Risk identification method and device and electronic equipment

A technology of risk and device identification, applied in the Internet field, can solve problems such as rampant

Active Publication Date: 2020-06-19
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But what follows is that the Internet security problem is becoming more and more serious, and various illegal activities with the help of the Internet are also becoming more and more rampant.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and device and electronic equipment
  • Risk identification method and device and electronic equipment
  • Risk identification method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0087] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a risk identification method and device and electronic equipment. The risk identification method and device are applied to a trusted execution environment of terminal equipment,wherein historical business requests and risk rules are stored in the trusted execution environment. The method comprises the following steps: in response to a to-be-sent service request initiated bya service client, obtaining a user account and a terminal identifier contained in the service request; querying a historical target service request which also has the user account and the equipment identifier in historical service requests, and performing statistical analysis on the historical target service request to obtain a numerical value of the risk index; judging whether the numerical value of the risk index reaches a threshold value set in a risk rule or not; deleting an equipment identifier carried in the to-be-sent service request, adding a judgment result, and sending the service request to a service server by the service client; and sending the business request to the business server to enable the business server to execute the business request based on the judgment result. The personal information of the user can be protected due to the fact that the device identifier is not sent outwards.

Description

technical field [0001] The embodiments of this specification relate to the field of Internet technologies, and in particular, to a risk identification method and device, and electronic equipment. Background technique [0002] With the continuous development of the Internet, especially the popularization of the mobile Internet, people can now access the Internet anytime and anywhere. But what follows is that the Internet security problem is becoming more and more serious, and various illegal activities with the help of the Internet are also becoming more and more rampant. [0003] In order to ensure Internet security, each service provider will deploy corresponding risk control strategies to deal with various attacks. For example, the business server will carry out risk identification on the business request initiated by each user, and judge whether there is risk in the business request, the user corresponding to the business request, and the terminal equipment used by the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/53
CPCG06F21/53G06F21/57
Inventor 陆毅成周璟宝鹏庆吕乐赵文飙王维强
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products