+

CN105933334B - A kind of judgement and information search method and device of fraud application - Google Patents

A kind of judgement and information search method and device of fraud application Download PDF

Info

Publication number
CN105933334B
CN105933334B CN201610447699.5A CN201610447699A CN105933334B CN 105933334 B CN105933334 B CN 105933334B CN 201610447699 A CN201610447699 A CN 201610447699A CN 105933334 B CN105933334 B CN 105933334B
Authority
CN
China
Prior art keywords
user identifier
terminal
contrast relationship
user
terminal iidentification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610447699.5A
Other languages
Chinese (zh)
Other versions
CN105933334A (en
Inventor
唐翌飞
陈瑛绮
吴锋海
赵晓庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Union Mobile Pay Co Ltd
Original Assignee
Union Mobile Pay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Union Mobile Pay Co Ltd filed Critical Union Mobile Pay Co Ltd
Priority to CN201610447699.5A priority Critical patent/CN105933334B/en
Publication of CN105933334A publication Critical patent/CN105933334A/en
Application granted granted Critical
Publication of CN105933334B publication Critical patent/CN105933334B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to electronic banking technical fields, disclose the judgement and information search method and device of a kind of fraud application, comprising: first server end receives the application request of user, includes that the first user identifier and first terminal identify in the application request;The first server end is identified according to the first terminal, identifies whether uniquely to correspond to first user identifier from the first terminal determining in the first contrast relationship of terminal iidentification and user identifier;If the first terminal identifies corresponding more than one user identifier, the application request is refused at the first server end.The case where other people identity informations are usurped when the present invention for user to file an application determines the user there are fraud in the application stage.

