Risk application processing method and device

A processing method and risk technology, applied in the field of risk processing, can solve problems such as difficult to distinguish authenticity, defrauding users' funds, and great harm

Active Publication Date: 2019-07-12
ADVANCED NEW TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this kind of counterfeit APP imitates the normal APP in the public application market, it cannot provide real services, and fraudsters usually claim that they can enjoy the service after paying the money, t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk application processing method and device
  • Risk application processing method and device
  • Risk application processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] One or more embodiments of this specification provide a method and apparatus for processing a risky application, so as to achieve the effects of accurately identifying the risky application and effectively preventing users from being defrauded by the risky application.

[0088] In order to make those skilled in the art better understand the technical solutions in one or more embodiments of this specification, the following will describe the technical solutions in one or more embodiments of this specification with reference to the accompanying drawings in one or more embodiments of this specification. The technical solutions are described clearly and completely. Obviously, the described embodiments are only a part of the embodiments of the present specification, rather than all the embodiments. All other embodiments obtained by persons of ordinary skill in the art based on one or more embodiments of the present specification without creative efforts shall fall within the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

One or more embodiments of the invention disclose a risk application processing method and device, which are used for realizing the effects of accurately identifying a risk application and effectivelyavoiding the user from being fraudulent by the risk application. The method comprises the following steps: obtaining a to-be-identified application installed by a sample user within a specified date,wherein the specified date comprises the date of installing a risk application by the sample user; identifying the risk application from the to-be-identified applications according to a pre-generatedrisk application identification algorithm; wherein the risk application identification algorithm is generated according to the installation parameter information of each application to be identified;and according to the identified risk application, performing a corresponding anti-risk operation on a first user who installs the risk application.

Description

technical field [0001] This specification relates to the technical field of risk processing, and in particular, to a method and device for processing risk applications. Background technique [0002] The widespread popularity of smartphones has led to the emergence of various APPs (Applications), and fraudsters also use fake APPs to defraud. Such fake APPs are generally not put on the public application market, but distributed through some application testing platforms. For example, after the fraudsters discover the potential deceived object, they will send the page for downloading the fake APP to the user, guide the user to download and install it, and ask the user to fill in the ID number, mobile phone number and other information. Although this kind of counterfeit APP imitates the normal APP on the open application market, it cannot provide real services, and fraudsters usually claim that they can enjoy the service after paying the money, thereby defrauding the user's fun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06Q10/06G06Q40/04
CPCG06F21/51G06Q10/0635G06Q40/04G06F2221/033
Inventor 张哲应亦丰
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products