Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present applicationAttached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is onlyIt is the embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, the common skill in this fieldThe application protection all should belong in art personnel every other embodiment obtained without making creative workRange.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that making in this wayData are interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and" having " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or listThe process, method, system, product or equipment of member those of are not necessarily limited to be clearly listed step or unit, but may include not havingThere are other step or units being clearly listed or intrinsic for these process, methods, product or equipment.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phaseMutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
After the application program that the on-line finance method of commerce user of the application passes through registration terminal, it is able to carry out registration, realityName certification, setting trading password and risk assessment etc. operate, to want to carry out the phase customs gold unit such as borrowing or lending money by terminal in userWhen melting transaction, treatment channel quickly can be provided for user, facilitate the completion of the financial transactions such as debt-credit.Meanwhile user can be withBank card binding, binding of Transaction Account number etc. are realized by terminal, ensure that user security when on-line finance transaction.
As shown in Figure 1, this method includes the following steps, namely S102 to step S106:
Step S102 receives the certification instruction of the first user,
The certification instruction can refer to that user passes through standard after registration terminal for generating when sending out raw financial transactionThe standby user identity authentication instruction for starting to generate when related on-line finance transaction.
For example, user prepares the real-name authentication process for starting to trigger when the relevant on-line finance of credits is traded.
The certification instruction can refer to that user does after passing through registration terminal for generating when sending out raw financial transactionThe transaction security certification instruction that good correlation on-line finance transaction generates when preparing.
It is instructed for example, user is ready for the personal asset security credential generated when transaction by registration terminal.
The certification instruction can refer to that user is registered by registration terminal for generating when sending out raw financial transactionAs the user identity authentication instruction generated after new user and when the related on-line finance of preparation beginning is traded.
For example, user resets login password by terminal authentication code, logs on to after being arranged successfully and generated in terminalUser identity authentication instruction.
Step S104 authenticates the identity information of first user according to the certification instruction,
The identity information is used to bind with first user.
It can refer to user's binding and bind objective identity information and the user of current login or new registration.
By the certification instruction received, the identity information of the first user is authenticated.The mode of certification can be shortBelieve verifying, real-name authentication, certificate certification etc..
Step S106, if identity information certification passes through, online financial transaction processing is preset in execution.
Pass through if identity information can authenticate, executable assets disposal, commission credits, all kinds of asset items are brought togetherThe default financial transaction processing such as platform, private equity.
It can be seen from the above description that the application realizes following technical effect:In the embodiment of the present application, it adoptsWith the mode for the certification instruction for receiving the first user, the identity information of first user is authenticated by the certification instruction, is reachedIt has arrived identity information certification to pass through, then the purpose for presetting online financial transaction processing has been executed, to realize fast and efficientlyThe technical effect of on-line finance transaction is executed, and then solves the technical issues of cannot achieve on-line finance transaction.
According to the embodiment of the present application, as preferred in the embodiment of the present application, as shown in Fig. 2, if the identity informationCertification passes through, then execution, which is preset online financial transaction and handled, includes:
Step S202 receives the encrypted instruction of the first user;
The encrypted instruction for receiving the first user refers to the encryption being arranged when user trades and occurs to all on-line financesInstruction.Usually received first user encryption instruction needs to occur before financial transaction.
For example, new user's registration completes payment cipher setting according to setting process.
For another example, the user registered at the end PC, if not set payment cipher, triggering is set when click is lent immediatelySet payment cipher process.If payment cipher and risk assessment are not set, it is first determined whether setting payment cipher.
Step S204 is encrypted according to the encrypted instruction to raw financial transaction is sent out.
It is encrypted according to encrypted instruction to raw financial transaction is sent out, ciphering process can be, numerical ciphers.EncryptionProcess is also possible to finger-print cipher.Ciphering process is also possible to face Crypted password.
For example, when terminal page is loaded into, input frame obtains focus automatically, and pops up number when being encrypted using numerical ciphersWord keyboard.After 6-8 payment ciphers are finished, lower one page is automatic jumped to.
For another example, when terminal page is loaded into, input frame confirmation payment cipher obtains focus automatically, and pops up number keyDisk is clicked in next step, and success is then arranged after passing through in verification.If entered passwords differ, need to re-enter.
According to the embodiment of the present application, as preferred in the embodiment of the present application, as shown in figure 3, if the identity informationCertification passes through, then execution, which is preset online financial transaction and handled, includes:
Step S302 receives the binding credit payment facility instruction of the first user;
It is other with spending limit that binding credit payment tool can be binding bank card, binding credit card or bindingAccount.