Description

A kind of judgement and information search method and device of fraud application
Technical field
The present invention relates to electronic banking technical field more particularly to it is a kind of fraud application judgement and information search method and Device.
Background technique
Bank receives the loan application of user, before offering loans to user, need to the credit situation of user into Row audit mainly audits the user with the presence or absence of application fraud or credit fraud.Wherein, application fraud is to judge the applicant Data it is whether true, whether have intentional forgery, whether daily behavior has situations such as fraud feature if providing information.Application is taken advantage of Swindleness, general bank can be authenticated by the personally identifiable information to user, same information different data sources carry out the side such as cross validation Whether formula is true come the application for judging the user.
With the rise of internet finance, loan is also achieved booming online, similar to traditional financial, on internet It is also required to carry out loan application people the judgement of application fraud.User's real name application loan is generally required, in order to determine user It is cheated with the presence or absence of application, bank can carry out real name verification by public security interface to the ID card information that application user provides, and Information can be reserved in conjunction with the bank card provided checks that bank card holds whether card people and loan application people are same people.Due to only needing body Part card is true identity card, there is user sometimes and steals other people identity cards and carries out handling for bank card, and carries out net The case where loan application, fraudulent user, which can provide the identity card stolen simultaneously when application net is borrowed and utilize, steals what identity card was handled Bank card can also take identity card progress follow-up procedures and handle.Lending side can not judge user with the presence or absence of this in the application stage Apply for the behavior of fraud.If the credit record for the people that is stolen is good, in some instances it may even be possible to occur to stealing the case where people makes loans.
Summary of the invention
The embodiment of the present invention provides the judgement and information search method and device of a kind of fraud application, to mention for user The case where usurping other people identity informations when applying out, determines the user there are fraud in the application stage.
It is provided in an embodiment of the present invention swindleness user determination method include:
First server end receives the application request of user, includes that the first user identifier and first are whole in the application request End mark;
The first server end is identified according to the first terminal, compares pass from terminal iidentification with the first of user identifier Determine that the first terminal identifies whether uniquely to correspond to first user identifier in system;
If the first terminal identifies corresponding more than one user identifier, the application is refused at the first server end Request.
Optionally, the first server end determines described the from the first contrast relationship of terminal iidentification and user identifier Whether one terminal iidentification uniquely corresponds to after first user identifier, further includes:
If the first terminal mark uniquely corresponds to first user identifier, the first server end is according to First user identifier judges whether first user identifier is right from user identifier and the second contrast relationship of terminal iidentification Second terminal is answered to identify;
If it is determined that first user identifier correspond to second terminal mark, and first user identifier it is corresponding any one Second terminal mark corresponds to multiple user identifiers in first contrast relationship, then the Shen is refused at the first server end It please request.
Optionally, first contrast relationship is obtained according to such as under type:
Second server end receives the user identifier and terminal iidentification that client reports, and the user identifier is the client What end was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that the second server end is reported according to the client, judge the terminal mark Know and whether corresponds to multiple user identifiers;
If the terminal iidentification corresponds to multiple user identifiers, the second server end is by the terminal iidentification and correspondence Multiple user identifiers be added in the first contrast relationship of terminal iidentification and user identifier.
A kind of determination method of fraud application, comprising:
Second server end receives the user identifier and terminal iidentification that client reports, and the user identifier is the client What end was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that the second server end is reported according to the client, determine the terminal mark Know and whether corresponds to multiple user identifiers;
If the terminal iidentification corresponds to multiple user identifiers, the second server section is by the terminal iidentification and correspondence Multiple user identifiers be added in the first contrast relationship of terminal iidentification and user identifier.
Optionally, the user identifier that the client reports includes at least the first user identifier, and the terminal iidentification is the One terminal iidentification;
If the terminal iidentification corresponds to multiple user identifiers, the second server section is by the terminal iidentification and correspondence Multiple user identifiers be added in the first contrast relationship of terminal iidentification and user identifier, comprising:
Whether the second server end is index with terminal iidentification, inquire in first contrast relationship comprising described the One terminal iidentification;
If identifying in first contrast relationship comprising the first terminal, the second server end determines described the First terminal described in one contrast relationship identifies whether corresponding user identifier includes first user identifier, if not including, Then increase the first terminal in first contrast relationship and identifies corresponding first user identifier;
If not including the first terminal in first contrast relationship to identify, increase in first contrast relationship The first terminal mark and corresponding user identifier.
Optionally, further includes:
The second server is index with user identifier, is inquired in user identifier and the second contrast relationship of terminal iidentification It whether include first user identifier;
If in second contrast relationship including first user identifier, it is determined that described in second contrast relationship Whether the corresponding terminal iidentification of the first user identifier includes the first terminal mark, if not including, in second control Increase the corresponding first terminal mark of first user identifier in relationship;
If not including first user identifier in second contrast relationship, increase in second contrast relationship The contrast relationship of first user identifier and first terminal mark.
A kind of information search method of fraud application, comprising:
Client reads the financial short message in the terminal that the client is located at;
The client obtains user identifier from the financial short message;
The terminal iidentification of the terminal and user identifier are sent to second server end by the client, so that described User identifier and terminal iidentification that two server ends are reported according to the client establish the first of terminal iidentification and user identifier Contrast relationship, or establish the second contrast relationship of first contrast relationship and user identifier and terminal iidentification.
A kind of decision maker of fraud application, comprising:
First receiving unit, the application for receiving user are requested, include the first user identifier in apply request with First terminal mark;
