Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for recognizing computer stealing accounts

An identification method and computer technology, applied in the field of user security, can solve problems such as the difficulty of qualitative identification, abnormal environmental transaction behavior, and construction of attribute characteristics, so as to improve identification accuracy and coverage, increase case identification rate, and improve identification efficiency. Effect

Inactive Publication Date: 2016-07-06
ALIBABA GRP HLDG LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This brand-new modus operandi has brought great difficulty and challenge to the qualitative identification of misappropriation cases
[0005] However, most of the existing qualitative methods for account theft cases are based on the characteristics of abnormal operation behavior when the case occurs, including whether the environment is reliable and whether the transaction behavior is abnormal.
However, these characteristics collected only considering the information characteristics of the criminal when committing the crime are often unable to fully describe the scene information of the entire crime, and thus cannot comprehensively construct attribute characteristics, resulting in poor qualitative identification of the case, and even Lots of misjudgments and omissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for recognizing computer stealing accounts
  • Method and system for recognizing computer stealing accounts
  • Method and system for recognizing computer stealing accounts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0033] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0034] The first embodiment of the present invention relates to a computer stolen account identification method. figure 1 It is a schematic flow chart of the computer stolen account identification method. Such as figure 1 As shown, the computer stolen account identification method includes the following steps:

[0035] In step 101, data of susp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the user safety technology and discloses a method and system for recognizing computer stealing accounts. According to the method and system, crime feature data can be extracted from suspicious transaction data and then after-crime feature data is extracted to carry out score calculation to determine whether the suspicious transaction is an account stealing case. Feature changes before and after a crime are taken full consideration of to stress features which cannot be avoided by stealers who simulate the behaviors of the user whose accounts are stolen, and therefore, the recognition accuracy and coverage rate are increased.

Description

technical field [0001] The invention relates to user safety technology, in particular to a computer stolen account identification method and system. Background technique [0002] In the transaction through the third-party payment platform, the buyer purchases the goods, uses the account provided by the third-party platform to pay, and the third-party payment platform notifies the seller to deliver the goods; after the buyer inspects the item, he can notify the seller to pay, and the third-party platform Then transfer the money to the seller's account. In this Internet transaction, there are two types of misappropriation: card theft and account theft. [0003] From stealing the balance to buy online game virtual items and then reselling them, to transferring the balance to their own bank cards, the criminal behavior of the thief is varied. Moreover, acquiring information, forging ID cards, applying for bank cards and mobile phone cards with false certificates, and stealing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
Inventor 祝志博陈秋纯张英
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products