CN105516071B - 验证业务操作安全性的方法、装置、终端及服务器 - Google Patents

验证业务操作安全性的方法、装置、终端及服务器 Download PDF

Info

Publication number
CN105516071B
CN105516071B CN201410539483.2A CN201410539483A CN105516071B CN 105516071 B CN105516071 B CN 105516071B CN 201410539483 A CN201410539483 A CN 201410539483A CN 105516071 B CN105516071 B CN 105516071B
Authority
CN
China
Prior art keywords
service
business
risk control
terminal
control model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410539483.2A
Other languages
English (en)
Chinese (zh)
Other versions
CN105516071A (zh
Inventor
吕鲲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811355486.5A priority Critical patent/CN110084007B/zh
Priority to CN201410539483.2A priority patent/CN105516071B/zh
Priority to TW104113714A priority patent/TWI666563B/zh
Priority to JP2017518928A priority patent/JP6800147B2/ja
Priority to PL15866753T priority patent/PL3207464T3/pl
Priority to US14/880,637 priority patent/US10313353B2/en
Priority to KR1020177012991A priority patent/KR102107560B1/ko
Priority to SG11201702758WA priority patent/SG11201702758WA/en
Priority to PCT/US2015/055120 priority patent/WO2016093945A1/en
Priority to EP15866753.5A priority patent/EP3207464B1/en
Priority to ES15866753T priority patent/ES2867751T3/es
Publication of CN105516071A publication Critical patent/CN105516071A/zh
Application granted granted Critical
Publication of CN105516071B publication Critical patent/CN105516071B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/384Payment protocols; Details thereof using social networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Qualifying participants for shopping transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)
CN201410539483.2A 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器 Active CN105516071B (zh)

Priority Applications (11)

Application Number Priority Date Filing Date Title
CN201811355486.5A CN110084007B (zh) 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端
CN201410539483.2A CN105516071B (zh) 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器
TW104113714A TWI666563B (zh) 2014-10-13 2015-04-29 驗證業務操作安全性的方法、裝置、終端及伺服器
PL15866753T PL3207464T3 (pl) 2014-10-13 2015-10-12 Sposób, urządzenie, terminal i serwer do weryfikacji bezpieczeństwa działania usługi
US14/880,637 US10313353B2 (en) 2014-10-13 2015-10-12 Method, device, terminal, and server for verifying security of service operation
KR1020177012991A KR102107560B1 (ko) 2014-10-13 2015-10-12 서비스 동작의 보안을 검증하는 방법, 장치, 단말기 및 서버
JP2017518928A JP6800147B2 (ja) 2014-10-13 2015-10-12 サービス作業のセキュリティを検証するための方法、デバイス、端末およびサーバ
SG11201702758WA SG11201702758WA (en) 2014-10-13 2015-10-12 Method, device, terminal, and server for verifying security of service operation
PCT/US2015/055120 WO2016093945A1 (en) 2014-10-13 2015-10-12 Method, device, terminal, and server for verifying security of service operation
EP15866753.5A EP3207464B1 (en) 2014-10-13 2015-10-12 Method, device, terminal, and server for verifying security of service operation
ES15866753T ES2867751T3 (es) 2014-10-13 2015-10-12 Método, dispositivo, terminal y servidor para verificar la seguridad de operación de servicio

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410539483.2A CN105516071B (zh) 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201811355486.5A Division CN110084007B (zh) 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端

Publications (2)

Publication Number Publication Date
CN105516071A CN105516071A (zh) 2016-04-20
CN105516071B true CN105516071B (zh) 2019-01-18

Family

ID=55655636

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201811355486.5A Active CN110084007B (zh) 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端
CN201410539483.2A Active CN105516071B (zh) 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201811355486.5A Active CN110084007B (zh) 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端

Country Status (10)

