Service behavior safety control method, system and equipment
A technology of security control and behavior, applied in the fields of Internet information security and anti-fraud, it can solve the problems of inability to configure the disposal strategy individually, to obtain restricted data in time, to modify and optimize, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and specific embodiments.
[0029] Such as figure 1 As shown, a business behavior security control method disclosed in the embodiment of the present invention mainly includes the following steps:
[0030] S1: Validation of user information. Obtain requesting user information, including user characteristic value data carried in the user request, or characteristic value data and request type, and judge whether it exists in the existing penalty data set, and reject the user's request operation if it exists. In this embodiment, the characteristic value data of the user includes one or more of the user ID, the user's mobile phone number, the user's WeChat ID, the user's device number, and the user's IP address.
[0031] In order to improve the efficiency of user information verification, the user feature value data obtained in this s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com