Account theft risk identification method and device and prevention and control system

A risk identification and account number technology, which is applied in the field of network security, can solve the problems of insufficient ability to distinguish the risk of theft, identification errors, and unsatisfactory overall effects, etc., and achieve the effect of improving the ability to distinguish the risk of theft, enhance the ability and stability

Active Publication Date: 2017-01-04
ADVANCED NEW TECH CO LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the variable of the number of trading users on the device has poor discrimination and stability. For the normal single-device multi-user transaction situation, this scheme is easy to lead to identification errors
[0005] Mis...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account theft risk identification method and device and prevention and control system
  • Account theft risk identification method and device and prevention and control system
  • Account theft risk identification method and device and prevention and control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In the following embodiments of the present application, input variables such as the number of device user identities resolved within a period of time before the current operation behavior are introduced into the risk scoring model to improve the ability of model variables to distinguish risks. This scheme needs to establish a risk scoring model based on data mining technology. The main modeling steps include determining research objectives, determining data sources, extracting samples, data exploration, model development and model verification, etc. The focus of this application is to provide the scoring model Build suitable input variables. Since the scoring model itself is not the main focus of this application, other details of the modeling will not be described. For details, please refer to the known prior art.

[0054] In order to construct suitable variables, the inventor of the present application collected massive data of users' operation behavior on a certain ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an account theft risk identification method and device and a prevention and control system. The method comprises the steps that information of a device on which an operation is conducted is collected; identity information of all users of history operations on the device within a preset time period before the operation is obtained; all user identity analysis sites are analyzed, the number of the device user identity analysis sites within the time period is counted, and whether the operation has an account theft risk or not is determined accordingly. The device is provided with a device information collecting module, a user information obtaining module, a user identity analyzing module and an account theft risk evaluation module, and whether a current operation has the account theft risk or not can be determined according to the number of the device user identity analysis sites within the preset time period before the current operation. According to the system, the device which evaluates the risk grade through the number of the user identity analysis sites is adopted, the account theft risk can be identified and processed more efficiently, and a safe network environment can be provided for users.

Description

technical field [0001] The present application relates to network security technology, in particular to a risk identification method, identification device and prevention and control system for account theft. Background technique [0002] While online transactions, mobile payments and other applications bring convenience to users, there are also prominent security risks. If the account is stolen, the user may not only suffer property losses, but may also bear the risk that the account thief uses the stolen account to engage in illegal activities. How to promptly and effectively identify whether an account has been stolen, so as to provide users with a network environment as safe as possible, is an important problem that network application service providers cannot avoid and must solve. In the prior art, many fraud risk identification schemes have been proposed, which will be briefly described with examples below. [0003] One type of solution is to identify the risk of acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
CPCG06F21/577H04W12/63G06F21/57H04L63/0876H04L63/107H04W12/06H04W12/126G06F21/31H04L63/08H04L63/1433
Inventor 谭纯平
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products