First searching unit is compareed for being identified according to the first terminal from terminal iidentification with the first of user identifier Determine that the first terminal identifies whether uniquely to correspond to first user identifier in relationship;
Judging unit is refused the application and is asked if identifying corresponding more than one user identifier for the first terminal It asks.
Optionally, first searching unit, if being also used to the first terminal mark uniquely corresponds to first user Mark, then judge described first from user identifier and the second contrast relationship of terminal iidentification according to first user identifier Whether user identifier corresponds to second terminal mark;
The judging unit is used for if it is determined that first user identifier corresponds to second terminal mark, and described first uses Family identifies corresponding any one second terminal mark and corresponds to multiple user identifiers in first contrast relationship, then described in refusal Application request.
Optionally, first contrast relationship is obtained according to such as under type:
Second receiving unit receives the user identifier and terminal iidentification that client reports, and the user identifier is the client What end was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that second searching unit is reported according to the client, judge that the terminal iidentification is The no multiple user identifiers of correspondence;
If the terminal iidentification corresponds to multiple user identifiers, adding unit is by the terminal iidentification and corresponding multiple use Family mark is added in the first contrast relationship of terminal iidentification and user identifier.
A kind of decision maker of fraud application, comprising:
Second receiving unit, for receiving the user identifier and terminal iidentification that client reports, the user identifier is institute State what client was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
Second searching unit, user identifier and terminal iidentification for being reported according to the client, determines the terminal It identifies whether to correspond to multiple user identifiers;
Adding unit, if corresponding to multiple user identifiers for the terminal iidentification, by the terminal iidentification and corresponding Multiple user identifiers are added in the first contrast relationship of terminal iidentification and user identifier.
Optionally, the user identifier that the client reports includes at least the first user identifier, and the terminal iidentification is the One terminal iidentification;
Whether second searching unit is also used to be inquired in first contrast relationship and wrapped for index with terminal iidentification It is identified containing the first terminal;
Second searching unit, if being also used in first contrast relationship identify comprising the first terminal, really First terminal described in fixed first contrast relationship identifies whether corresponding user identifier includes first user identifier;
The adding unit, if being also used to first terminal described in first contrast relationship identifies corresponding user identifier Not comprising first user identifier, then increases the first terminal mark corresponding first in first contrast relationship and use Family mark;
The adding unit identifies if being also used to not include the first terminal in first contrast relationship, in institute It states and increases the first terminal mark and corresponding user identifier in the first contrast relationship.
Optionally, second searching unit is also used to inquire user identifier and terminal iidentification with user identifier for index The second contrast relationship in whether include first user identifier;
Second searching unit, if being also used in second contrast relationship comprising first user identifier, really Whether the corresponding terminal iidentification of the first user identifier described in fixed second contrast relationship includes the first terminal mark;
The adding unit, if being also used to the corresponding terminal iidentification of the first user identifier described in second contrast relationship It is identified not comprising the first terminal, then increases by first user identifier corresponding first in second contrast relationship eventually End mark;
The adding unit, if being also used to not include first user identifier in second contrast relationship, in institute State the contrast relationship for increasing by first user identifier and first terminal mark in the second contrast relationship.
A kind of information search device of fraud application, comprising:
Reading unit, for reading the financial short message in the terminal that the client is located at;
Acquiring unit, for obtaining user identifier from the financial short message;
Transmission unit, for the terminal iidentification of the terminal and user identifier to be sent to second server end, so that institute It states user identifier that second server end is reported according to the client and terminal iidentification establishes terminal iidentification and user identifier Second contrast relationship of the first contrast relationship and user identifier and terminal iidentification.
In the embodiment of the present invention, first server end receives the application request of user, since first server end needs basis The user identifier and terminal iidentification of user determines that the application of user with the presence or absence of fraud, therefore, contains use in this application request First user identifier and first terminal at family identify.First server end judges that first terminal is identified whether in the first contrast relationship In, a terminal iidentification in the first contrast relationship corresponds to multiple user identifiers.Therefore, it can be identified whether according to first terminal For the terminal iidentification in the first contrast relationship, judge that first terminal identifies whether uniquely to correspond to first user identifier.Positive reason Under condition, i.e., application fraud is not present in the application request that user proposes, the terminal iidentification that user provides to server end should be only right Answer a user identifier.And if first terminal mark is the terminal iidentification in the first contrast relationship, shows first terminal not only One corresponding first user identifier, i.e., using the user of proposition this application request as fraudulent user, server end refuses the user's Application request.The case where other people identity informations are usurped in the embodiment of the present invention, when filing an application for user, according to first terminal Corresponding user identifier is not unique, can effectively determine user and there is application fraud, just will in this way in the initial stage of application This kind of user keeps outside of the door, has screened out a part of undesirable application.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without any creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 is a kind of flow chart of the determination method of fraud application in the embodiment of the present invention;
Fig. 2 is the flow chart of the determination method of another fraud application in the embodiment of the present invention;
Fig. 3 is a kind of schematic diagram of the decision maker of fraud application in the embodiment of the present invention;
Fig. 4 is the schematic diagram of the decision maker of another fraud application in the embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of the information search device of fraud application in the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
It needs user to provide identity information and corresponding terminal iidentification when application loan, steals other people identity informations and carry out net loan The user of application can provide the terminal iidentification for stealing people oneself due to not knowing the terminal iidentification at stolen family to lending side.By Can only provide a loan in a short time once in an identity information, in order to increase the income of fraud, often will appear a user steal it is more The case where a identity information, generally for convenience, the user, can provide the same terminal iidentification, then when applying for more loans This terminal iidentification is just corresponding with multiple and different identity informations.