For example, input bank card number, Bank Name, bank reserve hand under the premise of real-name authentication is completed in userMachine number, identifying code, which can be completed, ties up card operation.
Step S304, according to the credit payment facility instruction to the account for sending out raw financial transaction the first user of executionNumber safety operation.
When being operated by credit payment facility instruction to the account number safety for sending out raw financial transaction the first user of execution,It can ensure the account number safety of the first user.
For example, user after real-name authentication, can just carry out tying up card operation.It inputs bank's card number and bank reserves handMachine number verifies bank card information.
For another example, if the Bind Failed of credit payment tool, enter account safety page, binding bank card column is shownAgain it binds field, clicks page jump to binding bank card again.
For another example, if credit payment facility instruction is Bind Failed, bank's card number may be inputted and do not supported in platformTie up card support bank within the scope of, need to submit after selecting Bank Name, and the page pop up prompting frame.
For another example, if credit payment facility instruction is that input bank's card number and Bank Name are inconsistent, possibility wouldn'tIt supports the bank card, needs replacing other bank cards and carry out bindings.
For another example, if credit payment facility instruction is to click to re-enter button, bank card input frame and Bank NameIt empties, bank card input frame obtains focus automatically.
According to the embodiment of the present application, as preferred in the embodiment of the present application, as shown in figure 4, if the identity informationCertification passes through, then execution, which is preset online financial transaction and handled, includes:
Step S402 receives the binding service quotient instruction of the first user;
Binding service quotient instruction service provider can be bound belonging to the currently used terminal by the first user.ClothesBusiness quotient can be, and China Unicom, China Telecom, China Mobile, China Broadcast & Television etc. run operator.
For example, by the binding service quotient instruction for receiving the first user, it can be in real-name authentication-bank authentication-bindingOccur when cell-phone number.
For another example, the cell-phone number used when instructing automatic binding registration by binding service quotient then can not usually be changed.
Step S404, the transaction according to binding service quotient instruction to raw financial transaction the first user of execution is sent outSafety operation.
The transaction security operation of the first user can be executed when sending out raw financial transaction by binding service quotient.Pass throughBinding service quotient instruction executes transaction security guarantee to raw financial transaction is sent out.That is, being needed when sending out raw financial transactionAfter the terminal progress message synchronization or information authentication to use by binding service quotient and user pass through, it can complete to send outRaw financial transaction.
The phone number used when for example, instructing automatic binding registration according to binding service quotient.
For another example, binding cell-phone number can not be modified in end application.
For another example, binding cell-phone number is used to receive the short message verification code and system message when sending out raw finance and suggesting.
According to the embodiment of the present application, as preferred in the embodiment of the present application, as shown in figure 5, if the identity informationCertification passes through, then further includes after online financial transaction processing is preset in execution:
Step S502 receives the answer content that the first user submits risk assessment problem;
User can be replied for risk assessment problem by registration terminal.Content is replied, text can be passed throughContent feed.The risk tolerance of user is assessed by way of question and answer.It, can be with by being pre-configured with problem from the backgroundThe risk tolerance of user is assessed, assets can be configured by assessment result.
Preferably, the situation of itself risk tolerance is influenced if user occurs, can be re-started with initiativeRisk assessment voluntarily bears and agrees to that risk exceeds the financial transaction of ability to bear.Financial transaction can be, at assetsIt sets, credits, all kinds of asset items is entrusted to bring the default financial transaction processing such as platform, private equity together.
For example, assessing the risk tolerance of user by the answer situation of user.
For another example, the situation of itself risk tolerance is influenced if user occurs, can be re-started with initiativeRisk assessment voluntarily bears and agrees to lend the credits that wind exceeds dangerous ability to bear.
Step S504 judges risk assessment type according to content is replied;
Risk assessment type is judged according to answer content and preset decision rule.
For example, risk tolerance type includes conservative, steady type and radical type.
Step S506 detects whether the purchase instruction for receiving the first user;
Whether detection terminal receives the relevant financial product purchase instruction of the first user, for example, purchase credits.
Step S508, if detection receives the purchase instruction of the first user, according to the risk assessment type to quasi-The financial transaction of generation executes the risk tolerance prompt of the first user.
When being bought, it can show that first user's the last time risk tolerance prompts result by terminal.ExistConsumer's risk ability to bear type is prompted when buying credits.
Preferably, a risk tolerance assessment result validity period is 6 months, if it exceeds needing again after 6 monthsCarry out risk assessment.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructionsComputer system in execute, although also, logical order is shown in flow charts, in some cases, can be withShown or described step is executed different from sequence herein.
