Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for account risk assessment

A risk assessment and account technology, applied in the field of computer systems, can solve problems such as reducing the security of computer systems, and achieve the effect of improving the security of use and facilitating management and monitoring.

Active Publication Date: 2018-08-07
ADVANCED NEW TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hackers usually steal multiple accounts and then carry out illegal activities between accounts, which greatly reduces the security of computer systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for account risk assessment
  • Method and device for account risk assessment
  • Method and device for account risk assessment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to effectively identify illegal accounts and improve system security, in the embodiment of this application, the risk index of the account is evaluated based on the number of natural persons corresponding to the mobile phone number bound to the account, so as to accurately screen out abnormal accounts that pose a threat to system security .

[0042] Preferred implementations of the present application will be described in detail below in conjunction with the accompanying drawings.

[0043] In practical applications, many hacking gangs in e-commerce systems will sell stolen goods by setting up multiple seller accounts, and in order to facilitate management and control, hacking gangs usually bind these multiple seller accounts to the same or fix several mobile phones Number. Through the sampling and analysis of massive data, an obvious rule was discovered: the number of different natural persons bound to a mobile phone number can be used as the basis for determi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a computer system, and provides a method and device for assessing account risk, which are used to effectively identify illegal accounts, thereby improving system security. The method is as follows: the management server determines the risk level of the mobile phone number according to the number of natural persons bound to the mobile phone number, determines the risk level of each account according to the binding relationship between the mobile phone number and the account, and determines the risk level of each account based on the risk level of each account. As well as the corresponding relationship between the preset risk level and the risk index, the risk index of each account is determined, wherein the risk index is used to represent the probability of a case occurring in the account. In this way, illegal accounts that endanger system security can be identified accurately and efficiently, thereby facilitating strict management and monitoring, and further improving the use security of the computer system in an all-round way.

Description

technical field [0001] The present application relates to a computer system, in particular to a method and device for assessing account risk in a computer system. Background technique [0002] With the development of computer technology, more and more criminal gangs have gradually begun to realize illegal activities through computer systems. [0003] At present, among all kinds of criminal gangs, hacking gangs are the most rampant. Hackers usually steal multiple accounts, and then carry out illegal activities between accounts, which greatly reduces the security of computer systems. [0004] In view of this, it is necessary to provide a new method to effectively identify illegal accounts. Contents of the invention [0005] Embodiments of the present application provide a method and device for assessing account risk, which are used to effectively identify illegal accounts, thereby improving system security. [0006] The specific technical scheme that the embodiment of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06
Inventor 傅颖
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products