Based on above-mentioned discussion, the embodiment of the invention provides a kind of determination methods of fraud application, and the process of this method is such as Shown in Fig. 1, method be may include steps of:
S101, first server end receive the application request of user, include the first user identifier in apply request with First terminal mark.
S102, the first server end are identified according to the first terminal, from the first of terminal iidentification and user identifier Determine that the first terminal identifies whether uniquely to correspond to first user identifier in contrast relationship.
If S103, the first terminal identify corresponding more than one user identifier, institute is refused at the first server end State application request.
In the embodiment of the present invention, first server end receives the application request of user, since first server end needs basis The user identifier and terminal iidentification of user determines that the application of user with the presence or absence of fraud, therefore, contains use in this application request First user identifier and first terminal at family identify.First server end judges that first terminal is identified whether in the first contrast relationship In, a terminal iidentification in the first contrast relationship corresponds to multiple user identifiers.Therefore, it can be identified whether according to first terminal For the terminal iidentification in the first contrast relationship, judge that first terminal identifies whether uniquely to correspond to first user identifier.Positive reason Under condition, i.e., application fraud is not present in the application request that user proposes, the terminal iidentification that user provides to server end should be only right Answer a user identifier.And if first terminal mark is the terminal iidentification in the first contrast relationship, shows first terminal not only One corresponding first user identifier, i.e., using the user of proposition this application request as fraudulent user, server end refuses the user's Application request.The case where other people identity informations are usurped in the embodiment of the present invention, when filing an application for user, according to first terminal Corresponding user identifier is not unique, can effectively determine user and there is application fraud, just will in this way in the initial stage of application This kind of user keeps outside of the door, has screened out a part of undesirable application.
After user files an application request, however, it is determined that unique corresponding first user identifier of first terminal mark is sentenced to increase Break and whether there is the accuracy of application fraud, after step S102, further includes:
If the first terminal mark uniquely corresponds to first user identifier, the first server end is according to First user identifier judges whether first user identifier is right from user identifier and the second contrast relationship of terminal iidentification Second terminal is answered to identify;
If it is determined that first user identifier correspond to second terminal mark, and first user identifier it is corresponding any one Second terminal mark corresponds to multiple user identifiers in first contrast relationship, then the Shen is refused at the first server end It please request.
Specifically, if unique corresponding first user identifier of first terminal mark, i.e. first terminal mark corresponding unique one A user identifier then shows that the terminal iidentification that the user provides only corresponds to an identity information.In order to further judge the user Apply with the presence or absence of fraud, is identified according to the first terminal that user provides, from the second contrast relationship, judge the first user identifier Whether second terminal mark is corresponded to, and it also may include more that second terminal mark here, which may include a second terminal mark, A second terminal mark.That is, judging whether the first user identifier corresponds to multiple terminal marks from the second contrast relationship Know, if the first user identifier does not correspond to second terminal mark, illustrates that the first user identifier uniquely corresponds to first terminal mark, i.e., First terminal mark and the first user identifier uniquely correspond between each other, can determine that the user is assessed by this, after can carrying out Continuous audit.If the first user identifier corresponds to second terminal mark, either corresponding second terminal mark or correspondence are more A second terminal mark illustrates that the first user identifier does not correspond to first terminal mark uniquely, then needs for the first user identifier Corresponding each second terminal mark, respectively from the first contrast relationship, it is multiple to judge that each second terminal identifies whether to correspond to User identifier.If each second terminal mark uniquely corresponds to a user identifier, it can determine that the user passes through this and assesses. If the corresponding multiple user identifiers of any of second terminal mark second terminal mark determine that the user has application fraud, Refuse the application request of the user in first server end.
Above-mentioned first contrast relationship is obtained according to such as under type:
Second server end receives the user identifier and terminal iidentification that client reports, and the user identifier is the client What end was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that the second server end is reported according to the client, judge the terminal mark Know and whether corresponds to multiple user identifiers;
If the terminal iidentification corresponds to multiple user identifiers, the second server end is by the terminal iidentification and correspondence Multiple user identifiers be added in the first contrast relationship of terminal iidentification and user identifier.
Similar with the first contrast relationship, the second contrast relationship can be obtained according to such as under type:
Second server end receives the user identifier and terminal iidentification that client reports, and the user identifier is the client What end was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that the second server end is reported according to the client judge user's mark Know and whether corresponds to multiple terminal iidentifications;
If the user identifier corresponds to multiple terminal iidentifications, the second server end is by the user identifier and correspondence Multiple terminal iidentifications be added in the second contrast relationship of user identifier and terminal iidentification.
Specifically, it can be established corresponding between terminal iidentification and user identifier according to terminal iidentification and user identifier Relationship, a terminal iidentification can correspond to one or more user identifiers, and, a user identifier can correspond to one or more whole End mark a, wherein terminal iidentification is corresponded into the relationship of multiple user identifiers as the first contrast relationship, a user identifier The relationship of corresponding multiple terminal iidentifications is as the second contrast relationship.Here user identifier and terminal iidentification is in each client Offer second server end.For example, related APP can be installed at the terminal, the terminal mark of the terminal is obtained by APP Know, and read financial short message, such as the notifying messages that open a bank account from terminal, the corresponding use of the terminal is obtained from financial short message Family mark, can be the name of user.The terminal iidentification and user identifier that terminal will acquire are reported to second server, here Terminal iidentification and user identifier are corresponding relationship.
