Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk prevention and control method, device and equipment based on privacy protection

A privacy protection and risk control technology, applied in the computer field, can solve the problems of inability to meet the decision-making needs of risk prevention and control in complex scenarios, and the inability of the sender or receiver to perceive, etc.

Active Publication Date: 2021-04-02
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since cross-border or cross-regional business processing involves at least two ends, such as the sender and the receiver, risk events may occur when the above-mentioned method is processed, and the sender or receiver cannot perceive them, so it cannot meet the risk prevention and control of complex scenarios decision-making needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk prevention and control method, device and equipment based on privacy protection
  • Risk prevention and control method, device and equipment based on privacy protection
  • Risk prevention and control method, device and equipment based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Such as figure 1 As shown, the embodiment of this specification provides a risk prevention and control method based on privacy protection. The execution subject of the method can be a terminal device or a server, wherein the terminal device can be a computer device such as a laptop or a desktop computer, or it can be such as For mobile terminal devices such as mobile phones or tablets, the server can be an independent server or a server cluster composed of multiple servers. The server can be used for a certain business (such as transaction business, financial business or instant messaging Business, etc.) background server. The terminal device or the server may be a terminal device or a server applied in the first area. In this embodiment, the execution subject is taken as an example for detailed description. For the case that the execution subject is a terminal device, processing may be based on the following content, which will not be repeated here. The method specif...

Embodiment 2

[0045] Such as image 3 As shown, the embodiment of this specification provides a risk prevention and control method based on privacy protection. The execution subject of the method can be a terminal device or a server, wherein the terminal device can be a computer device such as a laptop or a desktop computer, or it can be such as For mobile terminal devices such as mobile phones or tablets, the server can be an independent server or a server cluster composed of multiple servers. The server can be used for a certain business (such as transaction business, financial business or instant messaging Business, etc.) background server. The terminal device or the server may be a terminal device or a server applied in the first area. In this embodiment, the execution subject is taken as an example for detailed description. For the case that the execution subject is a terminal device, processing may be based on the following content, which will not be repeated here. The method specif...

Embodiment 3

[0066] Such as Figure 4 As shown, the embodiment of this specification provides a risk prevention and control method based on privacy protection. The execution subject of the method can be a terminal device or a server, wherein the terminal device can be a computer device such as a laptop or a desktop computer, or it can be such as For mobile terminal devices such as mobile phones or tablets, the server can be an independent server or a server cluster composed of multiple servers. The server can be used for a certain business (such as transaction business, financial business or instant messaging Business, etc.) background server. The terminal device or the server may be a terminal device or a server applied in the first area. In this embodiment, the execution subject is taken as an example for detailed description. For the case that the execution subject is a terminal device, processing may be based on the following content, which will not be repeated here. The method speci...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a risk prevention and control method, device and equipment based on privacy protection, and the method comprises the steps of obtaining a risk control featureidentification of a second region needed for the risk prevention and control of a first region, and enabling the second region to comprise one or more different regions; and based on the risk controlfeature identifier of the second region, searching risk control feature information corresponding to the risk control feature identifier of the second region in a cache, wherein the risk control feature information is generated based on risk control data applied to risk prevention and control of the second region and through secure multi-party operation, the risk control feature information doesnot contain the content of risk control data of the second area, and the risk control data comprises privacy data of users in the second area; and if the risk control feature information correspondingto the risk control feature identifier of the second region is found in the cache, executing risk prevention and control processing for the first region based on the risk control feature informationand the risk control data of the first region.

Description

technical field [0001] This description relates to the field of computer technology, and in particular to a method, device and equipment for risk prevention and control based on privacy protection. Background technique [0002] With the continuous development of cross-border or cross-regional rapid networking, more and more network service platforms are committed to the interconnection between domestic and overseas corresponding service applications in a certain country, which requires service platforms to realize cross-border business Processing, such as cross-border remittances, cross-border transactions, etc. As the current business service scenarios become more and more complex, risks such as account information theft, user privacy information leakage, black industry attacks and other risks often occur in the process of cross-border business processing, which makes cross-border or cross-regional risks Prevention and control poses enormous challenges. [0003] Usually, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q10/06
CPCG06F21/6245G06Q10/0635
Inventor 黄哲骏
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products