Training of risk control model, risk control method, device and equipment for identifying embezzlement of secondary release account

A secondary number and account allocation technology, applied in data processing applications, protocol authorization, instruments, etc., can solve the problems of user fund loss, information leakage, etc., and achieve the effect of efficient identification

Active Publication Date: 2018-12-25
ADVANCED NEW TECH CO LTD
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

New mobile phone number users or some lawbreakers will take advantage of this risk loophole to log in and operate accounts on these Internet platforms by pretending to be the original user's identity through SMS verification, resulting in the loss of funds and information leakage of the original user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Training of risk control model, risk control method, device and equipment for identifying embezzlement of secondary release account
  • Training of risk control model, risk control method, device and equipment for identifying embezzlement of secondary release account
  • Training of risk control model, risk control method, device and equipment for identifying embezzlement of secondary release account

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The embodiment of this specification provides risk control model training, risk control method, device and equipment for identifying misappropriation of secondary number distribution accounts.

[0070] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments of this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0071] figure 1 A schematic flow diagram of a risk control model training method for identifying misappropriation of secondary number allocation accou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the specification disclose risk control model training, a risk control method, a device and equipment for identifying the embezzlement of a secondary release account. The scheme includes: acquiring transaction-related data of multiple accounts; obtaining a qualitative tag of the account transaction according to the historical account transaction included in the transaction related data, wherein the qualitative tag indicates whether the corresponding account transaction belongs to a secondary loosening account embezzlement event; extracting the following two types of risk characteristics of each account transaction from the transaction related data: the corresponding mobile phone number belongs to the address book system and the user name between the account system is identical, and the corresponding account is identical with the mobile phone number between other accounts with the same identity; using the obtained qualitative labels and extracted risk characteristics as training data, a supervised model being trained to identify the embezzlement of the secondary release account. The trained supervised model is used to identify the embezzlement of the secondary release account.

Description

technical field [0001] This manual relates to the technical field of computer software, and in particular to risk control model training, risk control methods, devices and equipment for identifying misappropriation of secondary number distribution accounts. Background technique [0002] Mobile phone number resources are owned by the state, and users only have the right to use them. Due to the limited resources of mobile phone numbers, when a user deactivates a mobile phone number, the mobile phone number will be reclaimed by the communication operator. After a period of freezing, the mobile phone number will be re-entered into the market after a period of time, that is, the second number allocation. At present, the state stipulates that the minimum freezing period of mobile phone numbers is 90 days. [0003] With the development of the mobile Internet, more and more Internet platforms use the mobile phone number directly as the user's account, or as the identity identifier ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q30/00
CPCG06Q20/4016G06Q30/0185G06Q20/386G06Q20/322G06Q20/3255
Inventor 马蕊赵华朱通
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products