Business data processing method, account identification method, devices, and computer terminal

A technology of business data and processing methods, applied in data processing applications, computing, commerce, etc., can solve the problems of low accuracy, easy to be cracked, etc., to improve the recognition accuracy, improve the effect of marketing activities, and reduce marketing costs. Effect

Inactive Publication Date: 2018-06-15
ALIBABA GRP HLDG LTD
View PDF7 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a business data processing, account identification method and device, and a computer terminal, so as to at least solve the technical problems of the specific type of behavior identification scheme for accounts in the related art that are easy to be cracked and have low accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business data processing method, account identification method, devices, and computer terminal
  • Business data processing method, account identification method, devices, and computer terminal
  • Business data processing method, account identification method, devices, and computer terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] In related technologies, enterprise platforms, especially e-commerce platforms, often launch some preferential measures to stimulate users' desire to purchase, for example, attracting users by receiving red envelopes or coupons. With the increase of such preferential activities, some Cheating behaviors have also occurred one after another. For example, when an e-commerce platform launched a red envelope promotion, if the red envelope grabbing is based on SMS verification codes, illegal users can rent a SMS waiting platform to obtain a large number of red envelopes, and then promote them For customers who really need to consume, marketing resources are seized, and the marketing effect of the company is greatly reduced.

[0038] In order to solve the above problems, this embodiment can identify illegal accounts in combination with various information of the account to be identified, for example, identify the operation behavior of the account to be identified in combination...

Embodiment 2

[0081] According to the embodiment of the present application, a method for implementing image 3 The device of the processing method of the business data shown, such as Figure 4 As shown, the device includes:

[0082] The obtaining module 40 is configured to obtain various information of the account to be identified; and obtain a risk value corresponding to each of the above various information, wherein the risk value is used to indicate the degree of trust of the above-mentioned account to be identified;

[0083] A determination module 42, connected to the acquisition module 40, configured to determine the account type of the above-mentioned account to be identified according to the multiple above-mentioned risk values ​​corresponding to the above-mentioned various information;

[0084] The processing module 44 is connected to the determination module 42, and is configured to process the business data from the account to be identified by adopting a business processing meth...

Embodiment 3

[0088] This embodiment provides an account identification method, such as Figure 5 As shown, the method includes:

[0089] Step S502, acquiring various information of the account to be identified, wherein the various information includes at least one of the following: the current behavior characteristics of the account to be identified, the number of times the same device ID is used by the same account or multiple accounts, The number of accounts in the relationship network to which the account to be identified belongs, wherein the device ID is the ID of the device where the account to be identified accesses the website, and the relationship network is a network formed by connecting multiple accounts as vertices of a connected graph , the relationship scores between any two accounts in the above relationship network are greater than a preset threshold, , the above relationship scores are used to indicate the degree of association between the two accounts;

[0090] Step S504,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application discloses a business data processing method, an account identification method, a business data processing device, an account identification device, and a computer terminal. The methodincludes the following steps that: a variety of kinds of information of an account to be identified are obtained; a risk value corresponding to each kind of information in the various kinds of information is obtained, wherein the risk value is used to indicate that the reliability degree of the account to be identified; the account type of the account to be identified is determined according to the plurality of risk values corresponding to the plurality of kinds of information; and the business data of the account to be identified are processed through adopting a business processing mode corresponding to the account type of the account to be identified.

Description

technical field [0001] The present application relates to the field of business security, in particular, to a business data processing, account identification method and device, and a computer terminal. Background technique [0002] In recent years, high red envelope subsidies and super-value promotions have become a common way to attract users on online platforms of e-commerce, social networking, and finance, and have also spawned a group of illegal personnel to participate in various online activities through various means. The company often pays more costs for this activity (that is, marketing cheating), and the effect of the activity is greatly reduced. [0003] In terms of marketing anti-cheating technology, traditional manufacturers’ security strategies are only based on SMS verification of mobile phone numbers, IP frequency restrictions, and ordinary picture verification, which raises the threshold for batch registration. However, illegal personnel can be regarded as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00
CPCG06Q30/0185
Inventor 巩文化
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products