CN117635146A - Account management method, account management device, computer equipment and storage medium - Google Patents

Account management method, account management device, computer equipment and storage medium Download PDF

Info

Publication number
CN117635146A
CN117635146A CN202311354272.7A CN202311354272A CN117635146A CN 117635146 A CN117635146 A CN 117635146A CN 202311354272 A CN202311354272 A CN 202311354272A CN 117635146 A CN117635146 A CN 117635146A
Authority
CN
China
Prior art keywords
account
data
transaction
user
transaction data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311354272.7A
Other languages
Chinese (zh)
Inventor
夏乙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202311354272.7A priority Critical patent/CN117635146A/en
Publication of CN117635146A publication Critical patent/CN117635146A/en
Pending legal-status Critical Current

Links

Abstract

The application discloses an account management method, an account management device, computer equipment and a storage medium, and belongs to the fields of cloud technology and financial science and technology. According to the method, a third party account management system is built based on a preset distributed architecture, a user account is created in the third party account management system based on user registration information, first transaction data are obtained, second transaction data are obtained, cross verification is conducted on the first transaction data and the second transaction data, cross verification data are obtained, the cross verification data are imported into a risk assessment model, risk assessment levels are obtained, risk management and control strategies corresponding to the risk assessment levels are searched, and the risk management and control strategies are executed. The application also relates to the field of blockchain technology, and user registration information can be stored on blockchain nodes. The comprehensive account management scheme improves the expansibility and the data accuracy of an account management system through distributed account management, reduces manual operation and improves user experience.

Description

Account management method, account management device, computer equipment and storage medium
Technical Field
The application belongs to the fields of cloud technology and financial science and technology, and particularly relates to an account management method, an account management device, computer equipment and a storage medium.
Background
An account management system is a software system for managing and maintaining user accounts and related information, and is generally used in organizations, enterprises or financial institutions, etc., for managing user accounts, rights and security. Particularly when managing the third party bank account, the user often has difficulty in easily managing the account because of the complex management and association between different accounts.
At present, the existing third party account management system generally adopts a client-server architecture, and various account management operations are realized through interaction between a client request and a server, but the client-server architecture has the problems of simple functions and difficult expansion, and a lot of information needs to be queried across systems, so that the system is very inconvenient for users, and the difficulty of operation is increased. In addition, the existing third party account management system completely relies on the user to fill information and manually check data, so that the data has a certain degree of inaccuracy and cannot be checked in real time.
Disclosure of Invention
An embodiment of the application aims to provide an account management method, an account management device, computer equipment and a storage medium, so as to solve the technical problems that an existing third party account management system is simple in function, difficult to expand, and completely depends on user reporting information and manual checking data, so that the data is inaccurate, and user experience is affected.
In order to solve the above technical problems, the embodiments of the present application provide an account management method, which adopts the following technical schemes:
an account management method, comprising:
receiving an account management instruction, and constructing a third party account management system based on a preset distributed architecture;
responding to a user registration instruction, acquiring user registration information, and creating a user account in a third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account;
responding to the transaction verification instruction, acquiring first transaction data from a transaction party account number and acquiring second transaction data from a bank account;
cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data;
taking the cross verification data as input data of a preset risk assessment model, and importing the input data into the risk assessment model to obtain a risk assessment grade;
and searching a risk management and control strategy corresponding to the risk evaluation level based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result.
Further, the step of responding to the user registration instruction, obtaining user registration information, and creating a user account in the third party account management system based on the user registration information specifically includes:
Responding to the user registration instruction, acquiring user registration information uploaded by the user terminal, and performing user identity verification based on the user registration information;
after the user identity verification is passed, the user registration information is sent to a third party account management system;
creating a user account in a third party account management system based on the user registration information;
responding to a user registration instruction, acquiring user registration information uploaded by a user terminal, and performing user identity verification based on the user registration information, wherein the method specifically comprises the following steps of:
generating a key pair for user identity verification, wherein the key pair comprises a public key and a private key, the private key is stored in a third party account management system, and the public key is stored in a user terminal;
receiving signature information uploaded by a user terminal, wherein terminal information of the user terminal is encrypted based on a public key to generate the signature information;
and verifying the signature information by using the private key to complete user identity verification.
Further, after the step of obtaining the user registration information in response to the user registration instruction and creating the user account in the third party account management system based on the user registration information, the method further includes:
configuring access rights for the user account based on the user registration information;
Responding to the transaction verification instruction, acquiring first transaction data from a transaction party account number and acquiring second transaction data from a bank account, wherein the method specifically comprises the following steps of:
responding to the transaction verification instruction, receiving first transaction data uploaded by a transaction party terminal, storing the first transaction data into a transaction party account, receiving second transaction data uploaded by a bank terminal, and storing the second transaction data into a bank account;
inquiring access authority of a user account, determining the user account with the authority of accessing a transaction party account to obtain a first authority account, and determining the user account with the authority of accessing a bank account to obtain a second authority account;
the first transaction data is synchronized to the first rights account and the second transaction data is synchronized to the second rights account.
Further, the third party payment account is a right account of the transaction party account and the bank account, and the step of cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data specifically comprises the following steps:
after data synchronization of the first transaction data and the second transaction data is completed, carrying out hash operation on the first transaction data to obtain a first hash value, and carrying out hash operation on the second transaction data to obtain a second hash value;
Comparing the first hash value with the second hash value to obtain a hash comparison result;
and generating cross verification data according to the hash comparison result.