The user identifier and terminal iidentification that second server is reported according to various clients establish the first control pass System and the second contrast relationship.The terminal iidentification of multiple user identifiers will be corresponded to, and corresponding multiple user identifiers are added the In one contrast relationship;By the user identifier of the multiple terminal iidentifications of correspondence, and the second contrast relationship is added in corresponding terminal iidentification In.For example, second server can establish blacklist library, i.e., corresponding and the first contrast relationship, by the multiple user identifiers of correspondence Terminal iidentification, and multiple user identifiers corresponding with the terminal iidentification are added in blacklist library, and first server only need to be black Search whether that there are the first terminal reported when user's application marks in list library.It is similar, theassistant base is established, it is second pair corresponding According to relationship, by the user identifier of the multiple terminal iidentifications of correspondence, and multiple terminal iidentification additions corresponding with the user identifier are auxiliary It helps in library.It is because of a user identifier using the second contrast relationship as theassistant base using the first contrast relationship as blacklist library The case where corresponding multiple terminal iidentifications, is more normal, and a such as user can open multiple cell-phone numbers, therefore can not be by the user It is determined to have application fraud, therefore can only be as auxiliary.And terminal iidentification the case where corresponding to multiple user identifiers, is not just Often, i.e., terminal iidentification is bound with multiple identity informations, illustrates that the user is likely to usurp others' identity information, then should There is application fraud in user, refuse the application request of the user.
Correspondingly, the embodiment of the invention provides a kind of information search method of fraud application, packets for client It includes:
Client reads the financial short message in the terminal that the client is located at;
The client obtains user identifier from the financial short message;
The terminal iidentification of the terminal and user identifier are sent to second server end by the client, so that described User identifier and terminal iidentification that two server ends are reported according to the client establish the first of terminal iidentification and user identifier Contrast relationship, or establish the second contrast relationship of first contrast relationship and user identifier and terminal iidentification.
It should be noted that first server end and second server end can concentrate on one in the embodiment of the present invention In server, two servers can also be divided into.If first server end and second server end are divided into two servers, one Server is responsible for collecting the user identifier and terminal iidentification that client reports, and establishes database purchase contrast relationship;Another The established database of server by utilizing judges user with the presence or absence of application fraud.Fraud provided in an embodiment of the present invention as a result, The determination method of application, comprising:
Second server end receives the user identifier and terminal iidentification that client reports, and the user identifier is the client What end was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that the second server end is reported according to the client, determine the terminal mark Know and whether corresponds to multiple user identifiers;
If the terminal iidentification corresponds to multiple user identifiers, the second server section is by the terminal iidentification and correspondence Multiple user identifiers be added in the first contrast relationship of terminal iidentification and user identifier.
It after first contrast relationship is established, can also be requested according to the application of user, supplement the use in the first contrast relationship Family mark.The embodiment of the invention also includes:
The user identifier that the client reports includes at least the first user identifier, and the terminal iidentification is first terminal mark Know;
Whether the second server end is index with terminal iidentification, inquire in first contrast relationship comprising described the One terminal iidentification;
If identifying in first contrast relationship comprising the first terminal, the second server end determines described the First terminal described in one contrast relationship identifies whether corresponding user identifier includes first user identifier, if not including, Then increase the first terminal in first contrast relationship and identifies corresponding first user identifier;
If not including the first terminal in first contrast relationship to identify, increase in first contrast relationship The first terminal mark and corresponding user identifier.
Whether identified comprising first terminal that is, second server end is inquired in the first contrast relationship, i.e. inquiry is used Whether the terminal iidentification that family provides is in blacklist library.If identifying comprising first terminal, show that first terminal mark correspondence is more A user identifier.Whether include first user identifier, if not if then judging that first terminal identifies in corresponding multiple user identifiers Including then illustrating that the corresponding identity information of the first user identifier is what the user newly stole, first user identifier need to be increased Into the first contrast relationship.To which the first terminal mark and the first user identifier provided according to user carries out blacklist library It supplements and perfect.
Correspondingly, can also request according to the application of user, supplement the user identifier in the second contrast relationship, then it is of the invention Embodiment further include:
Whether the second server end is index with user identifier, inquire in second contrast relationship comprising described the One user identifier;
If in second contrast relationship including first user identifier, it is determined that described in second contrast relationship Whether the corresponding terminal iidentification of the first user identifier includes the first terminal mark, if not including, in second control Increase the corresponding first terminal mark of first user identifier in relationship;
If not including first user identifier in second contrast relationship, increase in second contrast relationship The contrast relationship of first user identifier and first terminal mark.
Wherein, the user identifier that the client reports includes at least the first user identifier, and the terminal iidentification is first Terminal iidentification.
Whether it includes the first user identifier that i.e. second server end is inquired in the second contrast relationship, i.e. inquiry user provides Whether user identifier is in theassistant base.If showing that the first user identifier corresponds to multiple terminal iidentifications comprising the first user identifier. Then judge in the corresponding multiple terminal iidentifications of the first user identifier whether to include that first terminal identifies, it, should if not including First terminal mark increases in the second contrast relationship.To which the first terminal mark provided according to user and the first user mark Know, by theassistant base carry out supplement and it is perfect.
In the embodiment of the present invention, terminal can be able to be for equipment, terminal iidentifications such as mobile phone, tablet computer, desktop computers Cell-phone number, the IMEI of mobile phone, E-mail address etc., user identifier can be name, identification card number, the account etc. of user.? In the scene for applying for loan, it is however generally that, terminal iidentification is the cell-phone number of user, and user identifier is the identification card number of user.For Be more clearly understood that the present invention, above-mentioned process be described in detail with specific example below, wherein first server end and Second server end is respectively bank server and database server, and detailed process is as shown in Figure 2, comprising:
S201, multiple user mobile phones pass through name and cell-phone number of the APP to database server report of user, the same hand The name and cell-phone number that machine reports are corresponding.
