Method, device, terminal and server for verifying business operation security

A business operation and business terminal technology, applied in the field of communications, can solve the problems of inaccurate business operation security verification results, and achieve the effect of improving accuracy

Active Publication Date: 2019-01-18
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a method, device, terminal, and server for verifying the security of business operations, so as to solve the problem of inaccurate business operation security verification results in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, terminal and server for verifying business operation security
  • Method, device, terminal and server for verifying business operation security
  • Method, device, terminal and server for verifying business operation security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0043] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses a method, device, terminal and server for verifying the security of business operations. The method includes: receiving a business operation credibility analysis command sent by the business server; calling a pre-stored risk control model according to the credibility analysis command to obtain The credibility analysis result of the business operation; sending the credibility analysis result to the business server, so that the business server can determine the security of the business operation according to the credibility analysis result. By applying the embodiment of the present application, the internal risk control model of the service terminal can be used to obtain the reliability analysis result of the service operation, thereby improving the accuracy of the security verification of the service operation.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method, device, terminal and server for verifying the safety of business operations. Background technique [0002] With the development of smart terminals and the popularization of network applications, users can implement various business operations through various application clients installed on the terminals, such as social instant messaging services, shopping and payment services, and so on. To realize the above-mentioned services, end users often need to register a service account on the server, and implement certain business operations based on the service account. [0003] In the prior art, the network behavior data of end users can be obtained based on big data mining technology. When performing business operations through business accounts, the business server can verify the business security based on the network behavior data of end users to avoi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L67/306G06F21/316G06Q20/20G06Q20/4014G06Q20/4016H04L63/08G06Q30/0609G06F2221/034G06Q50/01G06Q20/384G06F21/577H04L63/102H04L67/30H04L67/303H04L67/535H04L9/32
Inventor 吕鲲
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products