Further, the third party payment account is a right account of the transaction party account and the bank account, and the step of cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data specifically comprises the following steps:
after data synchronization of the first transaction data and the second transaction data is completed, acquiring a digital signature in the first transaction data to obtain a first digital signature, and acquiring a digital signature in the second transaction data to obtain a second digital signature;
comparing the first digital signature with the second digital signature to obtain a signature comparison result;
cross-validation data is generated based on the signature comparison results.
Further, the risk assessment model is constructed based on a gradient lifting tree algorithm, and before the step of taking the cross-validation data as input data of the preset risk assessment model and importing the input data into the risk assessment model to obtain a risk assessment grade, the method further comprises the following steps:
acquiring preset training data, wherein the training data is historical transaction data for completing cross verification;
Carrying out data division on the training data to obtain a training set and a verification set;
constructing an initial evaluation model based on a gradient lifting tree algorithm, and importing a training set into the initial evaluation model to obtain a trained risk evaluation model;
and performing performance evaluation on the trained risk evaluation model by using the verification set, and outputting a risk evaluation model passing the performance evaluation.
Further, constructing an initial evaluation model based on a gradient lifting tree algorithm, and importing a training set into the initial evaluation model to obtain a trained risk evaluation model, which specifically comprises the following steps:
constructing a plurality of decision trees based on a gradient lifting tree algorithm, and constructing an initial evaluation model based on the plurality of decision trees;
performing feature extraction and feature coding on the training set to obtain data coding features;
importing the data coding features into an initial evaluation model, and classifying the training set based on the data coding features by using a plurality of decision trees;
continuously calculating a loss function of the initial evaluation model in the process of classifying the training set;
and when the loss function of the initial assessment model reaches the minimum value, obtaining a risk assessment model with the training completed.
In order to solve the above technical problems, the embodiments of the present application further provide an account management device, which adopts the following technical scheme:
An account management apparatus, comprising:
the system building module is used for receiving the account management instruction and building a third party account management system based on a preset distributed architecture;
the user registration module is used for responding to the user registration instruction, acquiring user registration information and creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account;
the data acquisition module is used for responding to the transaction verification instruction, acquiring first transaction data from the account number of the transaction party and acquiring second transaction data from the bank account;
the cross verification module is used for carrying out cross verification on the first transaction data and the second transaction data in the third party payment account to obtain cross verification data;
the risk assessment module is used for taking the cross verification data as input data of a preset risk assessment model, and importing the input data into the risk assessment model to obtain a risk assessment grade;
the risk management and control module is used for searching a risk management and control strategy corresponding to the risk evaluation level based on a preset risk rule engine, executing the risk management and control strategy and outputting a risk management and control result.
In order to solve the above technical problems, the embodiments of the present application further provide a computer device, which adopts the following technical schemes:
a computer device comprising a memory having stored therein computer readable instructions which when executed by a processor implement the steps of the account management method as claimed in any one of the preceding claims.
In order to solve the above technical problems, embodiments of the present application further provide a computer readable storage medium, which adopts the following technical solutions:
a computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the account management method as claimed in any one of the preceding claims.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
the application discloses an account management method, an account management device, computer equipment and a storage medium, and belongs to the fields of cloud technology and financial science and technology. The method comprises the steps of receiving an account management instruction, constructing a third party account management system based on a preset distributed architecture, responding to the user registration instruction, obtaining user registration information, creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account, responding to a transaction verification instruction, obtaining first transaction data from the transaction party account, obtaining second transaction data from the bank account, performing cross verification on the first transaction data and the second transaction data in the third party payment account to obtain cross verification data, taking the cross verification data as input data of a preset risk assessment model, importing the input data into the risk assessment model to obtain a risk assessment grade, searching a risk management and control strategy corresponding to the risk assessment grade based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result. The comprehensive account management scheme improves the expansibility and the data accuracy of an account management system through distributed account management and risk assessment, automates an account management flow, reduces manual operation, improves account safety through risk assessment and risk management and control strategies, and provides better use experience for users.
Drawings
For a clearer description of the solution in the present application, a brief description will be given below of the drawings that are needed in the description of the embodiments of the present application, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 illustrates an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 illustrates a flow chart of one embodiment of an account management method according to the present application;
FIG. 3 illustrates a schematic diagram of one embodiment of an account management device according to the present application;
fig. 4 shows a schematic structural diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description and claims of the present application and in the description of the figures above are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to better understand the technical solutions of the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablet computers, electronic book readers, MP3 players (Moving Picture Experts Group Audio Layer III, dynamic video expert compression standard audio plane 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic video expert compression standard audio plane 4) players, laptop and desktop computers, and the like.
The server 105 may be a server that provides various services, such as a background server that provides support for pages displayed on the terminal devices 101, 102, 103, and may be a stand-alone server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
It should be noted that, the account management method provided in the embodiments of the present application is generally executed by a server, and accordingly, the account management device is generally disposed in the server.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow chart of one embodiment of an account management method according to the present application is shown. The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions. The account management method comprises the following steps:
S201, receiving an account management instruction, and constructing a third party account management system based on a preset distributed architecture.