S202, database server are by according to the corresponding relationship of name and cell-phone number, by the cell-phone number of the multiple names of correspondence, And corresponding multiple names are added in blacklist library.
S203, database server are by according to the corresponding relationship of name and cell-phone number, by the name of the multiple cell-phone numbers of correspondence, And corresponding multiple cell-phone numbers are added in theassistant base.
Above-mentioned steps S202 can before step S203, can also after step S203 or two steps simultaneously It carries out.
S204, bank server receive the loan application of user, include the name and cell-phone number of user in the loan application.
S205, bank server to database server send first verify request, request verify blacklist library in whether Cell-phone number including the user, if so, executing step S206;Otherwise, step S207 is executed.
S206, bank server refuse the loan application of the user.
S207, bank server send second to database server and verify request, and whether request is verified in theassistant base and wrapped The name of the user is included, if so, executing step S208;Otherwise, step S209 is executed.
S208, bank server to database server send third verify request, request verify blacklist library in whether Including the corresponding any cell-phone number of the address name, if so, executing step S206, otherwise, step S209 is executed.
S209, bank server determine that the loan application of user is assessed by this, the assessment after can entering.
Based on the same technical idea, the embodiment of the present invention also provides a kind of decision maker of fraud application, such as Fig. 3 institute Show, comprising:
First receiving unit 31, the application for receiving user are requested, and include the first user identifier in the application request It is identified with first terminal;
First searching unit 32, for being identified according to the first terminal, from first pair of terminal iidentification and user identifier It identifies whether uniquely to correspond to first user identifier according to the first terminal determining in relationship;
Judging unit 33 refuses the application if identifying corresponding more than one user identifier for the first terminal Request.
Optionally, first searching unit 32 is used if being also used to the first terminal mark and uniquely corresponding to described first Family mark from user identifier and the second contrast relationship of terminal iidentification, judges described the then according to first user identifier Whether one user identifier corresponds to second terminal mark;
The judging unit 33 is used for if it is determined that first user identifier corresponds to second terminal mark, and described first Corresponding any one second terminal mark of user identifier corresponds to multiple user identifiers in first contrast relationship, then refuses institute State application request.
Optionally, first contrast relationship is obtained according to such as under type:
Second receiving unit 41 receives the user identifier and terminal iidentification that client reports, and the user identifier is the visitor What family end was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that second searching unit 42 is reported according to the client, judge the terminal iidentification Whether multiple user identifiers are corresponded to;
If the terminal iidentification corresponds to multiple user identifiers, adding unit 43 is by the terminal iidentification and corresponding multiple User identifier is added in the first contrast relationship of terminal iidentification and user identifier.
The decision maker of another kind fraud application, such as Fig. 4, comprising:
Second receiving unit 41, for receiving the user identifier and terminal iidentification that client reports, the user identifier is What the client was obtained by reading the financial short message in the corresponding terminal of the terminal iidentification;
Second searching unit 42, user identifier and terminal iidentification for being reported according to the client, determines the end End identifies whether to correspond to multiple user identifiers;
Adding unit 43, if multiple user identifiers are corresponded to for the terminal iidentification, by the terminal iidentification and correspondence Multiple user identifiers be added in the first contrast relationship of terminal iidentification and user identifier.
Optionally, the user identifier that the client reports includes at least the first user identifier, and the terminal iidentification is the One terminal iidentification;
Second searching unit 42, be also used to inquire with terminal iidentification for index in first contrast relationship whether It is identified comprising the first terminal;
Second searching unit 42, if being also used in first contrast relationship identify comprising the first terminal, Determine that first terminal described in first contrast relationship identifies whether corresponding user identifier includes first user identifier;
The adding unit 43, if being also used to first terminal described in first contrast relationship identifies corresponding user's mark Know and do not include first user identifier, then increases the first terminal mark corresponding first in first contrast relationship User identifier;
The adding unit 43 identifies if being also used to not include the first terminal in first contrast relationship, Increase the first terminal mark and corresponding user identifier in first contrast relationship.
Optionally, second searching unit 42 is also used to user identifier as index, inquiry user identifier and terminal mark It whether include first user identifier in the second contrast relationship known;
Second searching unit 42, if being also used in second contrast relationship comprising first user identifier, Determine whether the corresponding terminal iidentification of the first user identifier described in second contrast relationship includes the first terminal mark;
The adding unit 43, if being also used to the corresponding terminal mark of the first user identifier described in second contrast relationship Know and do not include first terminal mark, then increases by first user identifier corresponding first in second contrast relationship Terminal iidentification;
The adding unit 43, if being also used to not include first user identifier in second contrast relationship, Increase the contrast relationship of first user identifier and first terminal mark in second contrast relationship.
A kind of information search device of fraud application, as shown in Figure 5, comprising:
Reading unit 51, for reading the financial short message in the terminal that the client is located at;
Acquiring unit 52, for obtaining user identifier from the financial short message;
Transmission unit 53, for the terminal iidentification of the terminal and user identifier to be sent to second server end, so that The user identifier and terminal iidentification that the second server end is reported according to the client establish terminal iidentification and user identifier The first contrast relationship and user identifier and terminal iidentification the second contrast relationship.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of determination method of fraud application characterized by comprising
First server end receives the application request of user, includes the first user identifier and first terminal mark in the application request Know;
The first server end is identified according to the first terminal, from the first contrast relationship of terminal iidentification and user identifier Determine that the first terminal identifies whether uniquely to correspond to first user identifier;
If the first terminal identifies corresponding more than one user identifier, the application is refused at the first server end is asked It asks.
2. the method as described in claim 1, which is characterized in that the first server end is from terminal iidentification and user identifier After determining that the first terminal identifies whether uniquely to correspond to first user identifier in first contrast relationship, further includes:
If the first terminal mark uniquely corresponds to first user identifier, the first server end is according to described first User identifier judges whether first user identifier corresponds to from user identifier and the second contrast relationship of terminal iidentification Two terminal iidentifications;
If it is determined that first user identifier correspond to second terminal mark, and first user identifier it is corresponding any one second Terminal iidentification corresponds to multiple user identifiers in first contrast relationship, then the first server end refusal application is asked It asks.
3. the method as described in claim 1, which is characterized in that first contrast relationship is obtained according to such as under type:
Second server end receives the user identifier and terminal iidentification that client reports, and the user identifier is logical for the client It crosses and reads the acquisition of the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that the second server end is reported according to the client, judge that the terminal iidentification is The no multiple user identifiers of correspondence;
If the terminal iidentification corresponds to multiple user identifiers, the second server end is by the terminal iidentification and corresponding more A user identifier is added in the first contrast relationship of terminal iidentification and user identifier.
4. method as claimed in claim 3, which is characterized in that the user identifier that the client reports includes at least first and uses Family mark, the terminal iidentification are first terminal mark;
If the terminal iidentification corresponds to multiple user identifiers, the second server end is by the terminal iidentification and corresponding more A user identifier is added in the first contrast relationship of terminal iidentification and user identifier, comprising:
Whether the second server end is index with terminal iidentification, inquire whole comprising described first in first contrast relationship End mark;
If identifying in first contrast relationship comprising the first terminal, the second server end determines described first pair Identify whether corresponding user identifier includes first user identifier according to first terminal described in relationship, if not including, Increase the first terminal in first contrast relationship and identifies corresponding first user identifier;
It is identified if not including the first terminal in first contrast relationship, in first contrast relationship described in increase First terminal mark and corresponding user identifier.
5. method as claimed in claim 4, which is characterized in that further include:
The second server is index with user identifier, inquire in the second contrast relationship of user identifier and terminal iidentification whether Include first user identifier;
If in second contrast relationship including first user identifier, it is determined that first described in second contrast relationship Whether the corresponding terminal iidentification of user identifier includes the first terminal mark, if not including, in second contrast relationship It is middle to increase the corresponding first terminal mark of first user identifier;
If not including first user identifier in second contrast relationship, in second contrast relationship described in increase The contrast relationship of first user identifier and first terminal mark.
6. a kind of decision maker of fraud application characterized by comprising
First receiving unit, the application for receiving user are requested, and include the first user identifier and first in the application request Terminal iidentification;
First searching unit, for being identified according to the first terminal, from the first contrast relationship of terminal iidentification and user identifier The middle determination first terminal identifies whether uniquely to correspond to first user identifier;
Judging unit refuses the application request if identifying corresponding more than one user identifier for the first terminal.
7. device as claimed in claim 6, which is characterized in that
First searching unit, if being also used to the first terminal mark uniquely corresponds to first user identifier, basis First user identifier judges that first user identifier is from user identifier and the second contrast relationship of terminal iidentification No corresponding second terminal mark;
The judging unit is used for if it is determined that first user identifier corresponds to second terminal mark, and first user marks Know corresponding any one second terminal mark and correspond to multiple user identifiers in first contrast relationship, then refuses the application Request.
8. device as claimed in claim 6, which is characterized in that first contrast relationship is obtained according to such as under type:
Second receiving unit receives the user identifier and terminal iidentification that client reports, and the user identifier is logical for the client It crosses and reads the acquisition of the financial short message in the corresponding terminal of the terminal iidentification;
The user identifier and terminal iidentification that second searching unit is reported according to the client, judge whether the terminal iidentification is right Answer multiple user identifiers;
If the terminal iidentification corresponds to multiple user identifiers, adding unit marks the terminal iidentification and corresponding multiple users Know and is added in the first contrast relationship of terminal iidentification and user identifier.
9. device as claimed in claim 8, which is characterized in that the user identifier that the client reports includes at least first and uses Family mark, the terminal iidentification are first terminal mark;
Whether second searching unit, being also used to inquire with terminal iidentification for index in first contrast relationship includes institute State first terminal mark;
Second searching unit, if being also used in first contrast relationship identify comprising the first terminal, it is determined that institute It states first terminal described in the first contrast relationship and identifies whether corresponding user identifier includes first user identifier;
The adding unit is not wrapped if being also used to first terminal described in first contrast relationship and identifying corresponding user identifier Containing first user identifier, then increases the first terminal in first contrast relationship and identify corresponding first user mark Know;
The adding unit identifies if being also used to not include the first terminal in first contrast relationship, described the Increase the first terminal mark and corresponding user identifier in one contrast relationship.
10. device as claimed in claim 9, which is characterized in that
Second searching unit is also used to user identifier as index, and inquiry user identifier is compareed with the second of terminal iidentification It whether include first user identifier in relationship;
Second searching unit, if being also used in second contrast relationship comprising first user identifier, it is determined that institute State whether the corresponding terminal iidentification of the first user identifier described in the second contrast relationship includes the first terminal mark;
The adding unit is not wrapped if being also used to the corresponding terminal iidentification of the first user identifier described in second contrast relationship It is identified containing the first terminal, then increases the corresponding first terminal mark of first user identifier in second contrast relationship Know;
The adding unit, if being also used to not include first user identifier in second contrast relationship, described the Increase the contrast relationship of first user identifier and first terminal mark in two contrast relationships.
CN201610447699.5A 2016-06-20 2016-06-20 A kind of judgement and information search method and device of fraud application Active CN105933334B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610447699.5A CN105933334B (en) 2016-06-20 2016-06-20 A kind of judgement and information search method and device of fraud application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610447699.5A CN105933334B (en) 2016-06-20 2016-06-20 A kind of judgement and information search method and device of fraud application

