CN108171519A - The processing of business datum, account recognition methods and device, terminal - Google Patents

The processing of business datum, account recognition methods and device, terminal Download PDF

Info

Publication number
CN108171519A
CN108171519A CN201611120597.9A CN201611120597A CN108171519A CN 108171519 A CN108171519 A CN 108171519A CN 201611120597 A CN201611120597 A CN 201611120597A CN 108171519 A CN108171519 A CN 108171519A
Authority
CN
China
Prior art keywords
account
identified
value
type
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611120597.9A
Other languages
Chinese (zh)
Inventor
巩文化
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201611120597.9A priority Critical patent/CN108171519A/en
Publication of CN108171519A publication Critical patent/CN108171519A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

This application discloses a kind of processing of business datum, account recognition methods and device, terminals.Wherein, the processing method of the business datum includes:Obtain the much information of account to be identified;The corresponding value-at-risk of each information in the much information is obtained, wherein, what which was used to indicate the account to be identified is trusted degree;The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information;The business datum from the account to be identified is handled using business processing mode corresponding with the Account Type of the account to be identified.

Description

The processing of business datum, account recognition methods and device, terminal
Technical field
This application involves service security field, in particular to a kind of processing of business datum, account recognition methods and Device, terminal.
Background technology
In recent years, the red packet subsidy of great number, the preferential activity to overflow become the enterprises such as e-commerce, social activity, financial field The mode of the common attraction user of the online platform of industry has also expedited the emergence of a collection of unauthorized person and has been participated on various lines by various means Activity (i.e. marketing cheating), therefore enterprise side often pays more costs, animation effect is had a greatly reduced quality.
Technically traditional manufacturer security strategy is based only on cell-phone number short-message verification to the anti-cheating of marketing, and IP frequency limits are general Logical picture verification improves batch registration threshold, but unauthorized person, due to that can send out platform with short message generation, Agent IP or VPN are soft Part can be considered as unlimited offer IP resources, and normal picture verification code technology can be cracked by automatic machine, and traditional safe plan Slightly usually None- identified batch trumpet is with IP low frequency machine behaviors or the usage scenario of artificial batch operation, due to large enterprises Public outlet IP frequency of use is higher, is susceptible to the risk of erroneous judgement.
It is easily cracked it can be seen that existing in the relevant technologies to the identifying schemes of the specific types behaviors such as marketing cheating And the not high technical problem of accuracy.
For it is above-mentioned the problem of, currently no effective solution has been proposed.
Invention content
The embodiment of the present application provides a kind of processing of business datum, account recognition methods and device, terminal, with It at least solves in the relevant technologies to the specific type Activity recognition scheme of account in the presence of the skill being easily cracked and accuracy is not high Art problem.
According to the one side of the embodiment of the present application, a kind of processing method of business datum is provided, including:It obtains and waits to know The much information of other account;The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used to indicate The account to be identified is trusted degree;Foundation multiple value-at-risks corresponding with the much information are waited to know described in determining The Account Type of other account;Using business processing mode corresponding with the Account Type of the account to be identified to coming from described treat The business datum of identification account is handled.
According to the another aspect of the embodiment of the present application, a kind of account recognition methods is additionally provided, including:It obtains to be identified The much information of account, wherein, the much information includes at least one of:The current behavior of the account to be identified is special Access times, the account belonging relation net to be identified that sign, same device identification ID are used by same account or multiple accounts In account number, wherein, the ID of equipment where when the device id is the account access website to be identified, the network of personal connections is The network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph, the pass in the network of personal connections between any two account It is that score value is all higher than predetermined threshold value, the relationship score value is used to indicate the correlation degree between two accounts;It obtains described a variety of The corresponding value-at-risk of each information in information, wherein, what which was used to indicate the account to be identified is trusted degree;According to The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information.
Optionally, the size of the relationship score value is directly proportional to the access times.
Optionally, it obtains the corresponding value-at-risk of each information in the much information and includes at least one of:1) it obtains The type of the current behavior feature, wherein, the type of the current behavior feature includes:Machine behavior and natural person's behavior; Type according to the current behavior feature determines the corresponding numerical value of the current behavior feature and the first weight;According to described in Numerical value and first weight determine the value-at-risk;2) the second power according to the access times and for device id distribution The value-at-risk is determined again;3) the third weight according to the account number and for account number distribution determines the value-at-risk.
According to the another aspect of the embodiment of the present application, a kind of processing unit of business datum is additionally provided, including:Obtain mould Block, for obtaining the much information of account to be identified;And the corresponding value-at-risk of each information in the much information is obtained, In, what which was used to indicate the account to be identified is trusted degree;Determining module, for foundation and the much information Corresponding multiple value-at-risks determine the Account Type of the account to be identified;Processing module is waited to know for using with described The corresponding business processing mode of Account Type of other account handles the business datum from the account to be identified.
Another aspect according to embodiments of the present invention, the embodiment of the present invention additionally provide a kind of account identification device, including: First acquisition module, for obtaining the much information of account to be identified, wherein, the much information include it is following at least it One:The current behavior feature of the account to be identified;Same device identification ID is used by what same account or multiple accounts used Number;Account number in the account belonging relation net to be identified, wherein, the device id is the account access net to be identified The ID of equipment, the network of personal connections are the network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph where when standing, institute It states the relationship score value in network of personal connections between any two account and is all higher than predetermined threshold value, the relationship score value is used to indicate two accounts Correlation degree between family;Second acquisition module, for obtaining the corresponding value-at-risk of each information in the much information, In, what which was used to indicate the account to be identified is trusted degree;Identification module, for foundation and the much information Corresponding multiple value-at-risks determine the Account Type of the account to be identified.
According to the another aspect of the embodiment of the present application, a kind of terminal is additionally provided, including:Processor and storage Device, wherein, the processor is used to call and perform the program for being used to implement following functions stored in the memory:It obtains The much information of account to be identified;The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used for Indicate the account to be identified is trusted degree;It is determined according to multiple value-at-risks corresponding with the much information described The Account Type of account to be identified;Using business processing mode corresponding with the Account Type of the account to be identified to coming from The business datum for stating account to be identified is handled.
According to the another aspect of the embodiment of the present application, a kind of account recognition methods is provided, including:Obtain account to be identified The device attribute of physical equipment used in access target network;Device attribute based on acquisition establishes account institute to be identified Belong to network of personal connections, wherein, the network of personal connections is made of the account with identical device attribute;It counts and is closed belonging to the account to be identified Account number in system's net;Based on the account number and predetermined threshold value in the account belonging relation net to be identified, account to be identified is determined The Account Type at family.
According to the another aspect of the embodiment of the present application, a kind of account recognition methods is provided, including:Obtain account to be identified The device attribute of physical equipment used in access target network;Device attribute based on acquisition, calculate account to be identified with Multiple relationship score values in account library between each account, wherein, the account library be presetting database or tables of data, the pass It is the correlation degree that score value is used to indicate between two accounts, the higher relationship represented between two accounts of the relationship score value is more Greatly;The relationship score value of selection and account to be identified is more than the account of the first predetermined threshold value, forms the relationship of the account to be identified Net;Account number in statistical relationship net;With based on the account number and the second predetermined threshold value, the account class of account to be identified is determined Type.
According to the another aspect of the embodiment of the present application, a kind of terminal is provided, provides to be handed over user Mutual interactive interface, the interactive interface include:First control, for receiving the first triggering command of user, this first touch Under the triggering to send instructions, the device attribute of physical equipment that account to be identified is used in access target network is obtained;Second control Part, for receiving the second triggering command of user, and under the triggering of second triggering command, the device attribute based on acquisition, Multiple relationship score values between each account in account and account library to be identified are calculated, wherein, the relationship score value is used to indicate Correlation degree between two accounts, and the higher relationship represented between two accounts of the relationship score value is bigger;Third control, For showing the network of personal connections of the account to be identified, wherein, the network of personal connections is by being more than the with the relationship score value of account to be identified The account composition of one predetermined threshold value;4th control, for receiving the third triggering command of user, which is used to touch Hair performs following operate:Based on the account number and the second predetermined threshold value in the network of personal connections, the type of account to be identified is determined;The Five controls show the type of the account to be identified.
In the embodiment of the present application, Account Type is determined using the corresponding value-at-risk of much information of account to be identified, and The business datum from the account to be identified is handled according to the corresponding business processing mode of account type, due to can be with The much information of account to be identified is considered during Account Type is determined, therefore improves the account class of account to be identified The recognition accuracy of type, while the cost of marketing of enterprise can be reduced, marketing activity effect is promoted, and then solve the relevant technologies In there is technical issues that the specific type Activity recognition scheme of account easily be cracked and accuracy not.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Illustrative embodiments and their description please do not form the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is the workflow schematic diagram according to a kind of anti-cheating system of the embodiment of the present application;
Fig. 2 is according to a kind of the hard of the terminal of processing method for being used to implement business datum of the embodiment of the present application Part structure diagram;
Fig. 3 is the flow diagram according to a kind of processing method of business datum of the embodiment of the present application;
Fig. 4 is the structure diagram according to a kind of processing unit of business datum of the embodiment of the present application;
Fig. 5 is the flow diagram according to a kind of account recognition methods of the embodiment of the present application;
Fig. 6 is the structure diagram according to a kind of account apparatus of the embodiment of the present application.
Fig. 7 is the flow diagram according to another account recognition methods of the embodiment of the present application;
Fig. 8 is the flow diagram according to another account recognition methods of the embodiment of the present application;
Fig. 9 is the interactive interface structure diagram according to a kind of terminal of the embodiment of the present application.
Specific embodiment
In order to which those skilled in the art is made to more fully understand application scheme, below in conjunction in the embodiment of the present application The technical solution in the embodiment of the present application is clearly and completely described in attached drawing, it is clear that described embodiment is only The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's all other embodiments obtained without making creative work should all belong to the model of the application protection It encloses.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, " Two " etc. be the object for distinguishing similar, and specific sequence or precedence are described without being used for.It should be appreciated that it uses in this way Data can be interchanged in the appropriate case, so as to embodiments herein described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment Those steps or unit clearly listed, but may include not listing clearly or for these processes, method, product Or the intrinsic other steps of equipment or unit.
First, the part noun or term occurred during the embodiment of the present application is described is suitable for following solution It releases:
Marketing cheating:Finger is acquired an advantage with the means for cheating or violating platform service rule, such as acquisition electric business platform red packet, Commodity preferential subsidy, supplements with money and returns the equity such as existing at authentication registration reward.This behavior is referred to as marketing cheating.
Device id:Device numbering accesses a unique and constant device numbering of website generation.
Intervening objects:Data used in the generation association of any two account, include but unlimited in the embodiment of the present application In:Access point name, network address, email address, institute used in each account access network in device id, the network of personal connections State the geographical location of user corresponding to each account in network of personal connections, such as WIFI titles, IP, mailbox, phone number, ship-to Etc. belonging to intervening objects.
Connected graph, connected graph is the concept based on connection in graph theory, if any two points are to connect in figure, the figure Just it is known as connected graph.
Honey jar:It is a kind of information gathering system, is the target that people is deliberately allowed to attack, hacker is lured to come to attack, understands The means of hacker attack and object etc..
Embodiment 1
In the related art, enterprise platform especially electric business platform can usually release some preferential measures to encourage user Desire to purchase, for example, attract user using the neck forms such as red packet or discount coupon, with the increasing of this preferential activity, some Cheating also generates in succession, for example, in the preferential activity that the release of some electric business platform gives bonus, if it is to be based on to rob red packet Short message verification code, then disabled user can rent the mode of short message platform pending and obtain a large amount of red packets, then promoted to true The client consumed is just needed, robs and accounts for marketing resource, the marketing effectiveness of enterprise is had a greatly reduced quality.
To solve the above problems, the much information that the present embodiment can combine account to be identified knows illegal account Not, for example, the operation behavior of account to be identified is identified with reference to man-machine identification technology, bonding apparatus ID and big data are closed It is network technology, identification disabled user passes through machine, artificial or clique marketing cheating.
The present embodiment can be based on anti-cheating system shown in FIG. 1 and realize, as shown in Figure 1, anti-cheating system includes:It is multiple Client device 10, for providing the login environment of Account Logon;Server 12, for identify account behavior to be detected (for example, The specific types behaviors such as marketing cheating), it is illustrated by taking the identification for cheating of marketing as an example below:
Step S100, user's logon account carry out operation and receive the user's rights such as red packet, favor information;
Step S102, the server 12 in anti-cheating system acquire the corresponding user behavior information of logon account;
Specifically, can be that client device 10 acquires local user behavior information straight by the user behavior information of acquisition It connects or is sent to above-mentioned server 12 indirectly.
Wherein, user behavior information includes being not limited to operation behavior track, facility information (including but not limited to equipment ID), the information such as IP.For server 12 according to the user behavior information of acquisition, whether calculating is machine behavior, and result of calculation is corresponded to Numerical value the account number of number and same relation network received with same device id be weighted.For example, machine row It is 1 for corresponding numerical value, the corresponding numerical value of natural person is 0;Device id is received number as a, the account number of same relation network For b.When the behavior that logon account generates is robot behavior, sum after distributing 1, a and b to respective weight respectively Operation.
Step S104, the information such as server 12 is made a variation by user's current behavior feature, historical behavior, honey jar is associated with, knot It closes the service attribute of concrete scene and is operated to distinguish machine behavior with natural person.On how to identify machine behavior or natural person Behavior is hereinafter discussed in greater detail.
User can generate a large amount of action trail when using enterprise platform product, these user behavior tracks pass through identical Intervening objects link to form a complicated mixed relationship network.
By logistic regression calculated relationship score value, the relationship score value of taking is the conduct relationship side for reaching certain threshold value, is reused The calculating of connected graph belongs to the account number of same relational network with current account and is normalized.Wherein, the relationship Score value is used to indicate the correlation degree between account, wherein, relationship score value is bigger, the association journey between two accounts of instruction Degree is bigger.It is, for example, possible to use following parameter indicates above-mentioned correlation degree:A accounts and B accounts are corresponding using same device id Equipment logs in the number of electric business platform or accesses duration (such as number of days) etc..In one alternate embodiment, it may be used following Calculation formula calculates above-mentioned relation score value R (ti,wi):
Wherein:
tiRepresent that two accounts calculate some value (0- using same intervening objects number (number of days) by normalizing formula 1) function.WiRepresent that two accounts use the weight of same intervening objects.
Current account is calculated to receive number using device id and be normalized.
Sum=a*w1+b*w2+c*w3 is calculated by weighted sum, obtains a risk score value according to interval division to dislike Account of anticipating (i.e. malice account), suspicious account and credible account three classes adventure account grade.Wherein, a represents current account operation Numerical value corresponding to the type of behavior, for example, when current operation behavior is robot behavior, a=1 is being determined as natural person When, a=0, w1 represent weight;B represents the number of receiving of device id, and w2 represents the weight of device id;C represents same relation network Account number, w3 represents corresponding with account number weight.It should be noted that above-mentioned each weighted value is adjustable, example Such as, above equipment ID is received that number is bigger, then its corresponding weight w2 value is bigger, otherwise smaller;Same relation net The account number c of network is bigger, and weight w3 corresponding with c is bigger, otherwise smaller.
Step S106 notifies account levels to operation system 14;
Step S108, operation system 14 carry out business processing, such as credible account according to anti-cheating system adventure account grade Give normal use business;Suspicious account confirms the identity of the account by the way of secondary validation-cross;Malice account carries out Transaction intercepts or strong authentication equivalent risk control strategy.Wherein, operation system can show as a server or server group, but It is without being limited thereto.
Based on above-mentioned design philosophy, the embodiment of the present application additionally provides a kind of processing method embodiment of business datum, needs It is noted that step shown in the flowchart of the accompanying drawings can be in the computer system of such as a group of computer-executable instructions Middle execution, although also, show logical order in flow charts, it in some cases, can be to be different from herein Sequence performs shown or described step.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune It calculates and is performed in device.Fig. 2 shows a kind of terminal for the processing method for being used to implement business datum (or mobile equipment) Hardware block diagram.As shown in Fig. 2, terminal 20 (or mobile equipment 20) can include one or more and (be adopted in figure With 202a, 202b ... ..., 202n is shown) processor 202 (processor 202 can include but is not limited to Micro-processor MCV or The processing unit of programmable logic device FPGA etc.), for storing the memory 204 of data and the biography for communication function Defeated module 206.In addition to this, can also include:Display, input/output interface (I/O interfaces), universal serial bus (USB) Port (can as a port in the port of I/O interfaces by including), network interface, power supply and/or camera.This field is general Logical technical staff is appreciated that structure shown in Fig. 2 is only to illustrate, and the structure of above-mentioned electronic device is not caused to limit. For example, terminal 20 may also include than shown in Fig. 2 more either less components or with different from shown in Fig. 2 Configuration.
It is to be noted that said one or multiple processors 202 and/or other data processing circuits lead to herein Can often it be referred to as " data processing circuit ".The data processing circuit all or part of can be presented as software, hardware, firmware Or any other combination.In addition, data processing circuit can be single independent processing module or all or part of be attached to In any one in other elements in terminal 20 (or mobile equipment).As involved by the embodiment of the present application , which controls (such as the selection of variable resistance end path being connect with interface) as a kind of processor.
Memory 204 can be used for the software program and module of storage application software, such as () side in the embodiment of the present application Corresponding program instruction/the data storage device of method, processor 202 by operation be stored in the software program in memory 204 with And module, so as to perform various functions application and data processing, that is, realize the processing method of above-mentioned business datum.Memory 204 may include high speed random access memory, may also include nonvolatile memory, and such as one or more magnetic storage device dodges It deposits or other non-volatile solid state memories.In some instances, memory 204 can further comprise relative to processor 202 remotely located memories, these remote memories can pass through network connection to terminal 20.The reality of above-mentioned network Example includes but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 206 is used to receive via a network or transmission data.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 20 provide.In an example, transmitting device 206 is fitted including a network Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to Internet is communicated.In an example, transmitting device 206 can be radio frequency (Radio Frequency, RF) module, For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), which may be such that user can be with The user interface of terminal 20 (or mobile equipment) interacts.
It should be noted that the processing method of above-mentioned business datum can be applied to terminal or server, the terminal or clothes The structure of business device may refer to the description in Fig. 2, and details are not described herein again, naturally it is also possible to be realized by application accordingly.
Fig. 3 is the flow diagram according to a kind of processing method of business datum of the embodiment of the present application.This method can be with It runs in terminal shown in Fig. 2, but not limited to this.As shown in figure 3, the method comprising the steps of S302-S308, wherein:
Step S302 obtains the much information of account to be identified;
Optionally, above-mentioned much information includes at least one of:
The current behavior feature of above-mentioned account to be identified;Such as same device identification ID is made by same account or multiple accounts Access times, wherein, the ID of equipment where when above equipment ID is above-mentioned account access website to be identified;
Account number in above-mentioned account belonging relation net to be identified, wherein, above-mentioned relation net is using multiple accounts as company The network that the vertex of logical figure is formed by connecting two-by-two.Optionally, the account in above-mentioned relation net meets the following conditions:Above-mentioned relation Relationship score value in net between any two account is all higher than predetermined threshold value.Optionally, the size of the relationship score value makes with above-mentioned Directly proportional with number, i.e., above-mentioned access times more Important Relations score value and/or above-mentioned account number are bigger, and above-mentioned relation score value is bigger.
Wherein, above-mentioned relation score value can be determined according to following parameter but not limited to this:Each account in above-mentioned relation net The access times of above-mentioned website are accessed using same intervening objects or access duration, wherein, above-mentioned intervening objects are above-mentioned Two accounts of meaning generate data used in association.
Optionally, above-mentioned intervening objects include but not limited to following:Each account access net in device id, above-mentioned relation net The geographical position of user corresponding to each account in access point name, network address, email address, above-mentioned relation net used in network It puts.
Step S304 obtains the corresponding value-at-risk of each information in above-mentioned much information, wherein, which is used to indicate Above-mentioned account to be identified is trusted degree;
Optionally, step S304 can be realized by least one of process:
1) type of above-mentioned current behavior feature is obtained, wherein, the type of above-mentioned current behavior feature includes:Machine behavior With natural person's behavior;Type according to above-mentioned current behavior feature determines the corresponding numerical value of above-mentioned current behavior feature and first Weight;Above-mentioned value-at-risk is determined according to above-mentioned numerical value and above-mentioned first weight;It wherein, can be with for the method for determination of above-mentioned numerical value It is realized using the correspondence for pre-setting behavioural characteristic and numerical value, for example, when current operation behavior is robot behavior, a =1, when being determined as natural person, a=0, w1 represent weight.
Optionally, the type of above-mentioned current behavior feature judges by user's current behavior feature, historical behavior to become The information such as different, honey jar association are operated with reference to the service attribute of concrete scene to distinguish machine behavior with natural person, naturally it is also possible to First judge whether account is robot, and then judge whether the behavior of the account is robot behavior, such as may be used following Form is realized:Intercept and capture the access request that browser is directed to from user;Above-mentioned access request is parsed, obtains parsing knot Fruit;There is no during the browser information for reflecting browser behavior in above-mentioned analysis result, judge above-mentioned user for machine People, wherein, above-mentioned browser behavior includes the operation behavior to above-mentioned browser;There is reflection browsing in above-mentioned analysis result During the browser information of device behavior, judge above-mentioned user for robot or natural person according to preset rules.In the analysis result In there are the browser information in the case of, judge whether the browser information and the page info legal;Described In the case of at least one of browser information and the page info are illegal, judge the user for robot;Described In the case that browser information and the page info are all legal, judge the user for natural person.
2) the second weight according to above-mentioned access times and for above equipment ID distribution determines above-mentioned value-at-risk;
3) the third weight according to above-mentioned account number and for the distribution of above-mentioned account number determines above-mentioned value-at-risk.
Step S306 determines the account of above-mentioned account to be identified according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information Family type;It is alternatively possible to it is accomplished by the following way:Summation operation is carried out to multiple above-mentioned value-at-risks, obtains risk total value; Judge the interval where above-mentioned risk total value;It is determined according to the Account Type corresponding to above-mentioned interval above-mentioned to be identified The Account Type of account.
Step S308, using business processing mode corresponding with the Account Type of above-mentioned account to be identified to coming from above-mentioned treat The business datum of identification account is handled.
The Account Type of above-mentioned account to be identified includes:The first kind, Second Type and third type;The one of the application In a alternative embodiment, when the Account Type of above-mentioned account to be identified is the first kind, allow above-mentioned account to be identified to upper State the operation behavior of business corresponding to business datum;When the Account Type of above-mentioned account to be identified is Second Type, to above-mentioned Account to be identified carries out secondary verification, and when being verified, and allows above-mentioned account to be identified to corresponding to above-mentioned business datum The operation behavior of business;When the Account Type of above-mentioned account to be identified is third type, above-mentioned account to be identified is intercepted to upper State the operation behavior of business corresponding to business datum.Optionally, the above-mentioned first kind, Second Type and third type can show For different grades, i.e., account is classified.
It should be noted that for aforementioned each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement because According to the application, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art should also know It knows, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily the application It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on such understanding, the technical solution of the application is substantially in other words to existing The part that technology contributes can be embodied in the form of software product, which is stored in a storage In intervening objects (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone, Computer, server or network equipment etc.) perform each embodiment of the application described in method.
Embodiment 2
According to the embodiment of the present application, a kind of device for the processing method of business datum shown in implementing Fig. 3 is additionally provided, As shown in figure 4, the device includes:
Acquisition module 40, for obtaining the much information of account to be identified;And it obtains each in above-mentioned much information and believes Corresponding value-at-risk is ceased, wherein, what which was used to indicate above-mentioned account to be identified is trusted degree;
Determining module 42 is connected to acquisition module 40, for according to multiple above-mentioned risks corresponding with above-mentioned much information Value determines the Account Type of above-mentioned account to be identified;
Processing module 44 is connected to determining module 42, for using corresponding with the Account Type of above-mentioned account to be identified Business processing mode handles the business datum from above-mentioned account to be identified.
It should be noted that the modules in the embodiment of the present application are can be realized by the form of software or hardware , for example, for the latter, following form can be shown as, but not limited to this:Above-mentioned modules are located in same processor; Alternatively, the behavior of above-mentioned modules in any combination is located in different processors.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein It repeats no more.
Embodiment 3
The present embodiment provides a kind of account recognition methods, as shown in figure 5, this method includes:
Step S502 obtains the much information of account to be identified, wherein, above-mentioned much information include it is following at least it One:The current behavior feature of above-mentioned account to be identified, same device identification ID are used by what same account or multiple accounts used Account number in number, above-mentioned account belonging relation net to be identified, wherein, above equipment ID is above-mentioned account access net to be identified The ID of equipment where when standing, above-mentioned relation net is the network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph, on It states the relationship score value in network of personal connections between any two account and is all higher than predetermined threshold value, above-mentioned relation score value is used to indicate two Correlation degree between account;
Step S504 obtains the corresponding value-at-risk of each information in above-mentioned much information, wherein, which is used to indicate Above-mentioned account to be identified is trusted degree;
Step S506 determines the account of above-mentioned account to be identified according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information Family type.
Optionally, the size of above-mentioned relation score value is directly proportional to above-mentioned access times.
As an optional embodiment of the present embodiment, step S504 can be accomplished by the following way, but be not limited to This:
1) type of above-mentioned current behavior feature is obtained, wherein, the type of above-mentioned current behavior feature includes:Machine behavior With natural person's behavior;Type according to above-mentioned current behavior feature determines the corresponding numerical value of above-mentioned current behavior feature and first Weight;Above-mentioned value-at-risk is determined according to above-mentioned numerical value and above-mentioned first weight;
2) the second weight according to above-mentioned access times and for above equipment ID distribution determines above-mentioned value-at-risk;
3) the third weight according to above-mentioned account number and for the distribution of above-mentioned account number determines above-mentioned value-at-risk.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein It repeats no more.
Embodiment 4
The present embodiment provides a kind of account identification devices, are used to implement method described in embodiment 5, as shown in fig. 6, the dress Put including:
First acquisition module 60, for obtaining the much information of account to be identified, wherein, above-mentioned much information include with It is at least one lower:The current behavior feature of above-mentioned account to be identified;Same device identification ID is made by same account or multiple accounts Access times,;Account number in above-mentioned account belonging relation net to be identified, wherein, above equipment ID is above-mentioned to be identified The ID of equipment where during account access website, above-mentioned relation net is is formed by connecting multiple accounts as the vertex of connected graph two-by-two Network, the relationship score value in above-mentioned relation net between any two account is all higher than predetermined threshold value, and above-mentioned relation score value is used for Indicate the correlation degree between two accounts;
Second acquisition module 62, for obtaining the corresponding value-at-risk of each information in above-mentioned much information, wherein, the risk What value was used to indicate above-mentioned account to be identified is trusted degree;
Identification module 64, for determining above-mentioned account to be identified according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information The Account Type at family.
It should be noted that the modules in the embodiment of the present application are can be realized by the form of software or hardware , for example, for the latter, following form can be shown as, but not limited to this:Above-mentioned modules are located in same processor; Alternatively, the behavior of above-mentioned modules in any combination is located in different processors.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1 and 3, Details are not described herein again.
Embodiment 5
The present embodiment provides another account recognition methods, this method can be run in terminal shown in Fig. 2, It can run in other terminals that there is more or less structure feature than terminal shown in Fig. 2, but unlimited In this.Fig. 7 is according to the flow diagram of another account recognition methods of the embodiment of the present application, as shown in fig. 7, this method packet Include step S702-S708:
Step S702 obtains the device attribute of physical equipment that account to be identified is used in access target network.It is optional Ground, the device attribute include but not limited to device id, the network address of equipment, mail address of equipment etc..
Step S704, the device attribute based on acquisition establish account belonging relation net to be identified, wherein, above-mentioned relation net It is made of the account with identical device attribute;
Wherein it is determined that there are many modes of account belonging relation net to be identified, for example, it is directly true to be based on device id It is fixed, there will be the account of identical device attribute all component parts as account belonging relation net to be identified, i.e., by with treating Identify that account has all accounts composition above-mentioned relation net of same alike result, for example, the device attribute of account to be identified is equipment ID, and device id=1, value 1 based on device id are searched using other accounts that device id is 1, by the account found with Account to be identified forms connected graph, obtains above-mentioned relation net.Certain rule can also be used to having and account phase to be identified Account with device attribute is screened, and above-mentioned relation net is formed by the account that screening obtains, for example, may be used by account it Between relationship score value and the comparison result of predetermined threshold value mode to having the progress of the account of device attribute identical with account to be identified Screening, wherein, relationship score value is used to indicate the correlation degree between two accounts, can use same intermediary with two accounts Number or duration during object accesses target network embody, but not limited to this.
Step S706 counts the account number in above-mentioned account belonging relation net to be identified;
In the alternative embodiment of the application, since account to be identified may use different device attributes to access Above-mentioned targeted website that is, it is possible that existing simultaneously multiple networks of personal connections, can count above-mentioned account to be identified in the following manner at this time Account number in the belonging relation net of family, but not limited to this:If there are multiple networks of personal connections,:Wherein maximum account number is taken as upper State the account number in account belonging relation net to be identified;Alternatively, wherein minimum account number is taken as belonging to above-mentioned account to be identified Account number in network of personal connections;Alternatively, the average value of the account number of each network of personal connections is taken as above-mentioned account belonging relation to be identified Account number in net.
Step S708 based on the account number and predetermined threshold value in above-mentioned account belonging relation net to be identified, is determined to be identified The Account Type of account.
In an optional embodiment of the present embodiment, above-mentioned predetermined threshold value includes:First threshold, second threshold and Three threshold values, when above-mentioned account number is more than third threshold value, it is malice account to determine above-mentioned Account Type;It is more than in above-mentioned account number Second threshold and less than third threshold value when, determine above-mentioned Account Type be suspicious account;It is less than first threshold in above-mentioned account number When, it is credible account to determine above-mentioned Account Type.
In another optional embodiment of the present embodiment, above-mentioned predetermined threshold value only includes a threshold value, can adopt at this time The identification of Account Type is carried out with the following methods, but not limited to this:When above-mentioned account number is more than predetermined threshold value, above-mentioned Account Type For malice account, when above-mentioned account number is less than predetermined threshold value, above-mentioned Account Type is determined as suspicious account or credible account.
In step S708, the account of account to be identified can be directly determined using the comparison result of account number and predetermined threshold value Type in an optional embodiment, can also consider other parameter during the Account Type for determining account to be identified, Then all parametric synthesis are considered to determine above-mentioned Account Type, such as other than considering above-mentioned account number, can also examine Consider following element:The current behavior feature of the account to be identified;Same device identification ID is made by same account or multiple accounts Access times, wherein, the ID of equipment where when the device id is the account access website to be identified.About such reality Existing mode, may refer to the associated description in embodiment 1, details are not described herein again.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein It repeats no more.
Embodiment 6
The present embodiment provides another account recognition methods, this method can be run in terminal shown in Fig. 2, It can run in other terminals that there is more or less structure feature than terminal shown in Fig. 2, but unlimited In this.Fig. 8 is according to the flow diagram of another account recognition methods of the embodiment of the present application, as shown in figure 8, this method packet Include step S802-S810:
Step S802 obtains the device attribute of physical equipment that account to be identified is used in access target network;
Step S804, the device attribute based on acquisition calculate more between each account in account and account library to be identified A relationship score value, wherein, above-mentioned account library be presetting database or tables of data, above-mentioned relation score value be used to indicate two accounts it Between correlation degree, above-mentioned relation score value it is higher represent two accounts between relationship it is bigger;
Optionally, in the following manner may be used in above-mentioned the determining of account library, but not limited to this:User is in access target website When can generate a large amount of action trail (i.e. user behavior information or for user behavior characteristic information), these user behavior rails Mark links to form a complicated mixed relationship network by same media, each account node group in the mixed relationship network Into above-mentioned account library.
The relationship score value of step S806, selection and account to be identified is more than the account of the first predetermined threshold value, is formed to be identified The network of personal connections of account.Optionally, the first predetermined threshold value can empirically or test of many times obtain, neural network can also be based on Model is trained to obtain, but not limited to this.
Optionally, above-mentioned relation score value is the numerical value determined according to following parameter:Account to be identified in account library with specifying Account uses the number or duration of same device attribute access target network.Such as can by the number of access target network or Person's duration, can also be according to the number or duration of certain preset rules access target network and pass directly as above-mentioned relation score value It is the proportional relationship of score value, but is not limited to the above-mentioned form of expression.
Step S808, the account number in statistical relationship net;With
Step S810 based on above-mentioned account number and the second predetermined threshold value, determines the type of account to be identified.Optionally, Two predetermined threshold values can empirically or test of many times obtain, can also be trained to obtain based on neural network model, but not It is limited to this.
In an optional embodiment of the present embodiment, above-mentioned second predetermined threshold value includes:First threshold, second threshold With third threshold value, when above-mentioned account number is more than third threshold value, it is malice account to determine above-mentioned Account Type;In above-mentioned account number During more than second threshold and less than third threshold value, it is suspicious account to determine above-mentioned Account Type;It is less than first in above-mentioned account number During threshold value, it is credible account to determine above-mentioned Account Type.
In another optional embodiment of the present embodiment, above-mentioned second predetermined threshold value only includes a threshold value, at this time may be used To carry out the identification of Account Type in the following ways, but not limited to this:It is above-mentioned when above-mentioned account number is more than the second predetermined threshold value Account Type is malice account, and when above-mentioned account number is less than the second predetermined threshold value, above-mentioned Account Type is determined as suspicious account Or credible account.
In step S810, the account of account to be identified can be directly determined using the comparison result of account number and predetermined threshold value Type in an optional embodiment, can also consider other parameter during the Account Type for determining account to be identified, Then all parametric synthesis are considered to determine above-mentioned Account Type, such as other than considering above-mentioned account number, can also examine Consider following element:The current behavior feature of the account to be identified;Same device identification ID is made by same account or multiple accounts Access times, wherein, the ID of equipment where when the device id is the account access website to be identified.About such reality Existing mode, may refer to the associated description in embodiment 1, details are not described herein again.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein It repeats no more.
Embodiment 7
The present embodiment provides a kind of terminal, which provides interaction circle for being interacted with user Face, as shown in figure 9, interactive interface 90 includes:
First control 900, for receiving the first triggering command of user, the first triggering command is following for triggering execution Operation:Obtain the device attribute of physical equipment that account to be identified is used in access target network;
Second control 902, for receiving the second triggering command of user, second triggering command is following for triggering execution Operation:Device attribute based on acquisition calculates multiple relationship score values between each account in account and account library to be identified, In, above-mentioned relation score value is used to indicate the correlation degree between two accounts, and above-mentioned relation score value two accounts of higher expression Between relationship it is bigger;
Third control 904, for showing the network of personal connections of above-mentioned account to be identified, wherein, above-mentioned relation net by with it is to be identified The relationship score value of account is more than that the account of the first predetermined threshold value forms;Optionally, there are many exhibition methods of third control 904, It can be shown, can also be opened up by way of the connection relation between list records account by the form of topological diagram Show, however it is not limited to above-mentioned exhibition method.
4th control 906, for receiving the third triggering command of user, the third triggering command is following for triggering execution Operation:Based on the account number and the second predetermined threshold value in above-mentioned relation net, the type of account to be identified is determined;
5th control 908, for showing the type of above-mentioned account to be identified.Optionally, the exhibition of the type of account to be identified Show there are many modes, for example, different types can be represented with different colors, can also represent above-mentioned in the form of word and treat Identify the type of account, however it is not limited to this.
It should be noted that the function of above-mentioned each control is that can be integrated in a manner of specific combination in certain situations In the control of one or different, for example, the function of the first control 900 and the second control 902 can be integrated in a specific control In part, at this point it is possible to determine to perform the function of which control according to the parity of triggering times, for example, in above-mentioned particular control By the (2n+1) is secondary be triggered when, perform the function of the first control 900, when above-mentioned particular control is by (2n) secondary triggering, hold The function of the second control of row 902.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein It repeats no more.
Embodiment 8
Embodiments herein can provide a kind of terminal, which can be in terminal group Any one computer terminal.Optionally, in the present embodiment, above computer terminal can also replace with mobile whole The terminal devices such as end.
Optionally, in the present embodiment, above computer terminal can be located in multiple network equipments of computer network At least one network equipment.
In the present embodiment, above computer terminal can perform the program of following steps in the processing method of business datum Code:Obtain the much information of account to be identified;The corresponding value-at-risk of each information in above-mentioned much information is obtained, wherein, it should What value-at-risk was used to indicate above-mentioned account to be identified is trusted degree;According to multiple above-mentioned risks corresponding with above-mentioned much information Value determines the Account Type of above-mentioned account to be identified;Using business processing side corresponding with the Account Type of above-mentioned account to be identified Formula handles the business datum from above-mentioned account to be identified.
Optionally, the concrete structure of the terminal in the present embodiment may refer to shown in Fig. 2, but not limited to this, i.e., Terminal in the present embodiment can have the structure more more or less than terminal shown in Fig. 2.
Wherein, memory can be used for storage software program and module, such as the place of the business datum in the embodiment of the present application Corresponding program instruction/the module of method and apparatus is managed, processor is stored in software program and mould in memory by operation Block so as to perform various functions application and data processing, that is, realizes the processing method of above-mentioned business datum.Memory can wrap Include high speed random access memory, can also include nonvolatile memory, as one or more magnetic storage device, flash memory or Other non-volatile solid state memories of person.In some instances, memory can further comprise remotely located relative to processor Memory, these remote memories can pass through network connection to terminal A.The example of above-mentioned network includes but not limited to interconnect Net, intranet, LAN, mobile radio communication and combinations thereof.
Processor can call the information and application program that memory stores, to perform following step:Obtain account to be identified The much information at family;The corresponding value-at-risk of each information in above-mentioned much information is obtained, wherein, which is used to indicate above-mentioned Account to be identified is trusted degree;Above-mentioned account to be identified is determined according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information The Account Type at family;It is above-mentioned to be identified to coming from using business processing mode corresponding with the Account Type of above-mentioned account to be identified The business datum of account is handled.
It should be noted that the preferred embodiment in the present embodiment, may refer to the associated description in embodiment 1, this Place repeats no more.
It will appreciated by the skilled person that terminal can be smart mobile phone (such as Android phone, iOS Mobile phone etc.), tablet computer, applause computer and mobile internet device (Mobile Internet Devices, MID), PAD Wait terminal devices.Fig. 2 it does not cause to limit to the structure of above-mentioned electronic device.For example, terminal 20 may also include ratio More either less components (such as network interface, display device) shown in Fig. 2 are matched with different from shown in Fig. 2 It puts.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To be completed by program come the device-dependent hardware of command terminal, which can be stored in a computer-readable storage intermediary In object, storage intervening objects can include:Flash disk, read-only memory (Read-Only Memory, ROM), arbitrary access Device (Random Access Memory, RAM), disk or CD etc..
Embodiment 9
Embodiments herein additionally provides a kind of storage medium.Optionally, in the present embodiment, above-mentioned storage medium can The program code performed by the processing method of business datum provided for preservation above-described embodiment 1.
Optionally, in the present embodiment, above-mentioned storage medium can be located in computer network Computer terminal group In any one terminal or in any one mobile terminal in mobile terminal group.
Optionally, in the present embodiment, storage medium is arranged to store the program code for performing following steps: Obtain the multiple types information of account to be identified;The corresponding value-at-risk of each type information in above-mentioned multiple types information is obtained, Wherein, what which was used to indicate above-mentioned account to be identified is trusted degree;According to corresponding with above-mentioned multiple types information Multiple above-mentioned value-at-risks determine the Account Type of above-mentioned account to be identified;Using corresponding with the Account Type of above-mentioned account to be identified Business processing mode the business datum from above-mentioned account to be identified is handled.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the quality of embodiment.
In above-described embodiment of the application, all emphasize particularly on different fields to the description of each embodiment, do not have in some embodiment The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only A kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or Person is desirably integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also That each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses When, it can be stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products It embodies, which is stored in a storage medium, is used including some instructions so that a computer Terminal (can be personal computer, server or network equipment etc.) perform each embodiment the method for the application whole or Part steps.And aforementioned storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code Medium.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art For member, under the premise of the application principle is not departed from, several improvements and modifications can also be made, these improvements and modifications also should It is considered as the protection domain of the application.

Claims (20)

1. a kind of processing method of business datum, which is characterized in that including:
Obtain the much information of account to be identified;
The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used to indicate the account to be identified Family is trusted degree;
The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information;
Using business processing mode corresponding with the Account Type of the account to be identified to the industry from the account to be identified Business data are handled.
2. according to the method described in claim 1, it is characterized in that, the much information includes at least one of:
The current behavior feature of the account to be identified;
Same device identification ID is made by same account or using what multiple accounts of same intervening objects access target website used With number, wherein, the ID of equipment where when the device id is the account access website to be identified, the intervening objects is appoint Two accounts of meaning generate data used in association;
Account number in the account belonging relation net to be identified, wherein, the network of personal connections is using multiple accounts as connected graph The network that is formed by connecting two-by-two of vertex.
3. according to the method described in claim 2, it is characterized in that, the account in the network of personal connections meets the following conditions:It is described Relationship score value in network of personal connections between any two account is all higher than predetermined threshold value, wherein the relation value is used to indicate two Correlation degree between account.
4. according to the method described in claim 3, it is characterized in that, the size of the relationship score value and the access times are into just Than.
5. according to the method described in claim 3, it is characterized in that, the relationship score value is determines according to following parameter:
Each account accesses the access times of the website using same intervening objects or accesses duration in the network of personal connections.
6. according to the method described in claim 5, it is characterized in that, the intervening objects include:
Access point name used in each account access network in device id, the network of personal connections, network address, email address, The geographical location of user corresponding to each account in the network of personal connections.
7. according to the method described in claim 2, it is characterized in that, obtain the corresponding risk of each information in the much information Value includes at least one of:
1) type of the current behavior feature is obtained, wherein, the type of the current behavior feature includes:Machine behavior and from Right people's behavior;Type according to the current behavior feature determines the corresponding numerical value of the current behavior feature and the first power Weight;The value-at-risk is determined according to the numerical value and first weight;
2) the second weight according to the access times and for device id distribution determines the value-at-risk;
3) the third weight according to the account number and for account number distribution determines the value-at-risk.
8. according to the method described in claim 1, it is characterized in that, according to multiple risks corresponding with the much information Value determines the Account Type of the account to be identified, including:
Summation operation is carried out to multiple value-at-risks, obtains risk total value;
Judge the interval where the risk total value;
The Account Type of the account to be identified is determined according to the Account Type corresponding to the interval.
9. method according to any one of claim 1 to 8, which is characterized in that the Account Type of the account to be identified Including:The first kind, Second Type and third type;Using business processing corresponding with the Account Type of the account to be identified Mode handles the business datum from the account to be identified, including:
When the Account Type of the account to be identified is the first kind, allow the account to be identified to the business datum institute The operation behavior of corresponding business;
When the Account Type of the account to be identified is Second Type, to the secondary verification of the account progress to be identified, and When being verified, allow operation behavior of the account to be identified to business corresponding to the business datum;
When the Account Type of the account to be identified is third type, the account to be identified is intercepted to the business datum institute The operation behavior of corresponding business.
10. a kind of account recognition methods, which is characterized in that including:
The much information of account to be identified is obtained, wherein, the much information includes at least one of:The account to be identified It is access times that the current behavior feature at family, same device identification ID are used by same account or multiple accounts, described to be identified Account number in account belonging relation net, wherein, equipment where when the device id is the account access website to be identified ID, the network of personal connections are the network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph, arbitrary in the network of personal connections Relationship score value between two accounts is all higher than predetermined threshold value, and the relationship score value is used to indicate the association journey between two accounts Degree;
The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used to indicate the account to be identified Family is trusted degree;
The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information.
11. according to the method described in claim 10, it is characterized in that, the size of the relationship score value and the access times into Direct ratio.
12. according to the method described in claim 10, it is characterized in that, obtain the corresponding wind of each information in the much information Danger value includes at least one of:
1) type of the current behavior feature is obtained, wherein, the type of the current behavior feature includes:Machine behavior and from Right people's behavior;Type according to the current behavior feature determines the corresponding numerical value of the current behavior feature and the first power Weight;The value-at-risk is determined according to the numerical value and first weight;
2) the second weight according to the access times and for device id distribution determines the value-at-risk;
3) the third weight according to the account number and for account number distribution determines the value-at-risk.
13. a kind of processing unit of business datum, which is characterized in that including:
Acquisition module, for obtaining the much information of account to be identified;And it obtains each information in the much information and corresponds to Value-at-risk, wherein, what which was used to indicate the account to be identified is trusted degree;
Determining module, for determining the account of the account to be identified according to multiple value-at-risks corresponding with the much information Family type;
Processing module, for using business processing mode corresponding with the Account Type of the account to be identified to coming from described treat The business datum of identification account is handled.
14. a kind of account identification device, which is characterized in that including:
First acquisition module, for obtaining the much information of account to be identified, wherein, the much information include it is following at least One of:The current behavior feature of the account to be identified;Same device identification ID is made by what same account or multiple accounts used With number,;Account number in the account belonging relation net to be identified, wherein, the device id is visited for the account to be identified The ID of place equipment when asking website, the network of personal connections is the net that multiple accounts are formed by connecting two-by-two as the vertex of connected graph Network, the relationship score value in the network of personal connections between any two account are all higher than predetermined threshold value, and the relationship score value is used to indicate Correlation degree between two accounts;
Second acquisition module, for obtaining the corresponding value-at-risk of each information in the much information, wherein, which is used for Indicate the account to be identified is trusted degree;
Identification module, for determining the account of the account to be identified according to multiple value-at-risks corresponding with the much information Family type.
15. a kind of terminal, including:Processor and memory, which is characterized in that the processor is used to call and perform What is stored in the memory is used to implement the program of following functions:
Obtain the much information of account to be identified;The corresponding value-at-risk of each information in the much information is obtained, wherein, the wind What danger value was used to indicate the account to be identified is trusted degree;According to multiple value-at-risks corresponding with the much information Determine the Account Type of the account to be identified;Using business processing mode corresponding with the Account Type of the account to be identified Business datum from the account to be identified is handled.
16. a kind of account recognition methods, which is characterized in that including:
Obtain the device attribute of physical equipment that account to be identified is used in access target network;
Device attribute based on acquisition establishes account belonging relation net to be identified, wherein, the network of personal connections is by with identical equipment The account composition of attribute;
Count the account number in the account belonging relation net to be identified;
Based on the account number and predetermined threshold value in the account belonging relation net to be identified, the account class of account to be identified is determined Type.
17. according to the method for claim 16, which is characterized in that the account in the statistics account belonging relation net to be identified Amount includes:
If there are multiple networks of personal connections,:
Wherein maximum account number is taken as the account number in the account belonging relation net to be identified, alternatively,
Wherein minimum account number is taken as the account number in the account belonging relation net to be identified, alternatively,
The average value of the account number of each network of personal connections is taken as the account number in the account belonging relation net to be identified.
18. a kind of account recognition methods, which is characterized in that including:
Obtain the device attribute of physical equipment that account to be identified is used in access target network;
Device attribute based on acquisition calculates multiple relationship score values between each account in account and account library to be identified, In, the account library is presetting database or tables of data, and the relationship score value is used to indicate the correlation degree between two accounts, The relationship score value is higher, and the relationship represented between two accounts is bigger;
The relationship score value of selection and account to be identified is more than the account of the first predetermined threshold value, forms the relationship of the account to be identified Net;
Account number in statistical relationship net;With
Based on the account number and the second predetermined threshold value, the type of account to be identified is determined.
19. according to the method for claim 18, which is characterized in that the relationship score value is the number determined according to following parameter Value:Account to be identified uses the number or duration of same device attribute access target network with destiny account in account library.
20. a kind of terminal provides the interactive interface for being interacted with user, which is characterized in that the interactive boundary Face includes:
First control, for receiving the first triggering command of user, which performs following operate for triggering:It obtains The device attribute of physical equipment that account to be identified is taken to be used in access target network;
Second control, for receiving the second triggering command of user, which performs following operate for triggering:Base In the device attribute of acquisition, multiple relationship score values between each account in account and account library to be identified are calculated, wherein, it is described Relationship score value is used to indicate the correlation degree between two accounts, and the higher pass represented between two accounts of the relationship score value System is bigger;
Third control, for showing the network of personal connections of the account to be identified, wherein, the network of personal connections is by the pass with account to be identified It is the account composition that score value is more than the first predetermined threshold value;
4th control, for receiving the third triggering command of user, which performs following operate for triggering:Base Account number and the second predetermined threshold value in the network of personal connections determine the type of account to be identified;
5th control, for showing the type of the account to be identified.
CN201611120597.9A 2016-12-07 2016-12-07 The processing of business datum, account recognition methods and device, terminal Pending CN108171519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611120597.9A CN108171519A (en) 2016-12-07 2016-12-07 The processing of business datum, account recognition methods and device, terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611120597.9A CN108171519A (en) 2016-12-07 2016-12-07 The processing of business datum, account recognition methods and device, terminal

Publications (1)

Publication Number Publication Date
CN108171519A true CN108171519A (en) 2018-06-15

Family

ID=62526488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611120597.9A Pending CN108171519A (en) 2016-12-07 2016-12-07 The processing of business datum, account recognition methods and device, terminal

Country Status (1)

Country Link
CN (1) CN108171519A (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087106A (en) * 2018-07-03 2018-12-25 阿里巴巴集团控股有限公司 Identify air control model training, air control method, apparatus and the equipment of secondary account takeover of distributing telephone numbers
CN109151518A (en) * 2018-08-06 2019-01-04 武汉斗鱼网络科技有限公司 A kind of recognition methods, device and the electronic equipment of stolen account
CN109191140A (en) * 2018-07-05 2019-01-11 阿里巴巴集团控股有限公司 A kind of scorecard model integration method and device
CN109242519A (en) * 2018-09-25 2019-01-18 阿里巴巴集团控股有限公司 A kind of abnormal behaviour recognition methods, device and equipment
CN109460930A (en) * 2018-11-15 2019-03-12 武汉斗鱼网络科技有限公司 A kind of method and relevant device of determining adventure account
CN109615423A (en) * 2018-11-29 2019-04-12 阿里巴巴集团控股有限公司 The processing method and processing device of business
CN109688183A (en) * 2018-08-20 2019-04-26 深圳壹账通智能科技有限公司 Group control device recognition methods, device, equipment and computer readable storage medium
CN110232630A (en) * 2019-05-29 2019-09-13 腾讯科技(深圳)有限公司 The recognition methods of malice account, device and storage medium
CN110264191A (en) * 2019-05-17 2019-09-20 阿里巴巴集团控股有限公司 A kind of Risk Identification Method and device of payment
CN110597574A (en) * 2019-08-29 2019-12-20 凡普数字技术有限公司 Account matching method and device and storage medium
CN110852761A (en) * 2019-10-11 2020-02-28 支付宝(杭州)信息技术有限公司 Method and device for formulating anti-cheating strategy and electronic equipment
CN111031017A (en) * 2019-11-29 2020-04-17 腾讯科技(深圳)有限公司 Abnormal business account identification method, device, server and storage medium
CN111385136A (en) * 2018-12-29 2020-07-07 华为技术服务有限公司 Method and device for determining user communication identifier
CN111383025A (en) * 2020-03-04 2020-07-07 支付宝(杭州)信息技术有限公司 Method and device for forwarding wind control data and electronic equipment
CN111724194A (en) * 2020-05-08 2020-09-29 厦门极致互动网络技术股份有限公司 Substitute device detection method, system, mobile terminal and storage medium
CN111860655A (en) * 2020-07-23 2020-10-30 中国联合网络通信集团有限公司 User processing method, device and equipment
CN111861483A (en) * 2019-04-26 2020-10-30 阿里巴巴集团控股有限公司 Communication method, computer equipment and storage medium
CN112437034A (en) * 2019-08-26 2021-03-02 腾讯科技(深圳)有限公司 False terminal detection method and device, storage medium and electronic device
CN112491994A (en) * 2020-11-17 2021-03-12 中国联合网络通信集团有限公司 Identification method and communication device of Internet of vehicles terminal
CN113610175A (en) * 2021-08-16 2021-11-05 上海冰鉴信息科技有限公司 Service strategy generation method and device and computer readable storage medium
CN113641972A (en) * 2021-08-20 2021-11-12 北京达佳互联信息技术有限公司 Account identification method and device, electronic equipment and storage medium
CN113676497A (en) * 2021-10-22 2021-11-19 广州锦行网络科技有限公司 Data blocking method and device, electronic equipment and storage medium
CN114742479A (en) * 2022-06-10 2022-07-12 深圳竹云科技股份有限公司 Account identification method, device, server and storage medium
WO2022267769A1 (en) * 2021-06-24 2022-12-29 支付宝(杭州)信息技术有限公司 Method and apparatus for generating graph data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120078735A1 (en) * 2010-09-28 2012-03-29 John Bauer Secure account provisioning
CN103927307A (en) * 2013-01-11 2014-07-16 阿里巴巴集团控股有限公司 Website user identification method and device
CN105677221A (en) * 2015-12-30 2016-06-15 广州优视网络科技有限公司 Method and device for improving application data detecting accuracy and equipment
CN105791255A (en) * 2014-12-23 2016-07-20 阿里巴巴集团控股有限公司 Method and system for identifying computer risks based on account clustering
CN105812195A (en) * 2014-12-30 2016-07-27 阿里巴巴集团控股有限公司 Method and device for computer to identify batch accounts
CN106033574A (en) * 2015-03-10 2016-10-19 阿里巴巴集团控股有限公司 Identification method and identification device for cheating behavior
CN106033575A (en) * 2015-03-11 2016-10-19 阿里巴巴集团控股有限公司 Risk account identification method and apparatus

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120078735A1 (en) * 2010-09-28 2012-03-29 John Bauer Secure account provisioning
CN103927307A (en) * 2013-01-11 2014-07-16 阿里巴巴集团控股有限公司 Website user identification method and device
CN105791255A (en) * 2014-12-23 2016-07-20 阿里巴巴集团控股有限公司 Method and system for identifying computer risks based on account clustering
CN105812195A (en) * 2014-12-30 2016-07-27 阿里巴巴集团控股有限公司 Method and device for computer to identify batch accounts
CN106033574A (en) * 2015-03-10 2016-10-19 阿里巴巴集团控股有限公司 Identification method and identification device for cheating behavior
CN106033575A (en) * 2015-03-11 2016-10-19 阿里巴巴集团控股有限公司 Risk account identification method and apparatus
CN105677221A (en) * 2015-12-30 2016-06-15 广州优视网络科技有限公司 Method and device for improving application data detecting accuracy and equipment

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087106A (en) * 2018-07-03 2018-12-25 阿里巴巴集团控股有限公司 Identify air control model training, air control method, apparatus and the equipment of secondary account takeover of distributing telephone numbers
CN109087106B (en) * 2018-07-03 2020-12-08 创新先进技术有限公司 Wind control model training and wind control method, device and equipment for recognizing fraudulent use of secondary number-paying account
WO2020007153A1 (en) * 2018-07-03 2020-01-09 阿里巴巴集团控股有限公司 Risk control model training method, apparatus and device, and risk control method, apparatus, and device for identifying reused telephone number account fraud
CN109191140A (en) * 2018-07-05 2019-01-11 阿里巴巴集团控股有限公司 A kind of scorecard model integration method and device
CN109151518A (en) * 2018-08-06 2019-01-04 武汉斗鱼网络科技有限公司 A kind of recognition methods, device and the electronic equipment of stolen account
CN109151518B (en) * 2018-08-06 2021-02-02 武汉斗鱼网络科技有限公司 Stolen account identification method and device and electronic equipment
CN109688183B (en) * 2018-08-20 2022-08-19 深圳壹账通智能科技有限公司 Group control equipment identification method, device, equipment and computer readable storage medium
CN109688183A (en) * 2018-08-20 2019-04-26 深圳壹账通智能科技有限公司 Group control device recognition methods, device, equipment and computer readable storage medium
CN109242519A (en) * 2018-09-25 2019-01-18 阿里巴巴集团控股有限公司 A kind of abnormal behaviour recognition methods, device and equipment
CN109242519B (en) * 2018-09-25 2022-12-16 创新先进技术有限公司 Abnormal behavior identification method, device and equipment
CN109460930A (en) * 2018-11-15 2019-03-12 武汉斗鱼网络科技有限公司 A kind of method and relevant device of determining adventure account
CN109460930B (en) * 2018-11-15 2021-11-26 武汉斗鱼网络科技有限公司 Method for determining risk account and related equipment
CN109615423A (en) * 2018-11-29 2019-04-12 阿里巴巴集团控股有限公司 The processing method and processing device of business
CN109615423B (en) * 2018-11-29 2020-06-16 阿里巴巴集团控股有限公司 Service processing method and device
US11461503B2 (en) 2018-11-29 2022-10-04 Advanced New Technologies Co., Ltd. Service processing method and apparatus
CN111385136A (en) * 2018-12-29 2020-07-07 华为技术服务有限公司 Method and device for determining user communication identifier
CN111861483A (en) * 2019-04-26 2020-10-30 阿里巴巴集团控股有限公司 Communication method, computer equipment and storage medium
CN110264191A (en) * 2019-05-17 2019-09-20 阿里巴巴集团控股有限公司 A kind of Risk Identification Method and device of payment
CN110232630A (en) * 2019-05-29 2019-09-13 腾讯科技(深圳)有限公司 The recognition methods of malice account, device and storage medium
CN112437034A (en) * 2019-08-26 2021-03-02 腾讯科技(深圳)有限公司 False terminal detection method and device, storage medium and electronic device
CN110597574A (en) * 2019-08-29 2019-12-20 凡普数字技术有限公司 Account matching method and device and storage medium
CN110852761A (en) * 2019-10-11 2020-02-28 支付宝(杭州)信息技术有限公司 Method and device for formulating anti-cheating strategy and electronic equipment
CN111031017B (en) * 2019-11-29 2021-12-14 腾讯科技(深圳)有限公司 Abnormal business account identification method, device, server and storage medium
CN111031017A (en) * 2019-11-29 2020-04-17 腾讯科技(深圳)有限公司 Abnormal business account identification method, device, server and storage medium
CN111383025A (en) * 2020-03-04 2020-07-07 支付宝(杭州)信息技术有限公司 Method and device for forwarding wind control data and electronic equipment
CN111383025B (en) * 2020-03-04 2022-09-02 支付宝(杭州)信息技术有限公司 Method and device for forwarding wind control data and electronic equipment
CN111724194A (en) * 2020-05-08 2020-09-29 厦门极致互动网络技术股份有限公司 Substitute device detection method, system, mobile terminal and storage medium
CN111724194B (en) * 2020-05-08 2022-09-06 厦门极致互动网络技术股份有限公司 Substitute device detection method, system, mobile terminal and storage medium
CN111860655A (en) * 2020-07-23 2020-10-30 中国联合网络通信集团有限公司 User processing method, device and equipment
CN111860655B (en) * 2020-07-23 2023-05-30 中国联合网络通信集团有限公司 User processing method, device and equipment
CN112491994B (en) * 2020-11-17 2022-04-22 中国联合网络通信集团有限公司 Identification method and communication device of Internet of vehicles terminal
CN112491994A (en) * 2020-11-17 2021-03-12 中国联合网络通信集团有限公司 Identification method and communication device of Internet of vehicles terminal
WO2022267769A1 (en) * 2021-06-24 2022-12-29 支付宝(杭州)信息技术有限公司 Method and apparatus for generating graph data
CN113610175A (en) * 2021-08-16 2021-11-05 上海冰鉴信息科技有限公司 Service strategy generation method and device and computer readable storage medium
CN113641972A (en) * 2021-08-20 2021-11-12 北京达佳互联信息技术有限公司 Account identification method and device, electronic equipment and storage medium
CN113676497A (en) * 2021-10-22 2021-11-19 广州锦行网络科技有限公司 Data blocking method and device, electronic equipment and storage medium
CN114742479B (en) * 2022-06-10 2022-09-06 深圳竹云科技股份有限公司 Account identification method, account identification device, server and storage medium
CN114742479A (en) * 2022-06-10 2022-07-12 深圳竹云科技股份有限公司 Account identification method, device, server and storage medium

Similar Documents

Publication Publication Date Title
CN108171519A (en) The processing of business datum, account recognition methods and device, terminal
KR101821511B1 (en) Data processing method based on instant messaging or social applications, and device thereof
CN109063966A (en) The recognition methods of adventure account and device
CN106529288A (en) Account risk identification method and device
CN110689438A (en) Enterprise financial risk scoring method and device, computer equipment and storage medium
CN108540431A (en) The recognition methods of account type, device and system
CN107211016A (en) Secure session is divided and application program parser
CN105100029B (en) The method and apparatus that authentication is carried out to user
CN108123926A (en) Identity identifying method and device and computing device
CN103425703B (en) A kind for the treatment of method and apparatus of the network information
CN104836696B (en) A kind of detection method and device of IP address
CN107820114A (en) Special efficacy methods of exhibiting and device
US20230086276A1 (en) Fraud prevention in programmatic advertising
CN106651580A (en) Method and device for judging whether financial account is malicious or not, and computing device
CN109547426A (en) Service response method and server
US20160267578A1 (en) System and method for implementation of sharing economy in a web environment
CN103634117A (en) Control method and control device for online shopping safety protection
CN104618336B (en) A kind of account management method, equipment and system
CN112370793A (en) Risk control method and device for user account
CN108335191A (en) Account-opening method, financial services system end and the computer storage media of finance account
Chaganti et al. Recent trends in social engineering scams and case study of gift card scam
CN106257507A (en) The methods of risk assessment of user behavior and device
CN107465685A (en) Communication products real-name authentication system
CN111385272A (en) Weak password detection method and device
CN109615393A (en) The follow-up processing method and processing device of breakpoint

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180615