In this embodiment, the framework program of the account management system is started by receiving an account management instruction, and the system is constructed by using a preset distributed architecture, so as to provide high availability and scalability.
The account management system of the distributed architecture is a system based on the distributed computing and service architecture, and is used for managing user accounts and related operations, dividing account management functions into a plurality of independent services or modules, and deploying and running on a plurality of nodes so as to realize the scalability, reliability and performance of the system.
In account management systems of distributed architecture, account data is typically stored in pieces or copies on multiple database nodes to improve the availability and fault tolerance of the data, with different services or modules being responsible for handling different account operations such as user authentication, account creation, account querying, transaction records, etc. The services cooperate and interact through network communication to complete various functions of account management.
S202, user registration information is acquired in response to a user registration instruction, and a user account is created in a third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account.
In this embodiment, when receiving the user registration instruction, user registration information, such as a user name, a contact way, and the like, is acquired, and a user account is created in the third party account management system, where the account types include a bank account, a third party payment account, and a transaction party account.
Further, the step of responding to the user registration instruction, obtaining user registration information, and creating a user account in the third party account management system based on the user registration information specifically includes:
responding to the user registration instruction, acquiring user registration information uploaded by the user terminal, and performing user identity verification based on the user registration information;
after the user identity verification is passed, the user registration information is sent to a third party account management system;
a user account is created in the third party account management system based on the user registration information.
In this embodiment, after receiving the user registration instruction, the user registration information uploaded by the user terminal is responded and acquired, and then user identity verification is performed on the information, so as to ensure that the identity of the user is legal and effective. If the user passes the authentication, the user registration information is sent to the third party account management system, which can be realized by transmitting the registration information to an interface of the third party account management system or by a message queue and the like. In the third party account management system, a user account is created based on the user registration information.
Through the steps, after receiving the user registration instruction, the user account can be created in the third-party account management system according to the authentication result and registration information of the user, so that the user can use the accounts to conduct subsequent transaction and payment operation. Meanwhile, the step of user identity verification can also ensure the safety and the legality of the account.
Responding to a user registration instruction, acquiring user registration information uploaded by a user terminal, and performing user identity verification based on the user registration information, wherein the method specifically comprises the following steps of:
generating a key pair for user identity verification, wherein the key pair comprises a public key and a private key, the private key is stored in a third party account management system, and the public key is stored in a user terminal;
receiving signature information uploaded by a user terminal, wherein terminal information of the user terminal is encrypted based on a public key to generate the signature information;
and verifying the signature information by using the private key to complete user identity verification.
In this embodiment, prior to user registration, the system generates a pair of keys, including a public key and a private key, the private key being stored in the third party account management system and the public key being sent to the user terminal for storage in the user terminal for use by the user terminal. When the user registers, the user terminal will send the terminal information which is signed by the public key to the system, the system will receive the terminal information and analyze the signature information from the terminal information, then uses the private key stored in the third party account management system to decrypt and verify the signature information, if the result of decryption and verification of the signature information is consistent with the terminal information, the user authentication is successful, otherwise, the user authentication is failed.
Through the steps, the system can perform user identity verification based on the terminal information and the public key private key pair uploaded by the user terminal, so that the identity of the user can be ensured to be legal and effective, and the security of the account is improved.
S203, in response to the transaction verification instruction, acquiring first transaction data from the account number of the transaction party and acquiring second transaction data from the bank account.
In this embodiment, when a transaction verification instruction is received, the system obtains first transaction data, such as transaction amount, transaction time, etc., from the transaction party account, and obtains second transaction data, such as account balance, transaction history, etc., from the bank account, by obtaining these data, for subsequent verification and analysis.
In a specific embodiment of the present application, the first transaction data includes the following fields:
transaction amount: the value of the amount of money in which the transaction occurs;
timestamp: time and date information representing the occurrence of a transaction;
transaction party information: identity information including the transaction initiator or transaction recipient, such as account number, user name, email address, etc.;
transaction description: brief description of the transaction or remark information.
The second transaction data includes the following fields:
Transaction amount: corresponding to a transaction amount in the first transaction data;
timestamp: corresponding to a timestamp in the first transaction data;
bank account information: including details of the bank account associated with the transaction, such as account number, bearer name, bank name, etc.;
transaction description: detailed description or remark information for the transaction.
Further, after the step of obtaining the user registration information in response to the user registration instruction and creating the user account in the third party account management system based on the user registration information, the method further includes:
and configuring access rights for the user account based on the user registration information.
In this embodiment, after the user account is created, it is also necessary to configure access rights for the user account. In particular, the system needs to determine the access rights requirements of the user account. This may be determined based on information such as the user's role, identity, and desired operation. And carrying out corresponding configuration in the third party account management system according to the access authority requirements of the user account, wherein the configuration comprises setting the operation authority, the data access authority, the system resource access authority and the like of the user. After configuring the access rights of the user account, the system may perform rights verification to ensure that the configured rights are valid and correct, which may be verified by performing rights testing, simulating user operations, and the like.
Through the steps, the system can configure the access authority for the user account so as to ensure that the user can operate and access according to the authority required by the user when using the account, improve the safety and flexibility of the account, and simultaneously can meet different requirements of the user.
