Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk identification and business processing method and device

A technology for risk identification and business processing, applied in the field of network information security, can solve the problem of low risk identification accuracy, and achieve the effect of improving security and accuracy

Active Publication Date: 2017-05-17
ADVANCED NEW TECH CO LTD
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the embodiment of the present application provides a method and device for risk identification and business processing, which are used to solve the problem that the existing technology cannot identify potential risk accounts, resulting in low risk identification accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification and business processing method and device
  • Risk identification and business processing method and device
  • Risk identification and business processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] With the increasing complexity of the Internet network environment, some illegal users use the Internet platform to perform illegal operations to seek illegal benefits, which not only damages the interests of other users, but also brings great inconvenience to network service providers. In order to ensure a safe and orderly network environment, the server uses a blacklist method or a rule method to identify whether the user's account is a risk account.

[0039] For example: an illegal user has performed an illegal operation using an illegal account A, and the server records the illegal account A in the blacklist. Identify illegal account A in time to prevent illegal users from using illegal account A to perform illegal operations.

[0040] However, if an illegal user has a normal account B and a newly registered account C, since the illegal user has not used account C to perform illegal operations, the server will consider account C to be a safe account and there is no ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a risk identification and business processing method and a device, comprising: obtaining the relationship data of a target account wherein the relationship data of the target account contains a first account that establishes a social relationship with the target account; determining the risk characteristic value of the first account and the risk spreading probability value of the first account wherein the risk spreading probability value is used to represent the probability of the first account to spread the risk to the target account; utilizing the risk characteristic value of the first account and the risk spreading probability value of the first account to calculate the risk characteristic value of the target account; and according to the risk characteristic value of the target account, identifying whether the target account belongs to a risk account or not. According to the invention, through the obtaining of the relationship data of the target account and under the assistance of a label spreading algorithm, the risk characteristic value of the target account could be predicted and obtained from the risk characteristic value of other accounts through the use of the established social relationship with the target account so as to further determine the risk condition of the target account and to effectively resolve the problem in the prior art that the potential risk account could not be identified.

Description

technical field [0001] The present application relates to the field of network information security, in particular to a method and equipment for risk identification and business processing. Background technique [0002] With the rapid development of Internet technology, various application products appear on the Internet platform, and users use the application products to perform corresponding business operations. For example, users use social applications to communicate and communicate with others; users use application products with payment functions to perform payment operations, etc. [0003] However, with the increasing complexity of the current Internet network environment, illegal users use the Internet platform to perform illegal operations for illegal use. For example, when an application product launches a promotional activity, the number of coupons that users can obtain is usually limited, but illegal users obtain multiple coupons by registering multiple differen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40H04L29/06
CPCG06Q20/4016G06Q30/0207H04L63/1458
Inventor 陈弢刘贺李哲
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products