According to the embodiment of the present application, a kind of for implementing the device of above-mentioned on-line finance method of commerce, such as figure is additionally providedShown in 6, which includes:Receiving module 10, the certification for receiving the first user instruct, wherein the certification instruction is used forThe generation when sending out raw financial transaction;Authentication module 20, for authenticating the identity of first user according to the certification instructionInformation, wherein the identity information is used to bind with first user;And execution module 30, for believing in the identityWhen breath certification passes through, then executes and preset online financial transaction processing.
The certification instruction described in the receiving module 10 of the embodiment of the present application can for generating when sending out raw financial transactionTo refer to, user is instructed by the user identity authentication for preparing to start to generate when related on-line finance is traded after registration terminal.
For example, user prepares the real-name authentication process for starting to trigger when the relevant on-line finance of credits is traded.
The certification instruction can refer to that user does after passing through registration terminal for generating when sending out raw financial transactionThe transaction security certification instruction that good correlation on-line finance transaction generates when preparing.
It is instructed for example, user is ready for the personal asset security credential generated when transaction by registration terminal.
The certification instruction can refer to that user is registered by registration terminal for generating when sending out raw financial transactionAs the user identity authentication instruction generated after new user and when the related on-line finance of preparation beginning is traded.
For example, user resets login password by terminal authentication code, logs on to after being arranged successfully and generated in terminalUser identity authentication instruction.
The identity information described in the authentication module 20 of the embodiment of the present application is used to bind with first user.
It can refer to user's binding and bind objective identity information and the user of current login or new registration.
By the certification instruction received, the identity information of the first user is authenticated.The mode of certification can be shortBelieve verifying, real-name authentication, certificate certification etc..
Pass through in the execution module 30 of the embodiment of the present application if identity information can authenticate, can be performed at assetsIt sets, credits, all kinds of asset items is entrusted to bring the default financial transaction processing such as platform, private equity together.
In the embodiment of the present application, passed through by the way of receiving the certification instruction of the first user in receiving module 10The certification instruction described in authentication module 20 authenticates the identity information of first user, has reached the body in execution module 30Part authentification of message passes through, then executes the purpose for presetting online financial transaction processing, fast and efficiently execute to realizeThe technical effect of line financial transaction, and then solve the technical issues of cannot achieve on-line finance transaction.
According to the embodiment of the present application, as preferred in the embodiment of the present application, as shown in fig. 7, the execution module 30 is wrappedIt includes:First receiving unit 301, the first encryption unit 302, first receiving unit 301, for receiving adding for the first userClose instruction;The encryption unit 302, for being encrypted according to the encrypted instruction to raw financial transaction is sent out.
The encrypted instruction that the first user is received in first receiving unit 301 of the embodiment of the present application, refers to user coupleThe encrypted instruction that all on-line finance transaction are arranged when occurring.Usually received first user encryption instruction needs to hand in financeOccur before easily.
For example, new user's registration completes payment cipher setting according to setting process.
For another example, the user registered at the end PC, if not set payment cipher, triggering is set when click is lent immediatelySet payment cipher process.If payment cipher and risk assessment are not set, it is first determined whether setting payment cipher.
It is carried out according to encrypted instruction to raw financial transaction is sent out in first encryption unit 302 of the embodiment of the present applicationEncryption, ciphering process can be, numerical ciphers.Ciphering process is also possible to finger-print cipher.Ciphering process is also possible to faceCrypted password.
For example, when terminal page is loaded into, input frame obtains focus automatically, and pops up number when being encrypted using numerical ciphersWord keyboard.After 6-8 payment ciphers are finished, lower one page is automatic jumped to.
For another example, when terminal page is loaded into, input frame confirmation payment cipher obtains focus automatically, and pops up number keyDisk is clicked in next step, and success is then arranged after passing through in verification.If entered passwords differ, need to re-enter.
According to the embodiment of the present application, as preferred in the embodiment of the present application, as shown in figure 8, the execution module 30 is wrappedIt includes:Second receiving unit 303, the second encryption unit 304, second receiving unit 303, for receiving tying up for the first userDetermine credit payment facility instruction;Second encryption unit 304, for according to the credit payment facility instruction to sending out lifeFinancial transaction execute the first user account number safety operation.
Credit payment tool is bound in second receiving unit 303 of the embodiment of the present application can be binding bank card, ties upDetermine credit card or the other accounts with spending limit of binding.
For example, input bank card number, Bank Name, bank reserve hand under the premise of real-name authentication is completed in userMachine number, identifying code, which can be completed, ties up card operation.