Responding to the transaction verification instruction, acquiring first transaction data from a transaction party account number and acquiring second transaction data from a bank account, wherein the method specifically comprises the following steps of:
responding to the transaction verification instruction, receiving first transaction data uploaded by a transaction party terminal, storing the first transaction data into a transaction party account, receiving second transaction data uploaded by a bank terminal, and storing the second transaction data into a bank account;
inquiring access authority of a user account, determining the user account with the authority of accessing a transaction party account to obtain a first authority account, and determining the user account with the authority of accessing a bank account to obtain a second authority account;
the first transaction data is synchronized to the first rights account and the second transaction data is synchronized to the second rights account.
In this embodiment, first transaction data uploaded by the transaction party terminal is received, the first transaction data is stored in the transaction party account, second transaction data uploaded by the bank terminal is received, and the second transaction data is stored in the bank account. The system then queries the access rights of the user accounts to determine which user accounts have the rights to access the transaction party accounts and to determine which user accounts have the rights to access the bank accounts, and the first transaction data obtained from the transaction party accounts is synchronized into the first rights accounts so as to authorize the user accounts to perform the corresponding operations and accesses. Likewise, the system will synchronize the second transaction data obtained from the bank account into the second rights account.
Through the steps, the system can acquire the first transaction data from the account number of the transaction party, acquire the second transaction data from the bank account, and synchronize the data to the user account with the corresponding access right, so that the user account with the right can be ensured to perform corresponding operation and access, and the safety and controllability of the transaction are improved.
S204, cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data.
In this embodiment, in the third party payment account, the first transaction data and the second transaction data are cross-validated to ensure accuracy and validity of the transaction, and cross-validated data is generated, which is a cross-validated result of the first transaction data and the second transaction data.
Further, the third party payment account is a right account of the transaction party account and the bank account, and the step of cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data specifically comprises the following steps:
after data synchronization of the first transaction data and the second transaction data is completed, carrying out hash operation on the first transaction data to obtain a first hash value, and carrying out hash operation on the second transaction data to obtain a second hash value;
Comparing the first hash value with the second hash value to obtain a hash comparison result;
and generating cross verification data according to the hash comparison result.
In this embodiment, a hash operation is performed on first transaction data synchronized from a transaction account, and the data is converted into a hash value with a fixed length through a specific hash algorithm. Similarly, a hash operation is performed on the second transaction data synchronized from the bank account, converting the data into a hash value of a fixed length. Comparing the first hash value with the second hash value to judge whether the two hash values are equal, and if the two hash values are equal, indicating that the first transaction data is consistent with the second transaction data; if the two hash values are not equal, it is indicated that the first transaction data and the second transaction data are not identical. The cross-validation data is generated based on the hash comparison, for example, a cross-validation code or cross-validation flag may be generated to indicate the consistency or inconsistency of the first transaction data and the second transaction data.
Through the steps, the third party payment account can cross-verify the first transaction data and the second transaction data through the hash technology, corresponding cross-verify data are generated, consistency of the first transaction data and the second transaction data is ensured, and credibility and safety of transactions are improved.
Further, the third party payment account is a right account of the transaction party account and the bank account, and the step of cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data specifically comprises the following steps:
after data synchronization of the first transaction data and the second transaction data is completed, acquiring a digital signature in the first transaction data to obtain a first digital signature, and acquiring a digital signature in the second transaction data to obtain a second digital signature;
comparing the first digital signature with the second digital signature to obtain a signature comparison result;
cross-validation data is generated based on the signature comparison results.
In this embodiment, a digital signature is extracted from the first transaction data, the digital signature being generated by encrypting the transaction data by the transaction part account number using its private key. Similarly, a digital signature is extracted from the second transaction data, the digital signature being generated by the bank account encrypting the transaction data using its private key. Comparing the first digital signature with the second digital signature to judge whether the two digital signatures are equal, and if the two digital signatures are equal, indicating that the signatures of the first transaction data and the second transaction data are consistent; if the two digital signatures are not equal, it is indicated that the signatures of the first transaction data and the second transaction data are not identical. Based on the signature comparison, the system may generate cross-validation data, e.g., a cross-validation code or cross-validation flag may be generated to indicate the signature consistency or inconsistency of the first transaction data and the second transaction data.
Through the steps, the third party payment account can cross-verify the first transaction data and the second transaction data through signature verification, corresponding cross-verify data are generated, signature consistency of the first transaction data and the second transaction data is ensured, and reliability and safety of transactions are improved.
S205, taking the cross verification data as input data of a preset risk assessment model, and importing the input data into the risk assessment model to obtain a risk assessment grade.
In this embodiment, the cross-validation data is used as input to a preset risk assessment model that performs risk assessment on the transaction according to certain algorithms and rules, and generates a corresponding risk assessment level that is used to assess the risk level of the transaction.
The basic model of the risk assessment model can be selected according to specific application scenes and requirements, and common basic models comprise decision trees, logistic regression, support vector machines, random forests, gradient lifting trees (Gradient Boosting Tree) and the like.
S206, searching a risk management and control strategy corresponding to the risk evaluation level based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result.
In this embodiment, the present application provides a comprehensive account management scheme, through distributed account management and risk assessment, the scalability and data accuracy of an account management system are improved, an account management flow is automated, manual operations are reduced, and account security is improved through risk assessment and risk management and control policies, and better use experience is provided for users.
