Unlock instant, AI-driven research and patent intelligence for your innovation.

Risk control method and apparatus used for virtual resource operation

A technology for virtual resources and risks, applied in the field of risk control of virtual resource operations, can solve the problem of inability to accurately determine the risk exposure of users' payment accounts, and achieve the effect of ensuring account security and improving security.

Inactive Publication Date: 2017-01-04
ADVANCED NEW TECH CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a risk control method and device for virtual resource operation, to at least solve the technical problem in the prior art that the risk exposure of the user's payment account cannot be accurately determined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk control method and apparatus used for virtual resource operation
  • Risk control method and apparatus used for virtual resource operation
  • Risk control method and apparatus used for virtual resource operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] According to the embodiment of the present application, an embodiment of a risk control method for virtual resource operation is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0027] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 is a schematic structural diagram of an optional computer terminal according to an embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the proc...

Embodiment 2

[0133] According to the embodiment of the present application, a device for implementing the above risk control method for virtual resource operation is also provided. The device provided in the above embodiment of the present application can be run on a computer terminal, such as Figure 9 As shown, the device includes: an acquisition unit 91, a prediction unit 92 and an adjustment unit 93,

[0134] Wherein, the obtaining unit is configured to obtain the first operation behavior data of each individual account in the historical time interval and the second operation behavior data of the target account in the historical time interval.

[0135] The predicting unit is configured to use the acquired first and second operational behavior data to predict a first risk probability of a risk event occurring in the target account at the first moment.

[0136] The adjustment unit is configured to adjust the baseline of the virtual resources of the target account at the first moment acco...

Embodiment 3

[0161] Embodiments of the present application may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.

[0162] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.

[0163] Optionally, Figure 14 is a schematic structural diagram of another optional computer terminal according to an embodiment of the present application. Such as Figure 14 As shown, the computer terminal A may include: one or more (only one is shown in the figure) processors and memory.

[0164] Wherein, the memory can be used to store software programs and modules, such as the program instructions / modules corresponding to the risk control method and device for virtual resource operation in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a risk control method and apparatus used for virtual resource operation. According to one embodiment, the risk control method used for the virtual resource operation includes: a processor can call information and application programs stored by a memory through a transmission device in order to perform the following steps: obtaining first operation behavior data of each individual account in a historical time interval and second operation behavior data of a target account in the historical time interval; predicting a first risk probability for occurrence of risk events of the target account at a first time point by employing the obtained first operation behavior data and the second operation behavior data; and adjusting the credit baseline of a virtual resource of the target account at the first time point according to the predicted first risk probability and virtual resource operation data of the target account. According to the method and apparatus, the technical problem that in the prior art, the risk exposure of a payment account of a user cannot be accurately determined is solved.

Description

technical field [0001] The present application relates to the field of data processing, in particular, to a risk control method and device for virtual resource operations. Background technique [0002] In the prior art, the security of the card associated with the user's virtual resource account (eg, payment account, which may include: Alipay account, WeChat wallet account, etc.) is achieved by setting a quota baseline for the account. Specifically, according to the account quota system of the prior art, according to certain rules (such as account active time, etc.), the accounts are divided into two types: mature and immature, and in different payment scenarios, static settings are set for the associated cards of the accounts. When the operating limit of an account exceeds its static limit baseline (for example, the daily cumulative amount exceeds its daily cumulative limit baseline, or the monthly cumulative amount exceeds the monthly cumulative limit baseline, etc.), then...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/4016
Inventor 韩彧
Owner ADVANCED NEW TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More