Country Link
US (1) US10313353B2 (enExample)
EP (1) EP3207464B1 (enExample)
JP (1) JP6800147B2 (enExample)
KR (1) KR102107560B1 (enExample)
CN (2) CN110084007B (enExample)
ES (1) ES2867751T3 (enExample)
PL (1) PL3207464T3 (enExample)
SG (1) SG11201702758WA (enExample)
TW (1) TWI666563B (enExample)
WO (1) WO2016093945A1 (enExample)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296406A (zh) 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 交互数据的处理方法及装置
CN111404887B (zh) 2015-11-02 2023-03-10 创新先进技术有限公司 一种业务处理方法及装置
US10303889B2 (en) * 2016-01-07 2019-05-28 Emmanuel Gonzalez System and method to reduce inappropriate email and online behavior
CN107016473B (zh) * 2016-01-27 2022-11-22 创新先进技术有限公司 一种风险控制方法和设备
US10038700B1 (en) * 2016-03-29 2018-07-31 EMC IP Holding Company LLC Establishing trustworthiness of devices in the internet of things (IoT) to control inter-device communication
CN107644340A (zh) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 风险识别方法、客户端设备及风险识别系统
CN108074024B (zh) * 2016-11-10 2022-04-08 蚂蚁蓉信(成都)网络科技有限公司 可信数据传输方法、装置及系统
TWI668657B (zh) * 2017-01-20 2019-08-11 香港商阿里巴巴集團服務有限公司 Business processing method and device
CN109754319B (zh) * 2017-11-07 2022-11-25 腾讯科技(深圳)有限公司 信用分值确定系统、方法、终端及服务器
US11017100B2 (en) * 2018-08-03 2021-05-25 Verizon Patent And Licensing Inc. Identity fraud risk engine platform
CN112418580A (zh) 2019-08-22 2021-02-26 上海哔哩哔哩科技有限公司 一种风险控制方法、计算机设备及可读存储介
CN112434894A (zh) * 2019-08-23 2021-03-02 上海哔哩哔哩科技有限公司 一种实时风险控制方法、计算机设备及可读存储介质
CN110781500A (zh) * 2019-09-30 2020-02-11 口碑(上海)信息技术有限公司 一种数据风控系统以及方法
CN111310196B (zh) * 2020-05-09 2020-12-04 支付宝(杭州)信息技术有限公司 风险识别方法及装置和电子设备
CN112184231B (zh) * 2020-11-02 2022-06-28 支付宝(杭州)信息技术有限公司 一种可信业务确定方法及装置
CN114124343B (zh) * 2020-11-16 2023-11-14 神州融安数字科技(北京)有限公司 保护隐私的风险评分信息查询方法、装置、系统及设备
CN112988727B (zh) * 2021-03-25 2022-09-16 北京百度网讯科技有限公司 数据标注方法、装置、设备、存储介质及计算机程序产品
CN114389901B (zh) * 2022-03-24 2022-08-23 湖南三湘银行股份有限公司 一种基于在线化的客户认证系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8635662B2 (en) * 2008-01-31 2014-01-21 Intuit Inc. Dynamic trust model for authenticating a user
CN103875003A (zh) * 2011-10-17 2014-06-18 迈克菲股份有限公司 用于在移动网络环境中把应用列入白名单的系统和方法
WO2014145395A2 (en) * 2013-03-15 2014-09-18 Rohter Consulting LLC System and method for consumer fraud protection
US8856894B1 (en) * 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
EP2733635A3 (en) * 2012-11-14 2017-11-29 BlackBerry Limited Mobile communications device providing heuristic security authentication features and related methods

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7614078B1 (en) * 2003-04-02 2009-11-03 Cisco Technology, Inc. Threshold access based upon stored credentials
JP5087850B2 (ja) * 2006-03-14 2012-12-05 富士通株式会社 サービス仲介方法、サービス仲介装置及びサービス仲介システム
US9003488B2 (en) * 2007-06-06 2015-04-07 Datavalet Technologies System and method for remote device recognition at public hotspots
TWI521451B (zh) * 2009-07-29 2016-02-11 Danal Taiwan Co Ltd To assess the risk of online consumption of trading control methods, systems and online transactions to pay methods
US20110219424A1 (en) * 2010-03-05 2011-09-08 Microsoft Corporation Information protection using zones
CN102045634A (zh) * 2010-11-12 2011-05-04 深圳市爱贝信息技术有限公司 基于移动终端地理位置异常的用户安全控制方法及装置
CN107103548A (zh) * 2011-11-17 2017-08-29 阿里巴巴集团控股有限公司 网络行为数据的监控方法和系统以及风险监控方法和系统
US9747440B2 (en) * 2012-08-15 2017-08-29 Qualcomm Incorporated On-line behavioral analysis engine in mobile device with multiple analyzer model providers
CN103024744B (zh) * 2012-12-24 2015-08-05 百度在线网络技术(北京)有限公司 移动终端的身份验证的方法和系统
US9262610B2 (en) * 2013-01-23 2016-02-16 Facebook, Inc. Imposter account detection and remediation in a social networking system
US10475029B2 (en) 2013-03-15 2019-11-12 Allowify Llc System and method for consumer fraud protection
US9003196B2 (en) * 2013-05-13 2015-04-07 Hoyos Labs Corp. System and method for authorizing access to access-controlled environments
CN103530772A (zh) * 2013-09-30 2014-01-22 深圳钱盒信息技术有限公司 一种移动互联支付风险控制方法及系统
CN103944722B (zh) * 2014-04-17 2017-05-10 华北科技学院 一种互联网环境下用户可信行为的识别方法
US10362136B2 (en) * 2014-08-20 2019-07-23 Visa International Service Association Device profile data usage for state management in mobile device authentication
US20160239649A1 (en) * 2015-02-13 2016-08-18 Qualcomm Incorporated Continuous authentication
US9654477B1 (en) * 2015-05-05 2017-05-16 Wells Fargo Bank, N. A. Adaptive authentication
US10140600B2 (en) * 2015-07-01 2018-11-27 Liveensure, Inc. System and method for mobile peer authentication and asset control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8635662B2 (en) * 2008-01-31 2014-01-21 Intuit Inc. Dynamic trust model for authenticating a user
CN103875003A (zh) * 2011-10-17 2014-06-18 迈克菲股份有限公司 用于在移动网络环境中把应用列入白名单的系统和方法
EP2733635A3 (en) * 2012-11-14 2017-11-29 BlackBerry Limited Mobile communications device providing heuristic security authentication features and related methods
US8856894B1 (en) * 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
WO2014145395A2 (en) * 2013-03-15 2014-09-18 Rohter Consulting LLC System and method for consumer fraud protection

Also Published As

Publication number Publication date
EP3207464B1 (en) 2021-04-07
US10313353B2 (en) 2019-06-04
US20160103997A1 (en) 2016-04-14
JP6800147B2 (ja) 2020-12-16
PL3207464T3 (pl) 2021-07-19
ES2867751T3 (es) 2021-10-20
TWI666563B (zh) 2019-07-21
JP2017531875A (ja) 2017-10-26
SG11201702758WA (en) 2017-05-30
CN110084007B (zh) 2023-11-28
KR20170069271A (ko) 2017-06-20
EP3207464A4 (en) 2017-10-04
KR102107560B1 (ko) 2020-05-08
CN110084007A (zh) 2019-08-02
TW201614535A (en) 2016-04-16
EP3207464A1 (en) 2017-08-23
CN105516071A (zh) 2016-04-20
WO2016093945A1 (en) 2016-06-16

Similar Documents

Publication Publication Date Title
CN105516071B (zh) 验证业务操作安全性的方法、装置、终端及服务器
KR102396739B1 (ko) 자산 관리 방법 및 장치, 및 전자 디바이스
US10795527B1 (en) Systems and methods configured to provide the improved real time user experience involving mobile computing devices, a back-end server and NFC-coupled interactive posters including encryption, network operation and/or other features
US11790078B2 (en) Computer-based systems configured for managing authentication challenge questions in a database and methods of use thereof
US10642998B2 (en) Section-based security information
CN105900396B (zh) 移动云服务体系架构
US10129197B2 (en) Computerized system and method for modifying a message to apply security features to the message's content
US20150188900A1 (en) Session managment in a multi-tenant, multi-data center environment system and method
KR101247859B1 (ko) 컴퓨팅 디바이스들 간의 동적 콘텐츠 프리퍼런스 및 동작 공유
US9544317B2 (en) Identification of potential fraudulent website activity
CN103907366A (zh) 用于有选择地公开用户数据的方法
US12026687B2 (en) Systems configured to manage user-related external party-activity software objects by using machine-readable indicia and methods of use thereof
CN114240060A (zh) 风险控制方法、风险处理系统、装置、服务器及存储介质
EP3381166A1 (en) Systems and methods for cross-channel device binding
CA3184096A1 (en) Personal information vault
US11310307B2 (en) Computer-based platforms/systems, computing devices/components and/or computing methods for one or more technological applications involving real-time data processing between a server, one or more mobile computing devices and near field communication connected interactive posters
US11537736B2 (en) System for detecting anomalous access to tables
Clarke An Intelligent Client-Centric Framework for Responsive, Privacy Conscious Personalisation
CN115391820A (zh) 基于区块链的请求数据的处理方法和装置

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right