Further, the risk assessment model is constructed based on a gradient lifting tree algorithm, and before the step of taking the cross-validation data as input data of the preset risk assessment model and importing the input data into the risk assessment model to obtain a risk assessment grade, the method further comprises the following steps:
acquiring preset training data, wherein the training data is historical transaction data for completing cross verification;
carrying out data division on the training data to obtain a training set and a verification set;
constructing an initial evaluation model based on a gradient lifting tree algorithm, and importing a training set into the initial evaluation model to obtain a trained risk evaluation model;
and performing performance evaluation on the trained risk evaluation model by using the verification set, and outputting a risk evaluation model passing the performance evaluation.
In this embodiment, first, a training dataset including cross-validation data and corresponding risk assessment levels is prepared, ensuring that the dataset contains features (e.g., transaction attributes, user information, etc.) and target variables (risk assessment levels) for training. The training data is feature engineered, including feature selection, feature scaling, feature encoding, etc., to extract useful features and reduce unnecessary noise. The data set is divided into a training set and a verification set, a gradient lifting tree is selected as a basic model, and the model is trained by using the training set, wherein the gradient lifting tree is an integrated learning algorithm, and the performance of the whole model is gradually improved by iteratively training a plurality of weak classifiers (decision trees).
And then, according to the performances of the training set and the verification set, adjusting the super parameters of the gradient lifting tree, such as the number of the tree, the depth of the tree, the learning rate and the like, and improving the generalization performance of the model. And evaluating the trained model by using the verification set, calculating performance indexes of the model, such as accuracy, precision, recall, F1 value and the like, evaluating the effect of the model, and taking the effect as the basis of parameter tuning. And predicting new transaction data by using the trained model, obtaining risk assessment grades, and dividing the transaction into different risk grades according to the output of the model so as to further process or make decisions.
Further, constructing an initial evaluation model based on a gradient lifting tree algorithm, and importing a training set into the initial evaluation model to obtain a trained risk evaluation model, which specifically comprises the following steps:
constructing a plurality of decision trees based on a gradient lifting tree algorithm, and constructing an initial evaluation model based on the plurality of decision trees;
performing feature extraction and feature coding on the training set to obtain data coding features;
importing the data coding features into an initial evaluation model, and classifying the training set based on the data coding features by using a plurality of decision trees;
Continuously calculating a loss function of the initial evaluation model in the process of classifying the training set;
and when the loss function of the initial assessment model reaches the minimum value, obtaining a risk assessment model with the training completed.
In this embodiment, a training set is imported into an initial evaluation model, feature extraction and feature encoding are performed on the training set to obtain data encoding features, the data encoding features are imported into the initial evaluation model, and a plurality of decision trees are used to classify the training set based on the data encoding features.
In the above embodiments, the application discloses an account management method, which belongs to the fields of cloud technology and financial science and technology. The method comprises the steps of receiving an account management instruction, constructing a third party account management system based on a preset distributed architecture, responding to the user registration instruction, obtaining user registration information, creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account, responding to a transaction verification instruction, obtaining first transaction data from the transaction party account, obtaining second transaction data from the bank account, performing cross verification on the first transaction data and the second transaction data in the third party payment account to obtain cross verification data, taking the cross verification data as input data of a preset risk assessment model, importing the input data into the risk assessment model to obtain a risk assessment grade, searching a risk management and control strategy corresponding to the risk assessment grade based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result. The comprehensive account management scheme improves the expansibility and the data accuracy of an account management system through distributed account management and risk assessment, automates an account management flow, reduces manual operation, improves account safety through risk assessment and risk management and control strategies, and provides better use experience for users.
In this embodiment, the electronic device (such as the server shown in fig. 1) on which the account management method operates may receive the instruction or acquire the data through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection may include, but is not limited to, 3G/4G connections, wiFi connections, bluetooth connections, wiMAX connections, zigbee connections, UWB (ultra wideband) connections, and other now known or later developed wireless connection means.
It should be emphasized that, to further ensure the privacy and security of the user registration information, the user registration information may also be stored in a blockchain node.
The blockchain referred to in the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
Those skilled in the art will appreciate that implementing all or part of the processes of the methods of the embodiments described above may be accomplished by way of computer readable instructions, stored on a computer readable storage medium, which when executed may comprise processes of embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of an account management apparatus, where an embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 3, the account management device 300 according to the present embodiment includes:
the system building module 301 is configured to receive an account management instruction, and build a third party account management system based on a preset distributed architecture;
the user registration module 302 is configured to respond to a user registration instruction, obtain user registration information, and create a user account in the third party account management system based on the user registration information, where the user account includes a bank account, a third party payment account, and a transaction party account;
a data obtaining module 303, configured to obtain first transaction data from the account number of the transaction party and obtain second transaction data from the account number of the bank in response to the transaction verification instruction;
the cross-validation module 304 is configured to cross-validate the first transaction data and the second transaction data in the third party payment account to obtain cross-validated data;
the risk assessment module 305 is configured to take the cross-validation data as input data of a preset risk assessment model, and import the input data into the risk assessment model to obtain a risk assessment level;
The risk management and control module 306 is configured to search a risk management and control policy corresponding to the risk assessment level based on a preset risk rule engine, execute the risk management and control policy, and output a risk management and control result.