By credit payment facility instruction to sending out raw finance in second encryption unit 304 of the embodiment of the present applicationWhen transaction executes the account number safety operation of the first user, it can be ensured that the account number safety of the first user.
For example, user after real-name authentication, can just carry out tying up card operation.It inputs bank's card number and bank reserves handMachine number verifies bank card information.
For another example, if the Bind Failed of credit payment tool, enter account safety page, binding bank card column is shownAgain it binds field, clicks page jump to binding bank card again.
For another example, if credit payment facility instruction is Bind Failed, bank's card number may be inputted and do not supported in platformTie up card support bank within the scope of, need to submit after selecting Bank Name, and the page pop up prompting frame.
For another example, if credit payment facility instruction is that input bank's card number and Bank Name are inconsistent, possibility wouldn'tIt supports the bank card, needs replacing other bank cards and carry out bindings.
For another example, if credit payment facility instruction is to click to re-enter button, bank card input frame and Bank NameIt empties, bank card input frame obtains focus automatically.
According to the embodiment of the present application, as preferred in the embodiment of the present application, as shown in figure 9, the execution module 30 is wrappedIt includes:Third receiving unit 305, the second encryption unit 306, the third receiving unit 305, for receiving tying up for the first userDetermine service provider's instruction;Second encryption unit 306, for being handed over according to binding service quotient instruction raw finance is sent outEasily execute the transaction security operation of the first user.
Binding service quotient instruction can be by the current of the first user in the third receiving unit 305 of the embodiment of the present applicationService provider belonging to the terminal used is bound.Service provider can be, China Unicom, China Telecom, China Mobile, ChinaBroadcasting and TV etc. run operator.
For example, by the binding service quotient instruction for receiving the first user, it can be in real-name authentication-bank authentication-bindingOccur when cell-phone number.
For another example, the cell-phone number used when instructing automatic binding registration by binding service quotient then can not usually be changed.
Raw financial transaction can sent out by binding service quotient in second encryption unit 306 of the embodiment of the present applicationThe transaction security of the first user of Shi Zhihang operates.Transaction peace is executed to raw financial transaction is sent out by binding service quotient instructionAll risk insurance card.That is, needing the terminal used by binding service quotient and user to carry out message same when sending out raw financial transactionAfter step or information authentication pass through, it can complete to send out raw financial transaction.
The phone number used when for example, instructing automatic binding registration according to binding service quotient.
For another example, binding cell-phone number can not be modified in end application.
For another example, binding cell-phone number is used to receive the short message verification code and system message when sending out raw finance and suggesting.
According to the embodiment of the present application, a kind of financial transaction client is additionally provided, trades and fills including the on-line financeIt sets.Wherein, the realization principle of on-line finance the transaction device and beneficial effect are described in detail in the above content,It is not repeating herein.
For example, the on-line finance the transaction device 1000 may be provided as one it is associated with on-line finance traction equipmentServer.Referring to Fig.1 0, it further comprises one or more that on-line finance the transaction device 1000, which includes processing component 1011,Processor, and the memory resource as representated by memory 1013, for storing the finger that can be executed by processing component 1011It enables, such as application program.The application program stored in memory 1013 may include each one or more correspondenceIn the module of one group of instruction.In addition, processing component 1011 is configured as executing instruction, to execute above-mentioned on-line finance counterpartyMethod.
In some embodiments, on-line finance the transaction device 1000 can also include that a power supply module 1012 is configuredFor execute on-line finance the transaction device 1000 power management, a wired or wireless network interface 1015 be configured as byOn-line finance the transaction device 1000 is connected to network and an input/output interface 1015.On-line finance the transaction device 1000 canTo operate based on the operating system for being stored in memory 1013.
In some embodiments, on-line finance the transaction device 1000 additionally provides a kind of non-transitory meter including instructionCalculation machine readable storage medium storing program for executing, the memory 1013 for example including instruction, above-metioned instruction can be by on-line finance the transaction devices 1000Processing component 1011 is executed to complete the above method.For example, the non-transitorycomputer readable storage medium can be ROM,Random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is traded by on-line financeWhen the processor of device 1000 executes, so that on-line finance the transaction device 1000 is able to carry out any of the above-described kind of on-line finance and hands overEasy method.
Obviously, those skilled in the art should be understood that each module of above-mentioned the application or each step can be with generalComputing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formedNetwork on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are storedBe performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by theyIn multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the application be not limited to it is any specificHardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this fieldFor art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made anyModification, equivalent replacement, improvement etc., should be included within the scope of protection of this application.