Unlock instant, AI-driven research and patent intelligence for your innovation.

Business risk control method and device

A risk control and business technology, applied in the field of risk control, can solve problems such as complex risk control operations

Pending Publication Date: 2018-06-01
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the existing risk control technology, risk control is initiated by the service provider, and the risk control method is relatively passive; and each business requires a large number of interactions between the business end and the risk control party when implementing risk control, and the operation of risk control is complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business risk control method and device
  • Business risk control method and device
  • Business risk control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0028] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms refer to the same or similar elements. The implementations described in the following exemplary embodiments do not represent all implementations consistent with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to a risk control system and a risk control method and device. The method comprises the steps of obtaining the business logs from a log management server, wherein the businesslogs are the business logs of a plurality of business servers; based on the business logs, if the abnormal user behavior data is determined to exist, sending an authentication request to a verification server, and executing the preset operations on the user accounts corresponding to the abnormal user behavior data before the verification passes. During the above configuration process, a risk control server can obtain the business logs actively, and the risk control operations can be executed when the abnormal user behavior data is determined, thereby realizing the active risk control operation.

Description

technical field [0001] The present application relates to the technical field of risk management and control, in particular to a business risk control method and device. Background technique [0002] With the development of Internet technology, more and more users use the Internet platform to implement various business applications, for example, use the Internet platform to log in to a certain business application, or realize online transactions under a certain business application, etc. While various business applications provide users with various conveniences, they also increase the risk of theft of users' personal information and property. Therefore, it is necessary to carry out reasonable risk control in each business application. [0003] In the existing risk control technology, the risk controller and each service provider generally agree on the business link that needs to be connected to the risk control. When the user executes the agreed business link, the service p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40
CPCG06Q20/4016
Inventor 周达邵纪东吴昊
Owner BEIJING SANKUAI ONLINE TECH CO LTD