Further, the user registration module 302 specifically includes:
the user identity verification unit is used for responding to the user registration instruction, acquiring user registration information uploaded by the user terminal and carrying out user identity verification based on the user registration information;
the registration information sending unit is used for sending the user registration information to the third party account management system after the user identity verification is passed;
a user account creation unit for creating a user account in the third party account management system based on the user registration information;
the user identity verification unit specifically comprises:
a verification key generation subunit, configured to generate a key pair for user identity verification, where the key pair includes a public key and a private key, the private key is stored in the third party account management system, and the public key is stored in the user terminal;
the signature information uploading subunit is used for receiving the signature information uploaded by the user terminal, encrypting the terminal information of the user terminal based on the public key and generating the signature information;
And the signature information verification sub-unit is used for verifying the signature information by using the private key so as to complete user identity verification.
Further, the account management device 300 further includes:
the access right configuration module is used for configuring access rights for the user account based on the user registration information;
the data acquisition module 303 specifically includes:
the transaction data uploading unit is used for responding to the transaction verification instruction, receiving the first transaction data uploaded by the transaction party terminal, storing the first transaction data into the account of the transaction party, receiving the second transaction data uploaded by the bank terminal and storing the second transaction data into the bank account;
the access right inquiring unit is used for inquiring the access right of the user account, determining the user account with the access transaction party account right to obtain a first right account, and determining the user account with the access bank account right to obtain a second right account;
and the transaction data synchronizing unit is used for synchronizing the first transaction data to the first authority account and synchronizing the second transaction data to the second authority account.
Further, the third party payment account is a right account of a transaction party account and a bank account, and the cross-validation module 304 specifically includes:
The hash operation unit is used for carrying out hash operation on the first transaction data to obtain a first hash value and carrying out hash operation on the second transaction data to obtain a second hash value after data synchronization of the first transaction data and the second transaction data is completed;
ha Xibi pair unit for comparing the first hash value with the second hash value to obtain hash comparison result;
and the first cross verification unit is used for generating cross verification data according to the hash comparison result.
Further, the third party payment account is a right account of a transaction party account and a bank account, and the cross-validation module 304 further includes:
the large digital signature unit is used for acquiring a digital signature in the first transaction data after data synchronization of the first transaction data and the second transaction data is completed, so as to obtain a first digital signature, and acquiring a digital signature in the second transaction data so as to obtain a second digital signature;
the signature comparison unit is used for comparing the first digital signature with the second digital signature to obtain a signature comparison result;
and the second cross-validation unit is used for generating cross-validation data based on the signature comparison result.
Further, the risk assessment model is constructed based on a gradient-lifting tree algorithm, and the account management apparatus 300 further includes:
The training data module is used for acquiring preset training data, wherein the training data is historical transaction data for completing cross verification;
the data dividing module is used for carrying out data division on the training data to obtain a training set and a verification set;
the model training module is used for constructing an initial evaluation model based on a gradient lifting tree algorithm, and importing a training set into the initial evaluation model to obtain a risk evaluation model after training;
and the model verification module is used for carrying out performance evaluation on the trained risk evaluation model by utilizing the verification set and outputting a risk evaluation model passing the performance evaluation.
Further, the model training module specifically includes:
the model construction unit is used for constructing a plurality of decision trees based on a gradient lifting tree algorithm and constructing an initial evaluation model based on the plurality of decision trees;
the feature processing unit is used for carrying out feature extraction and feature coding on the training set to obtain data coding features;
the data classification unit is used for importing data coding features into an initial evaluation model and classifying the training set based on the data coding features by using a plurality of decision trees;
the loss calculation unit is used for continuously calculating a loss function of the initial evaluation model in the process of classifying the training set;
And the loss evaluation unit is used for obtaining a risk evaluation model after training is completed when the loss function of the initial evaluation model reaches the minimum value.
In the above embodiment, the application discloses an account management device, which belongs to the field of cloud technology and financial science and technology. The method comprises the steps of receiving an account management instruction, constructing a third party account management system based on a preset distributed architecture, responding to the user registration instruction, obtaining user registration information, creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account, responding to a transaction verification instruction, obtaining first transaction data from the transaction party account, obtaining second transaction data from the bank account, performing cross verification on the first transaction data and the second transaction data in the third party payment account to obtain cross verification data, taking the cross verification data as input data of a preset risk assessment model, importing the input data into the risk assessment model to obtain a risk assessment grade, searching a risk management and control strategy corresponding to the risk assessment grade based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result. The comprehensive account management scheme improves the expansibility and the data accuracy of an account management system through distributed account management and risk assessment, automates an account management flow, reduces manual operation, improves account safety through risk assessment and risk management and control strategies, and provides better use experience for users.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 4, fig. 4 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 4 comprises a memory 41, a processor 42, a network interface 43 communicatively connected to each other via a system bus. It should be noted that only computer device 4 having components 41-43 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), programmable gate arrays (fields-Programmable Gate Array, FPGAs), digital processors (Digital Signal Processor, DSPs), embedded devices, etc.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the computer device 4. Of course, the memory 41 may also comprise both an internal memory unit of the computer device 4 and an external memory device. In this embodiment, the memory 41 is typically used to store an operating system and various application software installed on the computer device 4, such as computer readable instructions of an account management method. Further, the memory 41 may be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute computer readable instructions stored in the memory 41 or process data, such as computer readable instructions for executing the account management method.
