Method and device for processing business request

A business request and server technology, applied in the computer field, can solve problems such as economic losses and achieve the effect of protecting virtual property

Active Publication Date: 2015-10-14
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, criminals can obtain the double password of the account through phishing, Trojan horses, etc., and then transfer the user's virtual property to their own account by way of gift, so as to achieve the purpose of profit and cause immeasurable economic losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing business request
  • Method and device for processing business request
  • Method and device for processing business request

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0032] image 3 It is a flow chart of the service request processing method provided by the first embodiment of the present invention. combine figure 1, this embodiment describes the processing flow of the server, and the service request processing method provided by this embodiment includes the following steps:

[0033] Step S11, the server receives a service request from the first client to transfer virtual resources to the account of the second client, the service request includes the account of the first client, the account of the second client, and information about the virtual resources to be transferred.

[0034] If the user of the first client wants to transfer virtual resources to the user of the second client, the user of the first client may send a service request for transferring virtual resources to the server 200 through the first client. The service request may include the account of the first client, the account of the second client (that is, the target accou...

no. 2 example

[0043] Figure 4 It is a flow chart of the service request processing method provided by the second embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server, and the service request processing method provided by this embodiment includes the following steps:

[0044] In step S201, the server collects account operation logs corresponding to accounts of all clients.

[0045] Step S202, according to the account operation log, acquire the activity level, consumption habit level and abnormal behavior level of the account of each client.

[0046] Specifically, the login data of each client account recorded in the account operation log can be quantified as the activity level, and the login data includes the number of times or days of login; Quantify the consumption data of the client account as the consumption habit level, the consumption data includes the consumption times of the account in each business; and quantify the ...

no. 3 example

[0057] Figure 5 It is a flow chart of the service request processing method provided by the third embodiment of the present invention. combine figure 1 , this embodiment describes the interactive processing flow between the client and the server, and the service request processing method provided by this embodiment includes the following steps:

[0058] Step S301 , the first client sends to the server a service request for transferring virtual resources to the account of the second client, and the service request includes the account of the first client, the account of the second client, and information about the virtual resources to be transferred.

[0059] Step S302, the server searches the database for the credit corresponding to the account of the second client, and the credit is calculated and obtained by the server according to the activity level, consumption habit level and abnormal behavior level of the account of the second client.

[0060] Step S303, the server ju...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a method for processing a business request. The method comprises the following steps that a server receives a business request which is sent by a first client to transfer virtual resources to an account of a second client, wherein the business request comprises an account of the first client, the account of the second client and information of to-be-transferred virtual resources; the server queries credit corresponding to the account of the second client, wherein the credit is computed by the server according to the activity level, the consumption custom level and the abnormal behavior level of the account of the second client; and if the credit is smaller than a first threshold, the server forbids the transferring of the to-be-transferred virtual resources to the second client. In addition, the embodiment of the invention also discloses a device for processing the business request. According to the method and the device for processing the business request, the virtual property of a user can be effectively protected.

Description

technical field [0001] The invention relates to computer technology, in particular to a method and device for processing service requests. Background technique [0002] With the rapid development of Internet paid value-added services, users can buy virtual property for themselves, such as Q coins, game gold coins, virtual character equipment, etc., and can also buy for others (ie gift consumption). To purchase virtual property, you usually only need to provide the account password and payment password, and you can purchase after completing two verifications. The most critical step in this process is to obtain the double password of the account. However, criminals can obtain the double password of the account through phishing, Trojan horses, etc., and then transfer the user's virtual property to their own account by way of gift, so as to achieve the purpose of profit and cause immeasurable economic losses to the user. Contents of the invention [0003] In view of this, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q20/10
Inventor 刘畅张东蕊涂杰王进
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products