Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Transaction method and device

A transaction method and transaction request technology, applied in the field of data security, can solve problems such as the inability to adjust the security authentication method and the inability to guarantee transaction security

Pending Publication Date: 2020-04-03
BANK OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention discloses a transaction method, which solves the problem that the security authentication method cannot be adjusted and the transaction security cannot be guaranteed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction method and device
  • Transaction method and device
  • Transaction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0053] Embodiment 1: Add the enhanced security authentication values ​​of the attribute information of each dimension to obtain the enhanced security authentication values ​​of the transaction request.

[0054] For example: the enhanced security authentication value of the customer type is -2, the enhanced security authentication value of the transaction type is -3, the enhanced security authentication value of the transaction amount is -2, and the enhanced security authentication value of the transaction channel is -4, then the transaction request The enhanced value of the security authentication is: -2+(-3)+(-2)+(-4)=-11

Embodiment approach 2

[0055] Embodiment 2: Based on different weight values, the enhanced security authentication value of the attribute information of each dimension is added to obtain the enhanced security authentication value of the transaction request.

[0056] For example: the enhanced security authentication value of the customer type is -2, the enhanced security authentication value of the transaction type is -3, the enhanced security authentication value of the transaction amount is -2, the enhanced security authentication value of the transaction channel is -4, and the enhanced security authentication value of the customer type is -2. Weight, 0.1, the weight of the transaction type is 0.2, the weight of the transaction amount is 0.3, the security authentication weight of the transaction channel is 0.4, then the security authentication enhancement value of the transaction request is: (-2)*0.1+(-3)*0.2 +(-2)*0.3+(-4)*0.4=-3.

[0057] S104: Based on the security authentication enhancement val...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a transaction method and device, and the method comprises the steps: responding to a transaction request, and obtaining the attribute information of at leastone dimension related to the transaction request; calculating the security authentication enhancement value of the attribute information of each dimension; calculating the security authentication enhancement value of the transaction request based on the security authentication enhancement value of the attribute information of each dimension; and selecting a target security authentication tool fromsecurity authentication tools based on the security authentication enhancement value of the transaction request, wherein the target security authentication tool is used for performing security authentication on the transaction request, the security authentication tool is preset by a user who initiates the transaction request. Therefore, the security authentication enhancement value of the transaction request is calculated through the attribute information security authentication enhancement values of different dimensions of the transaction request, and the security authentication tool is selected based on the security authentication enhancement value. In this way, the flexibility of security authentication of the user is improved, and the reliability of security authentication is improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a transaction method and device. Background technique [0002] In the current transaction scenario, in order to improve the security of the transaction, security verification is usually performed, such as SMS verification, UK instruction verification, password verification, face recognition verification, etc. [0003] However, for the current security verification of transactions, the security verification method for each transaction scenario is fixed, that is, it is set by the user and cannot be adjusted. In this case, for some transaction scenarios with high security requirements, the security authentication method cannot be adjusted in time, so that the security of the transaction cannot be effectively guaranteed. Contents of the invention [0004] In view of this, the embodiment of the present invention discloses a transaction method, which solves the problem in the prior art ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q40/04G06Q20/38
CPCG06Q40/04G06Q20/382
Inventor 刘继波
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products