Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk control model training, risk control method, device and equipment for identifying misappropriation of secondary allocation accounts

A secondary number distribution and model training technology, which is applied in data processing applications, protocol authorization, instruments, etc., can solve the problems of user fund loss, information leakage, etc., and achieve the effect of efficient identification

Active Publication Date: 2020-12-08
ADVANCED NEW TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

New mobile phone number users or some lawbreakers will take advantage of this risk loophole to log in and operate accounts on these Internet platforms by pretending to be the original user's identity through SMS verification, resulting in the loss of funds and information leakage of the original user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk control model training, risk control method, device and equipment for identifying misappropriation of secondary allocation accounts
  • Risk control model training, risk control method, device and equipment for identifying misappropriation of secondary allocation accounts
  • Risk control model training, risk control method, device and equipment for identifying misappropriation of secondary allocation accounts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The embodiment of this specification provides risk control model training, risk control method, device and equipment for identifying misappropriation of secondary number distribution accounts.

[0070] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments of this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0071] figure 1 A schematic flow diagram of a risk control model training method for identifying misappropriation of secondary number allocation accou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification discloses a risk control model training, a risk control method, device and equipment for identifying misappropriation of secondary number distribution accounts. The scheme includes: obtaining transaction-related data of multiple accounts; for the historical account transactions contained in the transaction-related data, obtaining the qualitative label of the account transaction, the qualitative label indicating whether the corresponding account transaction belongs to the secondary allocation Account misappropriation events; the following two types of risk characteristics of each account transaction are extracted from the transaction-related data: the consistency of the user name between the address book system and the account system to which the corresponding mobile phone number belongs, the corresponding account and the same identity Consistency of mobile phone numbers between other accounts; use the obtained qualitative labels and extracted risk features as training data to train a supervised model to identify misappropriation of secondary account distribution; use the trained supervised model to identify secondary Number distribution account theft.

Description

technical field [0001] This manual relates to the technical field of computer software, and in particular to risk control model training, risk control methods, devices and equipment for identifying misappropriation of secondary number distribution accounts. Background technique [0002] Mobile phone number resources are owned by the state, and users only have the right to use them. Due to the limited resources of mobile phone numbers, when a user deactivates a mobile phone number, the mobile phone number will be reclaimed by the communication operator. After a period of freezing, the mobile phone number will be re-entered into the market after a period of time, that is, the second number allocation. At present, the state stipulates that the minimum freezing period of mobile phone numbers is 90 days. [0003] With the development of the mobile Internet, more and more Internet platforms use the mobile phone number directly as the user's account, or as the identity identifier ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06Q30/00
CPCG06Q20/4016G06Q30/0185G06Q20/386G06Q20/322G06Q20/3255
Inventor 马蕊赵华朱通
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products