B1 (en) User challenge using geography of previous login
CN113343304A (en) Permission application method and device, electronic equipment and storage medium
US11151548B2 (en) Location based wallets
CN110545542A (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN113961836A (en) Page jump method and device, electronic equipment and storage medium
CN111541692B (en) Identity verification method, system, device and equipment
US9430625B1 (en) Method and system for voice match based data access authorization
CN112929835A (en) Message notification method, device, electronic terminal and storage medium
CN117172786A (en) Identity authentication method, device, equipment, medium and program product
CN114978749B (en) Login authentication method and system, storage medium and electronic equipment
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN110943982B (en) Document data encryption method and device, electronic equipment and storage medium
CN114418586A (en) Reserved mobile phone number verification method, reserved mobile phone number verification device, reserved mobile phone number verification electronic equipment, reserved mobile phone number verification medium and program product
CN112270424A (en) Order processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination