Risk control method and apparatus used for virtual resource operation
A technology for virtual resources and risks, applied in the field of risk control of virtual resource operations, can solve the problem of inability to accurately determine the risk exposure of users' payment accounts, and achieve the effect of ensuring account security and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] According to the embodiment of the present application, an embodiment of a risk control method for virtual resource operation is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0027] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 is a schematic structural diagram of an optional computer terminal according to an embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the proc...
Embodiment 2
[0133] According to the embodiment of the present application, a device for implementing the above risk control method for virtual resource operation is also provided. The device provided in the above embodiment of the present application can be run on a computer terminal, such as Figure 9 As shown, the device includes: an acquisition unit 91, a prediction unit 92 and an adjustment unit 93,
[0134] Wherein, the obtaining unit is configured to obtain the first operation behavior data of each individual account in the historical time interval and the second operation behavior data of the target account in the historical time interval.
[0135] The predicting unit is configured to use the acquired first and second operational behavior data to predict a first risk probability of a risk event occurring in the target account at the first moment.
[0136] The adjustment unit is configured to adjust the baseline of the virtual resources of the target account at the first moment acco...
Embodiment 3
[0161] Embodiments of the present application may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.
[0162] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.
[0163] Optionally, Figure 14 is a schematic structural diagram of another optional computer terminal according to an embodiment of the present application. Such as Figure 14 As shown, the computer terminal A may include: one or more (only one is shown in the figure) processors and memory.
[0164] Wherein, the memory can be used to store software programs and modules, such as the program instructions / modules corresponding to the risk control method and device for virtual resource operation in t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