The network interface 43 may comprise a wireless network interface or a wired network interface, which network interface 43 is typically used for establishing a communication connection between the computer device 4 and other electronic devices.
In the above embodiment, the application discloses a computer device, which belongs to the field of cloud technology and financial science and technology. The method comprises the steps of receiving an account management instruction, constructing a third party account management system based on a preset distributed architecture, responding to the user registration instruction, obtaining user registration information, creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account, responding to a transaction verification instruction, obtaining first transaction data from the transaction party account, obtaining second transaction data from the bank account, performing cross verification on the first transaction data and the second transaction data in the third party payment account to obtain cross verification data, taking the cross verification data as input data of a preset risk assessment model, importing the input data into the risk assessment model to obtain a risk assessment grade, searching a risk management and control strategy corresponding to the risk assessment grade based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result. The comprehensive account management scheme improves the expansibility and the data accuracy of an account management system through distributed account management and risk assessment, automates an account management flow, reduces manual operation, improves account safety through risk assessment and risk management and control strategies, and provides better use experience for users.
The present application also provides another embodiment, namely, a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of an account management method as described above.
In the above embodiments, the application discloses a computer readable storage medium, which belongs to the field of cloud technology and financial science and technology. The method comprises the steps of receiving an account management instruction, constructing a third party account management system based on a preset distributed architecture, responding to the user registration instruction, obtaining user registration information, creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account, responding to a transaction verification instruction, obtaining first transaction data from the transaction party account, obtaining second transaction data from the bank account, performing cross verification on the first transaction data and the second transaction data in the third party payment account to obtain cross verification data, taking the cross verification data as input data of a preset risk assessment model, importing the input data into the risk assessment model to obtain a risk assessment grade, searching a risk management and control strategy corresponding to the risk assessment grade based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result. The comprehensive account management scheme improves the expansibility and the data accuracy of an account management system through distributed account management and risk assessment, automates an account management flow, reduces manual operation, improves account safety through risk assessment and risk management and control strategies, and provides better use experience for users.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The subject application is operational with numerous general purpose or special purpose computer system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
It is apparent that the embodiments described above are only some embodiments of the present application, but not all embodiments, the preferred embodiments of the present application are given in the drawings, but not limiting the patent scope of the present application. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a more thorough understanding of the present disclosure. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing, or equivalents may be substituted for elements thereof. All equivalent structures made by the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the protection scope of the application.

Claims (10)

1. An account management method, comprising:
receiving an account management instruction, and constructing a third party account management system based on a preset distributed architecture;
responding to a user registration instruction, acquiring user registration information, and creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account;
Responding to a transaction verification instruction, acquiring first transaction data from the account number of the transaction party, and acquiring second transaction data from the bank account;
cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data;
taking the cross verification data as input data of a preset risk assessment model, and importing the input data into the risk assessment model to obtain a risk assessment grade;
and searching a risk management and control strategy corresponding to the risk assessment grade based on a preset risk rule engine, executing the risk management and control strategy, and outputting a risk management and control result.
2. The account management method of claim 1, wherein the step of obtaining user registration information in response to a user registration instruction and creating a user account in the third party account management system based on the user registration information comprises:
responding to a user registration instruction, acquiring user registration information uploaded by a user terminal, and performing user identity verification based on the user registration information;
after the user identity verification is passed, the user registration information is sent to the third party account management system;
Creating a user account in the third party account management system based on the user registration information;
the step of responding to the user registration instruction, obtaining the user registration information uploaded by the user terminal and carrying out user identity verification based on the user registration information specifically comprises the following steps:
generating a key pair for user identity verification, wherein the key pair comprises a public key and a private key, the private key is stored in the third party account management system, and the public key is stored in the user terminal;
receiving signature information uploaded by the user terminal, wherein the terminal information of the user terminal is encrypted based on the public key to generate the signature information;
and verifying the signature information by using the private key to finish the user identity verification.
3. The account management method of claim 1, further comprising, after the step of obtaining user registration information in response to the user registration instruction and creating a user account in the third party account management system based on the user registration information:
configuring access rights for the user account based on the user registration information;
the step of responding to the transaction verification instruction, obtaining first transaction data from the transaction party account number and obtaining second transaction data from the bank account specifically comprises the following steps:
Receiving the first transaction data uploaded by a transaction party terminal, storing the first transaction data into the transaction party account, receiving the second transaction data uploaded by a bank terminal, and storing the second transaction data into the bank account in response to the transaction verification instruction;
inquiring the access authority of the user account, determining the user account with the authority of accessing the transaction party account to obtain a first authority account, and determining the user account with the authority of accessing the bank account to obtain a second authority account;
synchronizing the first transaction data to the first rights account and the second transaction data to the second rights account.
4. The account management method of claim 3, wherein the third party payment account is a right account of the transaction party account and the bank account, and the step of cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data specifically comprises:
after data synchronization of the first transaction data and the second transaction data is completed, carrying out hash operation on the first transaction data to obtain a first hash value, and carrying out hash operation on the second transaction data to obtain a second hash value;
Comparing the first hash value with the second hash value to obtain a hash comparison result;
and generating the cross verification data according to the hash comparison result.
