Unlock instant, AI-driven research and patent intelligence for your innovation.

A risk control method and device for business operations

A business operation and risk control technology, applied in the computer field to achieve the effect of improving security

Active Publication Date: 2020-08-07
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a risk control method for business operations to solve the security problem of the identity verification mechanism in the terminal in the offline business scenario
[0007] The embodiment of the present application provides a risk control device for business operations to solve the security problem of the identity verification mechanism in the terminal in the offline business scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A risk control method and device for business operations
  • A risk control method and device for business operations
  • A risk control method and device for business operations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0036] As mentioned above, in the scenario of offline business operation, the application used by the user has its own corresponding identity verification mechanism, but the identity verification mechanism of the application is only the only guarantee for the security of the user account. Once other users pass the identity of the application After ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a risk control method and device for business operations. The application program on the terminal monitors the business operations sent by the user for invoking offline business information. At least one of rules, risk assessment models, and recorded historical operation data to determine whether the business operation is a risky operation, and if so, refuse to call the offline business information; otherwise, call the offline business information. Compared with the prior art, by adopting the above-mentioned method in the embodiment of the present application, when the user performs offline business, in addition to the identity verification of the terminal itself, the process of risk control processing for the user's business operation is also added , forming a double guarantee mechanism, thus effectively improving the security in the offline business environment.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a risk control method and device for business operations. Background technique [0002] With the development of information technology, users can not only obtain corresponding business services on the network platform provided by service providers, but also directly obtain corresponding business services from other users. [0003] At present, besides the traditional online mode for service interaction between the service demander user (abbreviated as the first user) and the service provider user (abbreviated as the second user), the offline mode may also be used. Specifically, in the offline mode, the terminal used by the first user can be disconnected from the network connection, and the terminal provides offline business information such as the account ID and authentication ID corresponding to the first user through two-dimensional codes, sound waves, or near-field ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/31
CPCG06F21/316G06F21/6245H04L9/40G06F21/31H04L63/0876G06Q20/4014G06Q20/4016
Inventor 夏巨鹏李才伟顾曦蒋宝
Owner ADVANCED NEW TECH CO LTD