Publications (2)

Publication Number Publication Date
CN105933334A CN105933334A (en) 2016-09-07
CN105933334B true CN105933334B (en) 2019-06-18

Family

ID=56830298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610447699.5A Active CN105933334B (en) 2016-06-20 2016-06-20 A kind of judgement and information search method and device of fraud application

Country Status (1)

Country Link
CN (1) CN105933334B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3172514B2 (en) * 1998-10-16 2001-06-04 株式会社エヌ・ティ・ティ・データ Electronic money system, center, transaction terminal, unauthorized use prevention method and recording medium
GB2383497B (en) * 2001-12-21 2005-09-07 Nec Technologies Transaction verification using a mobile telephone network
WO2014078569A1 (en) * 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
CN104679777B (en) * 2013-12-02 2018-05-18 中国银联股份有限公司 A kind of method and system for being used to detect fraudulent trading
CN105243566A (en) * 2015-10-28 2016-01-13 联动优势科技有限公司 Method and apparatus for evaluating credit of users through different mobile phone number information from operators
CN105303441A (en) * 2015-10-28 2016-02-03 联动优势科技有限公司 Method and device for preventing application fraud through adoption of SIM card number and mobile phone identification codes

Also Published As

Publication number Publication date
CN105933334A (en) 2016-09-07

Similar Documents

Publication Publication Date Title
US10965668B2 (en) Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification
CN106797371B (en) Method and system for user authentication
US8719911B2 (en) Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques
CN110046482A (en) Identity verification method and its system
US20150294313A1 (en) Systems, apparatus and methods for improved authentication
CN109257366B (en) Method and device for authenticating user
CN105871786B (en) A kind of verification method of user information, device and system
CN110738473B (en) Wind control method, system, device and equipment
CN105868970B (en) authentication method and electronic equipment
CN112700250B (en) Identity authentication method, device and system in financial scene
CN105635113B (en) Teleaction service based on SDK handles method and system
CN105721425A (en) Information processing method and electronic device
CN117118750A (en) Data sharing method and device based on white-box password, electronic equipment and medium
CN110032846A (en) The anti-misuse method and device of identity data, electronic equipment
CN109741070A (en) A kind of account management method and device based on net card
CN105468947A (en) Information processing method and device and electronic equipment
CN106295423A (en) A kind of method for exhibiting data and client
CN112990940B (en) Enterprise authentication method and device
CN113065122A (en) Temporary authority management method, device and computer readable medium
CN105933334B (en) A kind of judgement and information search method and device of fraud application
CN111209552A (en) Identity authentication method and device based on user behaviors
Park et al. A study on secure authentication system using integrated user authentication service
CN113011962B (en) Resource allocation method and device
CN115099799A (en) Transaction processing method and system for digital RMB
CN109389403A (en) A kind of payment processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载