5. The account management method of claim 3, wherein the third party payment account is a right account of the transaction party account and the bank account, and the step of cross-verifying the first transaction data and the second transaction data in the third party payment account to obtain cross-verification data specifically comprises:
after data synchronization of the first transaction data and the second transaction data is completed, acquiring a digital signature in the first transaction data to obtain a first digital signature, and acquiring a digital signature in the second transaction data to obtain a second digital signature;
comparing the first digital signature with the second digital signature to obtain a signature comparison result;
and generating the cross verification data based on the signature comparison result.
6. The account management method according to any one of claims 1 to 5, wherein the risk assessment model is constructed based on a gradient-lifted tree algorithm, and before the step of taking the cross-validation data as input data of a preset risk assessment model and importing the input data into the risk assessment model, the step of obtaining a risk assessment level further comprises:
Acquiring preset training data, wherein the training data is historical transaction data for completing cross verification;
performing data division on the training data to obtain a training set and a verification set;
constructing an initial evaluation model based on a gradient lifting tree algorithm, and importing the training set into the initial evaluation model to obtain a trained risk evaluation model;
and performing performance evaluation on the trained risk evaluation model by using the verification set, and outputting a risk evaluation model passing the performance evaluation.
7. The account management method according to claim 6, wherein the step of constructing an initial assessment model based on a gradient-lifted tree algorithm and importing the training set into the initial assessment model to obtain a trained risk assessment model specifically comprises:
constructing a plurality of decision trees based on the gradient lifting tree algorithm, and constructing the initial evaluation model based on the plurality of decision trees;
performing feature extraction and feature coding on the training set to obtain data coding features;
importing the data coding features into the initial assessment model, and classifying the training set based on the data coding features using the plurality of decision trees;
Continuously calculating a loss function of the initial evaluation model in the process of classifying the training set;
and when the loss function of the initial evaluation model reaches the minimum value, obtaining the risk evaluation model with the training completed.
8. An account management device, comprising:
the system building module is used for receiving the account management instruction and building a third party account management system based on a preset distributed architecture;
the user registration module is used for responding to a user registration instruction, acquiring user registration information and creating a user account in the third party account management system based on the user registration information, wherein the user account comprises a bank account, a third party payment account and a transaction party account;
the data acquisition module is used for responding to a transaction verification instruction, acquiring first transaction data from the transaction party account number and acquiring second transaction data from the bank account;
the cross verification module is used for carrying out cross verification on the first transaction data and the second transaction data in the third party payment account to obtain cross verification data;
the risk assessment module is used for taking the cross verification data as input data of a preset risk assessment model, and importing the input data into the risk assessment model to obtain a risk assessment grade;
And the risk management and control module is used for searching a risk management and control strategy corresponding to the risk evaluation grade based on a preset risk rule engine, executing the risk management and control strategy and outputting a risk management and control result.
9. A computer device comprising a memory having stored therein computer readable instructions which when executed by a processor implement the steps of the account management method of any of claims 1 to 7.
10. A computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the account management method of any of claims 1 to 7.
CN202311354272.7A 2023-10-18 2023-10-18 Account management method, account management device, computer equipment and storage medium Pending CN117635146A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311354272.7A CN117635146A (en) 2023-10-18 2023-10-18 Account management method, account management device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311354272.7A CN117635146A (en) 2023-10-18 2023-10-18 Account management method, account management device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117635146A true CN117635146A (en) 2024-03-01

Family

ID=90032852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311354272.7A Pending CN117635146A (en) 2023-10-18 2023-10-18 Account management method, account management device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117635146A (en)

Similar Documents

Publication Publication Date Title
CN111080295B (en) Electronic contract processing method and device based on blockchain
CN113326991B (en) Automatic authorization method, device, computer equipment and storage medium
CN113726784B (en) Network data security monitoring method, device, equipment and storage medium
CN110598478A (en) Block chain based evidence verification method, device, equipment and storage medium
WO2022095518A1 (en) Automatic interface test method and apparatus, and computer device and storage medium
CN111460394A (en) Copyright file verification method and device and computer readable storage medium
CN114996675A (en) Data query method and device, computer equipment and storage medium
US11487899B2 (en) Automated tiered security for confidential information and confidential information sharing and methods thereof
CN112308238A (en) Analytical model training method and device, electronic equipment and storage medium
CN116956326A (en) Authority data processing method and device, computer equipment and storage medium
CN116681045A (en) Report generation method, report generation device, computer equipment and storage medium
CN112256760B (en) Data prediction method and device, computer equipment and storage medium
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN117635146A (en) Account management method, account management device, computer equipment and storage medium
US20240086923A1 (en) Entity profile for access control
CN112231367B (en) Business processing method and device based on artificial intelligence and electronic equipment
KR102478967B1 (en) Method and system for providing blockchain-based contract management service interlocked with metaverse
CN116305074A (en) Enterprise information management method based on authority configuration and related equipment thereof
CN117422523A (en) Product online method and device, computer equipment and storage medium
CN117078332A (en) Abnormal behavior detection method, device, computer equipment and storage medium
CN117273958A (en) Method, device, equipment and medium for processing kernel protection data based on rule engine
CN117455670A (en) Data processing method and device, computer equipment, medium and product
CN115827047A (en) Request processing method and device, computer equipment and storage medium
CN117094827A (en) Data generation method, device, computer equipment and storage medium
CN116996292A (en) Interface configuration method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination