CN108171519A - The processing of business datum, account recognition methods and device, terminal - Google Patents
The processing of business datum, account recognition methods and device, terminal Download PDFInfo
- Publication number
- CN108171519A CN108171519A CN201611120597.9A CN201611120597A CN108171519A CN 108171519 A CN108171519 A CN 108171519A CN 201611120597 A CN201611120597 A CN 201611120597A CN 108171519 A CN108171519 A CN 108171519A
- Authority
- CN
- China
- Prior art keywords
- account
- identified
- value
- type
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Abstract
This application discloses a kind of processing of business datum, account recognition methods and device, terminals.Wherein, the processing method of the business datum includes:Obtain the much information of account to be identified;The corresponding value-at-risk of each information in the much information is obtained, wherein, what which was used to indicate the account to be identified is trusted degree;The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information;The business datum from the account to be identified is handled using business processing mode corresponding with the Account Type of the account to be identified.
Description
Technical field
This application involves service security field, in particular to a kind of processing of business datum, account recognition methods and
Device, terminal.
Background technology
In recent years, the red packet subsidy of great number, the preferential activity to overflow become the enterprises such as e-commerce, social activity, financial field
The mode of the common attraction user of the online platform of industry has also expedited the emergence of a collection of unauthorized person and has been participated on various lines by various means
Activity (i.e. marketing cheating), therefore enterprise side often pays more costs, animation effect is had a greatly reduced quality.
Technically traditional manufacturer security strategy is based only on cell-phone number short-message verification to the anti-cheating of marketing, and IP frequency limits are general
Logical picture verification improves batch registration threshold, but unauthorized person, due to that can send out platform with short message generation, Agent IP or VPN are soft
Part can be considered as unlimited offer IP resources, and normal picture verification code technology can be cracked by automatic machine, and traditional safe plan
Slightly usually None- identified batch trumpet is with IP low frequency machine behaviors or the usage scenario of artificial batch operation, due to large enterprises
Public outlet IP frequency of use is higher, is susceptible to the risk of erroneous judgement.
It is easily cracked it can be seen that existing in the relevant technologies to the identifying schemes of the specific types behaviors such as marketing cheating
And the not high technical problem of accuracy.
For it is above-mentioned the problem of, currently no effective solution has been proposed.
Invention content
The embodiment of the present application provides a kind of processing of business datum, account recognition methods and device, terminal, with
It at least solves in the relevant technologies to the specific type Activity recognition scheme of account in the presence of the skill being easily cracked and accuracy is not high
Art problem.
According to the one side of the embodiment of the present application, a kind of processing method of business datum is provided, including:It obtains and waits to know
The much information of other account;The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used to indicate
The account to be identified is trusted degree;Foundation multiple value-at-risks corresponding with the much information are waited to know described in determining
The Account Type of other account;Using business processing mode corresponding with the Account Type of the account to be identified to coming from described treat
The business datum of identification account is handled.
According to the another aspect of the embodiment of the present application, a kind of account recognition methods is additionally provided, including:It obtains to be identified
The much information of account, wherein, the much information includes at least one of:The current behavior of the account to be identified is special
Access times, the account belonging relation net to be identified that sign, same device identification ID are used by same account or multiple accounts
In account number, wherein, the ID of equipment where when the device id is the account access website to be identified, the network of personal connections is
The network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph, the pass in the network of personal connections between any two account
It is that score value is all higher than predetermined threshold value, the relationship score value is used to indicate the correlation degree between two accounts;It obtains described a variety of
The corresponding value-at-risk of each information in information, wherein, what which was used to indicate the account to be identified is trusted degree;According to
The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information.
Optionally, the size of the relationship score value is directly proportional to the access times.
Optionally, it obtains the corresponding value-at-risk of each information in the much information and includes at least one of:1) it obtains
The type of the current behavior feature, wherein, the type of the current behavior feature includes:Machine behavior and natural person's behavior;
Type according to the current behavior feature determines the corresponding numerical value of the current behavior feature and the first weight;According to described in
Numerical value and first weight determine the value-at-risk;2) the second power according to the access times and for device id distribution
The value-at-risk is determined again;3) the third weight according to the account number and for account number distribution determines the value-at-risk.
According to the another aspect of the embodiment of the present application, a kind of processing unit of business datum is additionally provided, including:Obtain mould
Block, for obtaining the much information of account to be identified;And the corresponding value-at-risk of each information in the much information is obtained,
In, what which was used to indicate the account to be identified is trusted degree;Determining module, for foundation and the much information
Corresponding multiple value-at-risks determine the Account Type of the account to be identified;Processing module is waited to know for using with described
The corresponding business processing mode of Account Type of other account handles the business datum from the account to be identified.
Another aspect according to embodiments of the present invention, the embodiment of the present invention additionally provide a kind of account identification device, including:
First acquisition module, for obtaining the much information of account to be identified, wherein, the much information include it is following at least it
One:The current behavior feature of the account to be identified;Same device identification ID is used by what same account or multiple accounts used
Number;Account number in the account belonging relation net to be identified, wherein, the device id is the account access net to be identified
The ID of equipment, the network of personal connections are the network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph where when standing, institute
It states the relationship score value in network of personal connections between any two account and is all higher than predetermined threshold value, the relationship score value is used to indicate two accounts
Correlation degree between family;Second acquisition module, for obtaining the corresponding value-at-risk of each information in the much information,
In, what which was used to indicate the account to be identified is trusted degree;Identification module, for foundation and the much information
Corresponding multiple value-at-risks determine the Account Type of the account to be identified.
According to the another aspect of the embodiment of the present application, a kind of terminal is additionally provided, including:Processor and storage
Device, wherein, the processor is used to call and perform the program for being used to implement following functions stored in the memory:It obtains
The much information of account to be identified;The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used for
Indicate the account to be identified is trusted degree;It is determined according to multiple value-at-risks corresponding with the much information described
The Account Type of account to be identified;Using business processing mode corresponding with the Account Type of the account to be identified to coming from
The business datum for stating account to be identified is handled.
According to the another aspect of the embodiment of the present application, a kind of account recognition methods is provided, including:Obtain account to be identified
The device attribute of physical equipment used in access target network;Device attribute based on acquisition establishes account institute to be identified
Belong to network of personal connections, wherein, the network of personal connections is made of the account with identical device attribute;It counts and is closed belonging to the account to be identified
Account number in system's net;Based on the account number and predetermined threshold value in the account belonging relation net to be identified, account to be identified is determined
The Account Type at family.
According to the another aspect of the embodiment of the present application, a kind of account recognition methods is provided, including:Obtain account to be identified
The device attribute of physical equipment used in access target network;Device attribute based on acquisition, calculate account to be identified with
Multiple relationship score values in account library between each account, wherein, the account library be presetting database or tables of data, the pass
It is the correlation degree that score value is used to indicate between two accounts, the higher relationship represented between two accounts of the relationship score value is more
Greatly;The relationship score value of selection and account to be identified is more than the account of the first predetermined threshold value, forms the relationship of the account to be identified
Net;Account number in statistical relationship net;With based on the account number and the second predetermined threshold value, the account class of account to be identified is determined
Type.
According to the another aspect of the embodiment of the present application, a kind of terminal is provided, provides to be handed over user
Mutual interactive interface, the interactive interface include:First control, for receiving the first triggering command of user, this first touch
Under the triggering to send instructions, the device attribute of physical equipment that account to be identified is used in access target network is obtained;Second control
Part, for receiving the second triggering command of user, and under the triggering of second triggering command, the device attribute based on acquisition,
Multiple relationship score values between each account in account and account library to be identified are calculated, wherein, the relationship score value is used to indicate
Correlation degree between two accounts, and the higher relationship represented between two accounts of the relationship score value is bigger;Third control,
For showing the network of personal connections of the account to be identified, wherein, the network of personal connections is by being more than the with the relationship score value of account to be identified
The account composition of one predetermined threshold value;4th control, for receiving the third triggering command of user, which is used to touch
Hair performs following operate:Based on the account number and the second predetermined threshold value in the network of personal connections, the type of account to be identified is determined;The
Five controls show the type of the account to be identified.
In the embodiment of the present application, Account Type is determined using the corresponding value-at-risk of much information of account to be identified, and
The business datum from the account to be identified is handled according to the corresponding business processing mode of account type, due to can be with
The much information of account to be identified is considered during Account Type is determined, therefore improves the account class of account to be identified
The recognition accuracy of type, while the cost of marketing of enterprise can be reduced, marketing activity effect is promoted, and then solve the relevant technologies
In there is technical issues that the specific type Activity recognition scheme of account easily be cracked and accuracy not.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen
Illustrative embodiments and their description please do not form the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is the workflow schematic diagram according to a kind of anti-cheating system of the embodiment of the present application;
Fig. 2 is according to a kind of the hard of the terminal of processing method for being used to implement business datum of the embodiment of the present application
Part structure diagram;
Fig. 3 is the flow diagram according to a kind of processing method of business datum of the embodiment of the present application;
Fig. 4 is the structure diagram according to a kind of processing unit of business datum of the embodiment of the present application;
Fig. 5 is the flow diagram according to a kind of account recognition methods of the embodiment of the present application;
Fig. 6 is the structure diagram according to a kind of account apparatus of the embodiment of the present application.
Fig. 7 is the flow diagram according to another account recognition methods of the embodiment of the present application;
Fig. 8 is the flow diagram according to another account recognition methods of the embodiment of the present application;
Fig. 9 is the interactive interface structure diagram according to a kind of terminal of the embodiment of the present application.
Specific embodiment
In order to which those skilled in the art is made to more fully understand application scheme, below in conjunction in the embodiment of the present application
The technical solution in the embodiment of the present application is clearly and completely described in attached drawing, it is clear that described embodiment is only
The embodiment of the application part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's all other embodiments obtained without making creative work should all belong to the model of the application protection
It encloses.
It should be noted that term " first " in the description and claims of this application and above-mentioned attached drawing, "
Two " etc. be the object for distinguishing similar, and specific sequence or precedence are described without being used for.It should be appreciated that it uses in this way
Data can be interchanged in the appropriate case, so as to embodiments herein described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment
Those steps or unit clearly listed, but may include not listing clearly or for these processes, method, product
Or the intrinsic other steps of equipment or unit.
First, the part noun or term occurred during the embodiment of the present application is described is suitable for following solution
It releases:
Marketing cheating:Finger is acquired an advantage with the means for cheating or violating platform service rule, such as acquisition electric business platform red packet,
Commodity preferential subsidy, supplements with money and returns the equity such as existing at authentication registration reward.This behavior is referred to as marketing cheating.
Device id:Device numbering accesses a unique and constant device numbering of website generation.
Intervening objects:Data used in the generation association of any two account, include but unlimited in the embodiment of the present application
In:Access point name, network address, email address, institute used in each account access network in device id, the network of personal connections
State the geographical location of user corresponding to each account in network of personal connections, such as WIFI titles, IP, mailbox, phone number, ship-to
Etc. belonging to intervening objects.
Connected graph, connected graph is the concept based on connection in graph theory, if any two points are to connect in figure, the figure
Just it is known as connected graph.
Honey jar:It is a kind of information gathering system, is the target that people is deliberately allowed to attack, hacker is lured to come to attack, understands
The means of hacker attack and object etc..
Embodiment 1
In the related art, enterprise platform especially electric business platform can usually release some preferential measures to encourage user
Desire to purchase, for example, attract user using the neck forms such as red packet or discount coupon, with the increasing of this preferential activity, some
Cheating also generates in succession, for example, in the preferential activity that the release of some electric business platform gives bonus, if it is to be based on to rob red packet
Short message verification code, then disabled user can rent the mode of short message platform pending and obtain a large amount of red packets, then promoted to true
The client consumed is just needed, robs and accounts for marketing resource, the marketing effectiveness of enterprise is had a greatly reduced quality.
To solve the above problems, the much information that the present embodiment can combine account to be identified knows illegal account
Not, for example, the operation behavior of account to be identified is identified with reference to man-machine identification technology, bonding apparatus ID and big data are closed
It is network technology, identification disabled user passes through machine, artificial or clique marketing cheating.
The present embodiment can be based on anti-cheating system shown in FIG. 1 and realize, as shown in Figure 1, anti-cheating system includes:It is multiple
Client device 10, for providing the login environment of Account Logon;Server 12, for identify account behavior to be detected (for example,
The specific types behaviors such as marketing cheating), it is illustrated by taking the identification for cheating of marketing as an example below:
Step S100, user's logon account carry out operation and receive the user's rights such as red packet, favor information;
Step S102, the server 12 in anti-cheating system acquire the corresponding user behavior information of logon account;
Specifically, can be that client device 10 acquires local user behavior information straight by the user behavior information of acquisition
It connects or is sent to above-mentioned server 12 indirectly.
Wherein, user behavior information includes being not limited to operation behavior track, facility information (including but not limited to equipment
ID), the information such as IP.For server 12 according to the user behavior information of acquisition, whether calculating is machine behavior, and result of calculation is corresponded to
Numerical value the account number of number and same relation network received with same device id be weighted.For example, machine row
It is 1 for corresponding numerical value, the corresponding numerical value of natural person is 0;Device id is received number as a, the account number of same relation network
For b.When the behavior that logon account generates is robot behavior, sum after distributing 1, a and b to respective weight respectively
Operation.
Step S104, the information such as server 12 is made a variation by user's current behavior feature, historical behavior, honey jar is associated with, knot
It closes the service attribute of concrete scene and is operated to distinguish machine behavior with natural person.On how to identify machine behavior or natural person
Behavior is hereinafter discussed in greater detail.
User can generate a large amount of action trail when using enterprise platform product, these user behavior tracks pass through identical
Intervening objects link to form a complicated mixed relationship network.
By logistic regression calculated relationship score value, the relationship score value of taking is the conduct relationship side for reaching certain threshold value, is reused
The calculating of connected graph belongs to the account number of same relational network with current account and is normalized.Wherein, the relationship
Score value is used to indicate the correlation degree between account, wherein, relationship score value is bigger, the association journey between two accounts of instruction
Degree is bigger.It is, for example, possible to use following parameter indicates above-mentioned correlation degree:A accounts and B accounts are corresponding using same device id
Equipment logs in the number of electric business platform or accesses duration (such as number of days) etc..In one alternate embodiment, it may be used following
Calculation formula calculates above-mentioned relation score value R (ti,wi):
Wherein:
tiRepresent that two accounts calculate some value (0- using same intervening objects number (number of days) by normalizing formula
1) function.WiRepresent that two accounts use the weight of same intervening objects.
Current account is calculated to receive number using device id and be normalized.
Sum=a*w1+b*w2+c*w3 is calculated by weighted sum, obtains a risk score value according to interval division to dislike
Account of anticipating (i.e. malice account), suspicious account and credible account three classes adventure account grade.Wherein, a represents current account operation
Numerical value corresponding to the type of behavior, for example, when current operation behavior is robot behavior, a=1 is being determined as natural person
When, a=0, w1 represent weight;B represents the number of receiving of device id, and w2 represents the weight of device id;C represents same relation network
Account number, w3 represents corresponding with account number weight.It should be noted that above-mentioned each weighted value is adjustable, example
Such as, above equipment ID is received that number is bigger, then its corresponding weight w2 value is bigger, otherwise smaller;Same relation net
The account number c of network is bigger, and weight w3 corresponding with c is bigger, otherwise smaller.
Step S106 notifies account levels to operation system 14;
Step S108, operation system 14 carry out business processing, such as credible account according to anti-cheating system adventure account grade
Give normal use business;Suspicious account confirms the identity of the account by the way of secondary validation-cross;Malice account carries out
Transaction intercepts or strong authentication equivalent risk control strategy.Wherein, operation system can show as a server or server group, but
It is without being limited thereto.
Based on above-mentioned design philosophy, the embodiment of the present application additionally provides a kind of processing method embodiment of business datum, needs
It is noted that step shown in the flowchart of the accompanying drawings can be in the computer system of such as a group of computer-executable instructions
Middle execution, although also, show logical order in flow charts, it in some cases, can be to be different from herein
Sequence performs shown or described step.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune
It calculates and is performed in device.Fig. 2 shows a kind of terminal for the processing method for being used to implement business datum (or mobile equipment)
Hardware block diagram.As shown in Fig. 2, terminal 20 (or mobile equipment 20) can include one or more and (be adopted in figure
With 202a, 202b ... ..., 202n is shown) processor 202 (processor 202 can include but is not limited to Micro-processor MCV or
The processing unit of programmable logic device FPGA etc.), for storing the memory 204 of data and the biography for communication function
Defeated module 206.In addition to this, can also include:Display, input/output interface (I/O interfaces), universal serial bus (USB)
Port (can as a port in the port of I/O interfaces by including), network interface, power supply and/or camera.This field is general
Logical technical staff is appreciated that structure shown in Fig. 2 is only to illustrate, and the structure of above-mentioned electronic device is not caused to limit.
For example, terminal 20 may also include than shown in Fig. 2 more either less components or with different from shown in Fig. 2
Configuration.
It is to be noted that said one or multiple processors 202 and/or other data processing circuits lead to herein
Can often it be referred to as " data processing circuit ".The data processing circuit all or part of can be presented as software, hardware, firmware
Or any other combination.In addition, data processing circuit can be single independent processing module or all or part of be attached to
In any one in other elements in terminal 20 (or mobile equipment).As involved by the embodiment of the present application
, which controls (such as the selection of variable resistance end path being connect with interface) as a kind of processor.
Memory 204 can be used for the software program and module of storage application software, such as () side in the embodiment of the present application
Corresponding program instruction/the data storage device of method, processor 202 by operation be stored in the software program in memory 204 with
And module, so as to perform various functions application and data processing, that is, realize the processing method of above-mentioned business datum.Memory
204 may include high speed random access memory, may also include nonvolatile memory, and such as one or more magnetic storage device dodges
It deposits or other non-volatile solid state memories.In some instances, memory 204 can further comprise relative to processor
202 remotely located memories, these remote memories can pass through network connection to terminal 20.The reality of above-mentioned network
Example includes but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Transmitting device 206 is used to receive via a network or transmission data.Above-mentioned network specific example may include
The wireless network that the communication providers of terminal 20 provide.In an example, transmitting device 206 is fitted including a network
Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to
Internet is communicated.In an example, transmitting device 206 can be radio frequency (Radio Frequency, RF) module,
For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), which may be such that user can be with
The user interface of terminal 20 (or mobile equipment) interacts.
It should be noted that the processing method of above-mentioned business datum can be applied to terminal or server, the terminal or clothes
The structure of business device may refer to the description in Fig. 2, and details are not described herein again, naturally it is also possible to be realized by application accordingly.
Fig. 3 is the flow diagram according to a kind of processing method of business datum of the embodiment of the present application.This method can be with
It runs in terminal shown in Fig. 2, but not limited to this.As shown in figure 3, the method comprising the steps of S302-S308, wherein:
Step S302 obtains the much information of account to be identified;
Optionally, above-mentioned much information includes at least one of:
The current behavior feature of above-mentioned account to be identified;Such as same device identification ID is made by same account or multiple accounts
Access times, wherein, the ID of equipment where when above equipment ID is above-mentioned account access website to be identified;
Account number in above-mentioned account belonging relation net to be identified, wherein, above-mentioned relation net is using multiple accounts as company
The network that the vertex of logical figure is formed by connecting two-by-two.Optionally, the account in above-mentioned relation net meets the following conditions:Above-mentioned relation
Relationship score value in net between any two account is all higher than predetermined threshold value.Optionally, the size of the relationship score value makes with above-mentioned
Directly proportional with number, i.e., above-mentioned access times more Important Relations score value and/or above-mentioned account number are bigger, and above-mentioned relation score value is bigger.
Wherein, above-mentioned relation score value can be determined according to following parameter but not limited to this:Each account in above-mentioned relation net
The access times of above-mentioned website are accessed using same intervening objects or access duration, wherein, above-mentioned intervening objects are above-mentioned
Two accounts of meaning generate data used in association.
Optionally, above-mentioned intervening objects include but not limited to following:Each account access net in device id, above-mentioned relation net
The geographical position of user corresponding to each account in access point name, network address, email address, above-mentioned relation net used in network
It puts.
Step S304 obtains the corresponding value-at-risk of each information in above-mentioned much information, wherein, which is used to indicate
Above-mentioned account to be identified is trusted degree;
Optionally, step S304 can be realized by least one of process:
1) type of above-mentioned current behavior feature is obtained, wherein, the type of above-mentioned current behavior feature includes:Machine behavior
With natural person's behavior;Type according to above-mentioned current behavior feature determines the corresponding numerical value of above-mentioned current behavior feature and first
Weight;Above-mentioned value-at-risk is determined according to above-mentioned numerical value and above-mentioned first weight;It wherein, can be with for the method for determination of above-mentioned numerical value
It is realized using the correspondence for pre-setting behavioural characteristic and numerical value, for example, when current operation behavior is robot behavior, a
=1, when being determined as natural person, a=0, w1 represent weight.
Optionally, the type of above-mentioned current behavior feature judges by user's current behavior feature, historical behavior to become
The information such as different, honey jar association are operated with reference to the service attribute of concrete scene to distinguish machine behavior with natural person, naturally it is also possible to
First judge whether account is robot, and then judge whether the behavior of the account is robot behavior, such as may be used following
Form is realized:Intercept and capture the access request that browser is directed to from user;Above-mentioned access request is parsed, obtains parsing knot
Fruit;There is no during the browser information for reflecting browser behavior in above-mentioned analysis result, judge above-mentioned user for machine
People, wherein, above-mentioned browser behavior includes the operation behavior to above-mentioned browser;There is reflection browsing in above-mentioned analysis result
During the browser information of device behavior, judge above-mentioned user for robot or natural person according to preset rules.In the analysis result
In there are the browser information in the case of, judge whether the browser information and the page info legal;Described
In the case of at least one of browser information and the page info are illegal, judge the user for robot;Described
In the case that browser information and the page info are all legal, judge the user for natural person.
2) the second weight according to above-mentioned access times and for above equipment ID distribution determines above-mentioned value-at-risk;
3) the third weight according to above-mentioned account number and for the distribution of above-mentioned account number determines above-mentioned value-at-risk.
Step S306 determines the account of above-mentioned account to be identified according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information
Family type;It is alternatively possible to it is accomplished by the following way:Summation operation is carried out to multiple above-mentioned value-at-risks, obtains risk total value;
Judge the interval where above-mentioned risk total value;It is determined according to the Account Type corresponding to above-mentioned interval above-mentioned to be identified
The Account Type of account.
Step S308, using business processing mode corresponding with the Account Type of above-mentioned account to be identified to coming from above-mentioned treat
The business datum of identification account is handled.
The Account Type of above-mentioned account to be identified includes:The first kind, Second Type and third type;The one of the application
In a alternative embodiment, when the Account Type of above-mentioned account to be identified is the first kind, allow above-mentioned account to be identified to upper
State the operation behavior of business corresponding to business datum;When the Account Type of above-mentioned account to be identified is Second Type, to above-mentioned
Account to be identified carries out secondary verification, and when being verified, and allows above-mentioned account to be identified to corresponding to above-mentioned business datum
The operation behavior of business;When the Account Type of above-mentioned account to be identified is third type, above-mentioned account to be identified is intercepted to upper
State the operation behavior of business corresponding to business datum.Optionally, the above-mentioned first kind, Second Type and third type can show
For different grades, i.e., account is classified.
It should be noted that for aforementioned each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement because
According to the application, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art should also know
It knows, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily the application
It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on such understanding, the technical solution of the application is substantially in other words to existing
The part that technology contributes can be embodied in the form of software product, which is stored in a storage
In intervening objects (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone,
Computer, server or network equipment etc.) perform each embodiment of the application described in method.
Embodiment 2
According to the embodiment of the present application, a kind of device for the processing method of business datum shown in implementing Fig. 3 is additionally provided,
As shown in figure 4, the device includes:
Acquisition module 40, for obtaining the much information of account to be identified;And it obtains each in above-mentioned much information and believes
Corresponding value-at-risk is ceased, wherein, what which was used to indicate above-mentioned account to be identified is trusted degree;
Determining module 42 is connected to acquisition module 40, for according to multiple above-mentioned risks corresponding with above-mentioned much information
Value determines the Account Type of above-mentioned account to be identified;
Processing module 44 is connected to determining module 42, for using corresponding with the Account Type of above-mentioned account to be identified
Business processing mode handles the business datum from above-mentioned account to be identified.
It should be noted that the modules in the embodiment of the present application are can be realized by the form of software or hardware
, for example, for the latter, following form can be shown as, but not limited to this:Above-mentioned modules are located in same processor;
Alternatively, the behavior of above-mentioned modules in any combination is located in different processors.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein
It repeats no more.
Embodiment 3
The present embodiment provides a kind of account recognition methods, as shown in figure 5, this method includes:
Step S502 obtains the much information of account to be identified, wherein, above-mentioned much information include it is following at least it
One:The current behavior feature of above-mentioned account to be identified, same device identification ID are used by what same account or multiple accounts used
Account number in number, above-mentioned account belonging relation net to be identified, wherein, above equipment ID is above-mentioned account access net to be identified
The ID of equipment where when standing, above-mentioned relation net is the network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph, on
It states the relationship score value in network of personal connections between any two account and is all higher than predetermined threshold value, above-mentioned relation score value is used to indicate two
Correlation degree between account;
Step S504 obtains the corresponding value-at-risk of each information in above-mentioned much information, wherein, which is used to indicate
Above-mentioned account to be identified is trusted degree;
Step S506 determines the account of above-mentioned account to be identified according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information
Family type.
Optionally, the size of above-mentioned relation score value is directly proportional to above-mentioned access times.
As an optional embodiment of the present embodiment, step S504 can be accomplished by the following way, but be not limited to
This:
1) type of above-mentioned current behavior feature is obtained, wherein, the type of above-mentioned current behavior feature includes:Machine behavior
With natural person's behavior;Type according to above-mentioned current behavior feature determines the corresponding numerical value of above-mentioned current behavior feature and first
Weight;Above-mentioned value-at-risk is determined according to above-mentioned numerical value and above-mentioned first weight;
2) the second weight according to above-mentioned access times and for above equipment ID distribution determines above-mentioned value-at-risk;
3) the third weight according to above-mentioned account number and for the distribution of above-mentioned account number determines above-mentioned value-at-risk.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein
It repeats no more.
Embodiment 4
The present embodiment provides a kind of account identification devices, are used to implement method described in embodiment 5, as shown in fig. 6, the dress
Put including:
First acquisition module 60, for obtaining the much information of account to be identified, wherein, above-mentioned much information include with
It is at least one lower:The current behavior feature of above-mentioned account to be identified;Same device identification ID is made by same account or multiple accounts
Access times,;Account number in above-mentioned account belonging relation net to be identified, wherein, above equipment ID is above-mentioned to be identified
The ID of equipment where during account access website, above-mentioned relation net is is formed by connecting multiple accounts as the vertex of connected graph two-by-two
Network, the relationship score value in above-mentioned relation net between any two account is all higher than predetermined threshold value, and above-mentioned relation score value is used for
Indicate the correlation degree between two accounts;
Second acquisition module 62, for obtaining the corresponding value-at-risk of each information in above-mentioned much information, wherein, the risk
What value was used to indicate above-mentioned account to be identified is trusted degree;
Identification module 64, for determining above-mentioned account to be identified according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information
The Account Type at family.
It should be noted that the modules in the embodiment of the present application are can be realized by the form of software or hardware
, for example, for the latter, following form can be shown as, but not limited to this:Above-mentioned modules are located in same processor;
Alternatively, the behavior of above-mentioned modules in any combination is located in different processors.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1 and 3,
Details are not described herein again.
Embodiment 5
The present embodiment provides another account recognition methods, this method can be run in terminal shown in Fig. 2,
It can run in other terminals that there is more or less structure feature than terminal shown in Fig. 2, but unlimited
In this.Fig. 7 is according to the flow diagram of another account recognition methods of the embodiment of the present application, as shown in fig. 7, this method packet
Include step S702-S708:
Step S702 obtains the device attribute of physical equipment that account to be identified is used in access target network.It is optional
Ground, the device attribute include but not limited to device id, the network address of equipment, mail address of equipment etc..
Step S704, the device attribute based on acquisition establish account belonging relation net to be identified, wherein, above-mentioned relation net
It is made of the account with identical device attribute;
Wherein it is determined that there are many modes of account belonging relation net to be identified, for example, it is directly true to be based on device id
It is fixed, there will be the account of identical device attribute all component parts as account belonging relation net to be identified, i.e., by with treating
Identify that account has all accounts composition above-mentioned relation net of same alike result, for example, the device attribute of account to be identified is equipment
ID, and device id=1, value 1 based on device id are searched using other accounts that device id is 1, by the account found with
Account to be identified forms connected graph, obtains above-mentioned relation net.Certain rule can also be used to having and account phase to be identified
Account with device attribute is screened, and above-mentioned relation net is formed by the account that screening obtains, for example, may be used by account it
Between relationship score value and the comparison result of predetermined threshold value mode to having the progress of the account of device attribute identical with account to be identified
Screening, wherein, relationship score value is used to indicate the correlation degree between two accounts, can use same intermediary with two accounts
Number or duration during object accesses target network embody, but not limited to this.
Step S706 counts the account number in above-mentioned account belonging relation net to be identified;
In the alternative embodiment of the application, since account to be identified may use different device attributes to access
Above-mentioned targeted website that is, it is possible that existing simultaneously multiple networks of personal connections, can count above-mentioned account to be identified in the following manner at this time
Account number in the belonging relation net of family, but not limited to this:If there are multiple networks of personal connections,:Wherein maximum account number is taken as upper
State the account number in account belonging relation net to be identified;Alternatively, wherein minimum account number is taken as belonging to above-mentioned account to be identified
Account number in network of personal connections;Alternatively, the average value of the account number of each network of personal connections is taken as above-mentioned account belonging relation to be identified
Account number in net.
Step S708 based on the account number and predetermined threshold value in above-mentioned account belonging relation net to be identified, is determined to be identified
The Account Type of account.
In an optional embodiment of the present embodiment, above-mentioned predetermined threshold value includes:First threshold, second threshold and
Three threshold values, when above-mentioned account number is more than third threshold value, it is malice account to determine above-mentioned Account Type;It is more than in above-mentioned account number
Second threshold and less than third threshold value when, determine above-mentioned Account Type be suspicious account;It is less than first threshold in above-mentioned account number
When, it is credible account to determine above-mentioned Account Type.
In another optional embodiment of the present embodiment, above-mentioned predetermined threshold value only includes a threshold value, can adopt at this time
The identification of Account Type is carried out with the following methods, but not limited to this:When above-mentioned account number is more than predetermined threshold value, above-mentioned Account Type
For malice account, when above-mentioned account number is less than predetermined threshold value, above-mentioned Account Type is determined as suspicious account or credible account.
In step S708, the account of account to be identified can be directly determined using the comparison result of account number and predetermined threshold value
Type in an optional embodiment, can also consider other parameter during the Account Type for determining account to be identified,
Then all parametric synthesis are considered to determine above-mentioned Account Type, such as other than considering above-mentioned account number, can also examine
Consider following element:The current behavior feature of the account to be identified;Same device identification ID is made by same account or multiple accounts
Access times, wherein, the ID of equipment where when the device id is the account access website to be identified.About such reality
Existing mode, may refer to the associated description in embodiment 1, details are not described herein again.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein
It repeats no more.
Embodiment 6
The present embodiment provides another account recognition methods, this method can be run in terminal shown in Fig. 2,
It can run in other terminals that there is more or less structure feature than terminal shown in Fig. 2, but unlimited
In this.Fig. 8 is according to the flow diagram of another account recognition methods of the embodiment of the present application, as shown in figure 8, this method packet
Include step S802-S810:
Step S802 obtains the device attribute of physical equipment that account to be identified is used in access target network;
Step S804, the device attribute based on acquisition calculate more between each account in account and account library to be identified
A relationship score value, wherein, above-mentioned account library be presetting database or tables of data, above-mentioned relation score value be used to indicate two accounts it
Between correlation degree, above-mentioned relation score value it is higher represent two accounts between relationship it is bigger;
Optionally, in the following manner may be used in above-mentioned the determining of account library, but not limited to this:User is in access target website
When can generate a large amount of action trail (i.e. user behavior information or for user behavior characteristic information), these user behavior rails
Mark links to form a complicated mixed relationship network by same media, each account node group in the mixed relationship network
Into above-mentioned account library.
The relationship score value of step S806, selection and account to be identified is more than the account of the first predetermined threshold value, is formed to be identified
The network of personal connections of account.Optionally, the first predetermined threshold value can empirically or test of many times obtain, neural network can also be based on
Model is trained to obtain, but not limited to this.
Optionally, above-mentioned relation score value is the numerical value determined according to following parameter:Account to be identified in account library with specifying
Account uses the number or duration of same device attribute access target network.Such as can by the number of access target network or
Person's duration, can also be according to the number or duration of certain preset rules access target network and pass directly as above-mentioned relation score value
It is the proportional relationship of score value, but is not limited to the above-mentioned form of expression.
Step S808, the account number in statistical relationship net;With
Step S810 based on above-mentioned account number and the second predetermined threshold value, determines the type of account to be identified.Optionally,
Two predetermined threshold values can empirically or test of many times obtain, can also be trained to obtain based on neural network model, but not
It is limited to this.
In an optional embodiment of the present embodiment, above-mentioned second predetermined threshold value includes:First threshold, second threshold
With third threshold value, when above-mentioned account number is more than third threshold value, it is malice account to determine above-mentioned Account Type;In above-mentioned account number
During more than second threshold and less than third threshold value, it is suspicious account to determine above-mentioned Account Type;It is less than first in above-mentioned account number
During threshold value, it is credible account to determine above-mentioned Account Type.
In another optional embodiment of the present embodiment, above-mentioned second predetermined threshold value only includes a threshold value, at this time may be used
To carry out the identification of Account Type in the following ways, but not limited to this:It is above-mentioned when above-mentioned account number is more than the second predetermined threshold value
Account Type is malice account, and when above-mentioned account number is less than the second predetermined threshold value, above-mentioned Account Type is determined as suspicious account
Or credible account.
In step S810, the account of account to be identified can be directly determined using the comparison result of account number and predetermined threshold value
Type in an optional embodiment, can also consider other parameter during the Account Type for determining account to be identified,
Then all parametric synthesis are considered to determine above-mentioned Account Type, such as other than considering above-mentioned account number, can also examine
Consider following element:The current behavior feature of the account to be identified;Same device identification ID is made by same account or multiple accounts
Access times, wherein, the ID of equipment where when the device id is the account access website to be identified.About such reality
Existing mode, may refer to the associated description in embodiment 1, details are not described herein again.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein
It repeats no more.
Embodiment 7
The present embodiment provides a kind of terminal, which provides interaction circle for being interacted with user
Face, as shown in figure 9, interactive interface 90 includes:
First control 900, for receiving the first triggering command of user, the first triggering command is following for triggering execution
Operation:Obtain the device attribute of physical equipment that account to be identified is used in access target network;
Second control 902, for receiving the second triggering command of user, second triggering command is following for triggering execution
Operation:Device attribute based on acquisition calculates multiple relationship score values between each account in account and account library to be identified,
In, above-mentioned relation score value is used to indicate the correlation degree between two accounts, and above-mentioned relation score value two accounts of higher expression
Between relationship it is bigger;
Third control 904, for showing the network of personal connections of above-mentioned account to be identified, wherein, above-mentioned relation net by with it is to be identified
The relationship score value of account is more than that the account of the first predetermined threshold value forms;Optionally, there are many exhibition methods of third control 904,
It can be shown, can also be opened up by way of the connection relation between list records account by the form of topological diagram
Show, however it is not limited to above-mentioned exhibition method.
4th control 906, for receiving the third triggering command of user, the third triggering command is following for triggering execution
Operation:Based on the account number and the second predetermined threshold value in above-mentioned relation net, the type of account to be identified is determined;
5th control 908, for showing the type of above-mentioned account to be identified.Optionally, the exhibition of the type of account to be identified
Show there are many modes, for example, different types can be represented with different colors, can also represent above-mentioned in the form of word and treat
Identify the type of account, however it is not limited to this.
It should be noted that the function of above-mentioned each control is that can be integrated in a manner of specific combination in certain situations
In the control of one or different, for example, the function of the first control 900 and the second control 902 can be integrated in a specific control
In part, at this point it is possible to determine to perform the function of which control according to the parity of triggering times, for example, in above-mentioned particular control
By the (2n+1) is secondary be triggered when, perform the function of the first control 900, when above-mentioned particular control is by (2n) secondary triggering, hold
The function of the second control of row 902.
It should be noted that the preferred embodiment in the present embodiment may refer to the associated description in embodiment 1, herein
It repeats no more.
Embodiment 8
Embodiments herein can provide a kind of terminal, which can be in terminal group
Any one computer terminal.Optionally, in the present embodiment, above computer terminal can also replace with mobile whole
The terminal devices such as end.
Optionally, in the present embodiment, above computer terminal can be located in multiple network equipments of computer network
At least one network equipment.
In the present embodiment, above computer terminal can perform the program of following steps in the processing method of business datum
Code:Obtain the much information of account to be identified;The corresponding value-at-risk of each information in above-mentioned much information is obtained, wherein, it should
What value-at-risk was used to indicate above-mentioned account to be identified is trusted degree;According to multiple above-mentioned risks corresponding with above-mentioned much information
Value determines the Account Type of above-mentioned account to be identified;Using business processing side corresponding with the Account Type of above-mentioned account to be identified
Formula handles the business datum from above-mentioned account to be identified.
Optionally, the concrete structure of the terminal in the present embodiment may refer to shown in Fig. 2, but not limited to this, i.e.,
Terminal in the present embodiment can have the structure more more or less than terminal shown in Fig. 2.
Wherein, memory can be used for storage software program and module, such as the place of the business datum in the embodiment of the present application
Corresponding program instruction/the module of method and apparatus is managed, processor is stored in software program and mould in memory by operation
Block so as to perform various functions application and data processing, that is, realizes the processing method of above-mentioned business datum.Memory can wrap
Include high speed random access memory, can also include nonvolatile memory, as one or more magnetic storage device, flash memory or
Other non-volatile solid state memories of person.In some instances, memory can further comprise remotely located relative to processor
Memory, these remote memories can pass through network connection to terminal A.The example of above-mentioned network includes but not limited to interconnect
Net, intranet, LAN, mobile radio communication and combinations thereof.
Processor can call the information and application program that memory stores, to perform following step:Obtain account to be identified
The much information at family;The corresponding value-at-risk of each information in above-mentioned much information is obtained, wherein, which is used to indicate above-mentioned
Account to be identified is trusted degree;Above-mentioned account to be identified is determined according to multiple above-mentioned value-at-risks corresponding with above-mentioned much information
The Account Type at family;It is above-mentioned to be identified to coming from using business processing mode corresponding with the Account Type of above-mentioned account to be identified
The business datum of account is handled.
It should be noted that the preferred embodiment in the present embodiment, may refer to the associated description in embodiment 1, this
Place repeats no more.
It will appreciated by the skilled person that terminal can be smart mobile phone (such as Android phone, iOS
Mobile phone etc.), tablet computer, applause computer and mobile internet device (Mobile Internet Devices, MID), PAD
Wait terminal devices.Fig. 2 it does not cause to limit to the structure of above-mentioned electronic device.For example, terminal 20 may also include ratio
More either less components (such as network interface, display device) shown in Fig. 2 are matched with different from shown in Fig. 2
It puts.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To be completed by program come the device-dependent hardware of command terminal, which can be stored in a computer-readable storage intermediary
In object, storage intervening objects can include:Flash disk, read-only memory (Read-Only Memory, ROM), arbitrary access
Device (Random Access Memory, RAM), disk or CD etc..
Embodiment 9
Embodiments herein additionally provides a kind of storage medium.Optionally, in the present embodiment, above-mentioned storage medium can
The program code performed by the processing method of business datum provided for preservation above-described embodiment 1.
Optionally, in the present embodiment, above-mentioned storage medium can be located in computer network Computer terminal group
In any one terminal or in any one mobile terminal in mobile terminal group.
Optionally, in the present embodiment, storage medium is arranged to store the program code for performing following steps:
Obtain the multiple types information of account to be identified;The corresponding value-at-risk of each type information in above-mentioned multiple types information is obtained,
Wherein, what which was used to indicate above-mentioned account to be identified is trusted degree;According to corresponding with above-mentioned multiple types information
Multiple above-mentioned value-at-risks determine the Account Type of above-mentioned account to be identified;Using corresponding with the Account Type of above-mentioned account to be identified
Business processing mode the business datum from above-mentioned account to be identified is handled.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the quality of embodiment.
In above-described embodiment of the application, all emphasize particularly on different fields to the description of each embodiment, do not have in some embodiment
The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only
A kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or
Person is desirably integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also
That each unit is individually physically present, can also two or more units integrate in a unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses
When, it can be stored in a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially
The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products
It embodies, which is stored in a storage medium, is used including some instructions so that a computer
Terminal (can be personal computer, server or network equipment etc.) perform each embodiment the method for the application whole or
Part steps.And aforementioned storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code
Medium.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art
For member, under the premise of the application principle is not departed from, several improvements and modifications can also be made, these improvements and modifications also should
It is considered as the protection domain of the application.
Claims (20)
1. a kind of processing method of business datum, which is characterized in that including:
Obtain the much information of account to be identified;
The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used to indicate the account to be identified
Family is trusted degree;
The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information;
Using business processing mode corresponding with the Account Type of the account to be identified to the industry from the account to be identified
Business data are handled.
2. according to the method described in claim 1, it is characterized in that, the much information includes at least one of:
The current behavior feature of the account to be identified;
Same device identification ID is made by same account or using what multiple accounts of same intervening objects access target website used
With number, wherein, the ID of equipment where when the device id is the account access website to be identified, the intervening objects is appoint
Two accounts of meaning generate data used in association;
Account number in the account belonging relation net to be identified, wherein, the network of personal connections is using multiple accounts as connected graph
The network that is formed by connecting two-by-two of vertex.
3. according to the method described in claim 2, it is characterized in that, the account in the network of personal connections meets the following conditions:It is described
Relationship score value in network of personal connections between any two account is all higher than predetermined threshold value, wherein the relation value is used to indicate two
Correlation degree between account.
4. according to the method described in claim 3, it is characterized in that, the size of the relationship score value and the access times are into just
Than.
5. according to the method described in claim 3, it is characterized in that, the relationship score value is determines according to following parameter:
Each account accesses the access times of the website using same intervening objects or accesses duration in the network of personal connections.
6. according to the method described in claim 5, it is characterized in that, the intervening objects include:
Access point name used in each account access network in device id, the network of personal connections, network address, email address,
The geographical location of user corresponding to each account in the network of personal connections.
7. according to the method described in claim 2, it is characterized in that, obtain the corresponding risk of each information in the much information
Value includes at least one of:
1) type of the current behavior feature is obtained, wherein, the type of the current behavior feature includes:Machine behavior and from
Right people's behavior;Type according to the current behavior feature determines the corresponding numerical value of the current behavior feature and the first power
Weight;The value-at-risk is determined according to the numerical value and first weight;
2) the second weight according to the access times and for device id distribution determines the value-at-risk;
3) the third weight according to the account number and for account number distribution determines the value-at-risk.
8. according to the method described in claim 1, it is characterized in that, according to multiple risks corresponding with the much information
Value determines the Account Type of the account to be identified, including:
Summation operation is carried out to multiple value-at-risks, obtains risk total value;
Judge the interval where the risk total value;
The Account Type of the account to be identified is determined according to the Account Type corresponding to the interval.
9. method according to any one of claim 1 to 8, which is characterized in that the Account Type of the account to be identified
Including:The first kind, Second Type and third type;Using business processing corresponding with the Account Type of the account to be identified
Mode handles the business datum from the account to be identified, including:
When the Account Type of the account to be identified is the first kind, allow the account to be identified to the business datum institute
The operation behavior of corresponding business;
When the Account Type of the account to be identified is Second Type, to the secondary verification of the account progress to be identified, and
When being verified, allow operation behavior of the account to be identified to business corresponding to the business datum;
When the Account Type of the account to be identified is third type, the account to be identified is intercepted to the business datum institute
The operation behavior of corresponding business.
10. a kind of account recognition methods, which is characterized in that including:
The much information of account to be identified is obtained, wherein, the much information includes at least one of:The account to be identified
It is access times that the current behavior feature at family, same device identification ID are used by same account or multiple accounts, described to be identified
Account number in account belonging relation net, wherein, equipment where when the device id is the account access website to be identified
ID, the network of personal connections are the network that multiple accounts are formed by connecting two-by-two as the vertex of connected graph, arbitrary in the network of personal connections
Relationship score value between two accounts is all higher than predetermined threshold value, and the relationship score value is used to indicate the association journey between two accounts
Degree;
The corresponding value-at-risk of each information in the much information is obtained, wherein, which is used to indicate the account to be identified
Family is trusted degree;
The Account Type of the account to be identified is determined according to multiple value-at-risks corresponding with the much information.
11. according to the method described in claim 10, it is characterized in that, the size of the relationship score value and the access times into
Direct ratio.
12. according to the method described in claim 10, it is characterized in that, obtain the corresponding wind of each information in the much information
Danger value includes at least one of:
1) type of the current behavior feature is obtained, wherein, the type of the current behavior feature includes:Machine behavior and from
Right people's behavior;Type according to the current behavior feature determines the corresponding numerical value of the current behavior feature and the first power
Weight;The value-at-risk is determined according to the numerical value and first weight;
2) the second weight according to the access times and for device id distribution determines the value-at-risk;
3) the third weight according to the account number and for account number distribution determines the value-at-risk.
13. a kind of processing unit of business datum, which is characterized in that including:
Acquisition module, for obtaining the much information of account to be identified;And it obtains each information in the much information and corresponds to
Value-at-risk, wherein, what which was used to indicate the account to be identified is trusted degree;
Determining module, for determining the account of the account to be identified according to multiple value-at-risks corresponding with the much information
Family type;
Processing module, for using business processing mode corresponding with the Account Type of the account to be identified to coming from described treat
The business datum of identification account is handled.
14. a kind of account identification device, which is characterized in that including:
First acquisition module, for obtaining the much information of account to be identified, wherein, the much information include it is following at least
One of:The current behavior feature of the account to be identified;Same device identification ID is made by what same account or multiple accounts used
With number,;Account number in the account belonging relation net to be identified, wherein, the device id is visited for the account to be identified
The ID of place equipment when asking website, the network of personal connections is the net that multiple accounts are formed by connecting two-by-two as the vertex of connected graph
Network, the relationship score value in the network of personal connections between any two account are all higher than predetermined threshold value, and the relationship score value is used to indicate
Correlation degree between two accounts;
Second acquisition module, for obtaining the corresponding value-at-risk of each information in the much information, wherein, which is used for
Indicate the account to be identified is trusted degree;
Identification module, for determining the account of the account to be identified according to multiple value-at-risks corresponding with the much information
Family type.
15. a kind of terminal, including:Processor and memory, which is characterized in that the processor is used to call and perform
What is stored in the memory is used to implement the program of following functions:
Obtain the much information of account to be identified;The corresponding value-at-risk of each information in the much information is obtained, wherein, the wind
What danger value was used to indicate the account to be identified is trusted degree;According to multiple value-at-risks corresponding with the much information
Determine the Account Type of the account to be identified;Using business processing mode corresponding with the Account Type of the account to be identified
Business datum from the account to be identified is handled.
16. a kind of account recognition methods, which is characterized in that including:
Obtain the device attribute of physical equipment that account to be identified is used in access target network;
Device attribute based on acquisition establishes account belonging relation net to be identified, wherein, the network of personal connections is by with identical equipment
The account composition of attribute;
Count the account number in the account belonging relation net to be identified;
Based on the account number and predetermined threshold value in the account belonging relation net to be identified, the account class of account to be identified is determined
Type.
17. according to the method for claim 16, which is characterized in that the account in the statistics account belonging relation net to be identified
Amount includes:
If there are multiple networks of personal connections,:
Wherein maximum account number is taken as the account number in the account belonging relation net to be identified, alternatively,
Wherein minimum account number is taken as the account number in the account belonging relation net to be identified, alternatively,
The average value of the account number of each network of personal connections is taken as the account number in the account belonging relation net to be identified.
18. a kind of account recognition methods, which is characterized in that including:
Obtain the device attribute of physical equipment that account to be identified is used in access target network;
Device attribute based on acquisition calculates multiple relationship score values between each account in account and account library to be identified,
In, the account library is presetting database or tables of data, and the relationship score value is used to indicate the correlation degree between two accounts,
The relationship score value is higher, and the relationship represented between two accounts is bigger;
The relationship score value of selection and account to be identified is more than the account of the first predetermined threshold value, forms the relationship of the account to be identified
Net;
Account number in statistical relationship net;With
Based on the account number and the second predetermined threshold value, the type of account to be identified is determined.
19. according to the method for claim 18, which is characterized in that the relationship score value is the number determined according to following parameter
Value:Account to be identified uses the number or duration of same device attribute access target network with destiny account in account library.
20. a kind of terminal provides the interactive interface for being interacted with user, which is characterized in that the interactive boundary
Face includes:
First control, for receiving the first triggering command of user, which performs following operate for triggering:It obtains
The device attribute of physical equipment that account to be identified is taken to be used in access target network;
Second control, for receiving the second triggering command of user, which performs following operate for triggering:Base
In the device attribute of acquisition, multiple relationship score values between each account in account and account library to be identified are calculated, wherein, it is described
Relationship score value is used to indicate the correlation degree between two accounts, and the higher pass represented between two accounts of the relationship score value
System is bigger;
Third control, for showing the network of personal connections of the account to be identified, wherein, the network of personal connections is by the pass with account to be identified
It is the account composition that score value is more than the first predetermined threshold value;
4th control, for receiving the third triggering command of user, which performs following operate for triggering:Base
Account number and the second predetermined threshold value in the network of personal connections determine the type of account to be identified;
5th control, for showing the type of the account to be identified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611120597.9A CN108171519A (en) | 2016-12-07 | 2016-12-07 | The processing of business datum, account recognition methods and device, terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611120597.9A CN108171519A (en) | 2016-12-07 | 2016-12-07 | The processing of business datum, account recognition methods and device, terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108171519A true CN108171519A (en) | 2018-06-15 |
Family
ID=62526488
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611120597.9A Pending CN108171519A (en) | 2016-12-07 | 2016-12-07 | The processing of business datum, account recognition methods and device, terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108171519A (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109087106A (en) * | 2018-07-03 | 2018-12-25 | 阿里巴巴集团控股有限公司 | Identify air control model training, air control method, apparatus and the equipment of secondary account takeover of distributing telephone numbers |
CN109151518A (en) * | 2018-08-06 | 2019-01-04 | 武汉斗鱼网络科技有限公司 | A kind of recognition methods, device and the electronic equipment of stolen account |
CN109191140A (en) * | 2018-07-05 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of scorecard model integration method and device |
CN109242519A (en) * | 2018-09-25 | 2019-01-18 | 阿里巴巴集团控股有限公司 | A kind of abnormal behaviour recognition methods, device and equipment |
CN109460930A (en) * | 2018-11-15 | 2019-03-12 | 武汉斗鱼网络科技有限公司 | A kind of method and relevant device of determining adventure account |
CN109615423A (en) * | 2018-11-29 | 2019-04-12 | 阿里巴巴集团控股有限公司 | The processing method and processing device of business |
CN109688183A (en) * | 2018-08-20 | 2019-04-26 | 深圳壹账通智能科技有限公司 | Group control device recognition methods, device, equipment and computer readable storage medium |
CN110232630A (en) * | 2019-05-29 | 2019-09-13 | 腾讯科技(深圳)有限公司 | The recognition methods of malice account, device and storage medium |
CN110264191A (en) * | 2019-05-17 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of Risk Identification Method and device of payment |
CN110597574A (en) * | 2019-08-29 | 2019-12-20 | 凡普数字技术有限公司 | Account matching method and device and storage medium |
CN110852761A (en) * | 2019-10-11 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Method and device for formulating anti-cheating strategy and electronic equipment |
CN111031017A (en) * | 2019-11-29 | 2020-04-17 | 腾讯科技(深圳)有限公司 | Abnormal business account identification method, device, server and storage medium |
CN111385136A (en) * | 2018-12-29 | 2020-07-07 | 华为技术服务有限公司 | Method and device for determining user communication identifier |
CN111383025A (en) * | 2020-03-04 | 2020-07-07 | 支付宝(杭州)信息技术有限公司 | Method and device for forwarding wind control data and electronic equipment |
CN111724194A (en) * | 2020-05-08 | 2020-09-29 | 厦门极致互动网络技术股份有限公司 | Substitute device detection method, system, mobile terminal and storage medium |
CN111860655A (en) * | 2020-07-23 | 2020-10-30 | 中国联合网络通信集团有限公司 | User processing method, device and equipment |
CN111861483A (en) * | 2019-04-26 | 2020-10-30 | 阿里巴巴集团控股有限公司 | Communication method, computer equipment and storage medium |
CN112437034A (en) * | 2019-08-26 | 2021-03-02 | 腾讯科技(深圳)有限公司 | False terminal detection method and device, storage medium and electronic device |
CN112491994A (en) * | 2020-11-17 | 2021-03-12 | 中国联合网络通信集团有限公司 | Identification method and communication device of Internet of vehicles terminal |
CN113610175A (en) * | 2021-08-16 | 2021-11-05 | 上海冰鉴信息科技有限公司 | Service strategy generation method and device and computer readable storage medium |
CN113641972A (en) * | 2021-08-20 | 2021-11-12 | 北京达佳互联信息技术有限公司 | Account identification method and device, electronic equipment and storage medium |
CN113676497A (en) * | 2021-10-22 | 2021-11-19 | 广州锦行网络科技有限公司 | Data blocking method and device, electronic equipment and storage medium |
CN114742479A (en) * | 2022-06-10 | 2022-07-12 | 深圳竹云科技股份有限公司 | Account identification method, device, server and storage medium |
WO2022267769A1 (en) * | 2021-06-24 | 2022-12-29 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for generating graph data |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120078735A1 (en) * | 2010-09-28 | 2012-03-29 | John Bauer | Secure account provisioning |
CN103927307A (en) * | 2013-01-11 | 2014-07-16 | 阿里巴巴集团控股有限公司 | Website user identification method and device |
CN105677221A (en) * | 2015-12-30 | 2016-06-15 | 广州优视网络科技有限公司 | Method and device for improving application data detecting accuracy and equipment |
CN105791255A (en) * | 2014-12-23 | 2016-07-20 | 阿里巴巴集团控股有限公司 | Method and system for identifying computer risks based on account clustering |
CN105812195A (en) * | 2014-12-30 | 2016-07-27 | 阿里巴巴集团控股有限公司 | Method and device for computer to identify batch accounts |
CN106033574A (en) * | 2015-03-10 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Identification method and identification device for cheating behavior |
CN106033575A (en) * | 2015-03-11 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Risk account identification method and apparatus |
-
2016
- 2016-12-07 CN CN201611120597.9A patent/CN108171519A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120078735A1 (en) * | 2010-09-28 | 2012-03-29 | John Bauer | Secure account provisioning |
CN103927307A (en) * | 2013-01-11 | 2014-07-16 | 阿里巴巴集团控股有限公司 | Website user identification method and device |
CN105791255A (en) * | 2014-12-23 | 2016-07-20 | 阿里巴巴集团控股有限公司 | Method and system for identifying computer risks based on account clustering |
CN105812195A (en) * | 2014-12-30 | 2016-07-27 | 阿里巴巴集团控股有限公司 | Method and device for computer to identify batch accounts |
CN106033574A (en) * | 2015-03-10 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Identification method and identification device for cheating behavior |
CN106033575A (en) * | 2015-03-11 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Risk account identification method and apparatus |
CN105677221A (en) * | 2015-12-30 | 2016-06-15 | 广州优视网络科技有限公司 | Method and device for improving application data detecting accuracy and equipment |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109087106A (en) * | 2018-07-03 | 2018-12-25 | 阿里巴巴集团控股有限公司 | Identify air control model training, air control method, apparatus and the equipment of secondary account takeover of distributing telephone numbers |
CN109087106B (en) * | 2018-07-03 | 2020-12-08 | 创新先进技术有限公司 | Wind control model training and wind control method, device and equipment for recognizing fraudulent use of secondary number-paying account |
WO2020007153A1 (en) * | 2018-07-03 | 2020-01-09 | 阿里巴巴集团控股有限公司 | Risk control model training method, apparatus and device, and risk control method, apparatus, and device for identifying reused telephone number account fraud |
CN109191140A (en) * | 2018-07-05 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of scorecard model integration method and device |
CN109151518A (en) * | 2018-08-06 | 2019-01-04 | 武汉斗鱼网络科技有限公司 | A kind of recognition methods, device and the electronic equipment of stolen account |
CN109151518B (en) * | 2018-08-06 | 2021-02-02 | 武汉斗鱼网络科技有限公司 | Stolen account identification method and device and electronic equipment |
CN109688183B (en) * | 2018-08-20 | 2022-08-19 | 深圳壹账通智能科技有限公司 | Group control equipment identification method, device, equipment and computer readable storage medium |
CN109688183A (en) * | 2018-08-20 | 2019-04-26 | 深圳壹账通智能科技有限公司 | Group control device recognition methods, device, equipment and computer readable storage medium |
CN109242519A (en) * | 2018-09-25 | 2019-01-18 | 阿里巴巴集团控股有限公司 | A kind of abnormal behaviour recognition methods, device and equipment |
CN109242519B (en) * | 2018-09-25 | 2022-12-16 | 创新先进技术有限公司 | Abnormal behavior identification method, device and equipment |
CN109460930A (en) * | 2018-11-15 | 2019-03-12 | 武汉斗鱼网络科技有限公司 | A kind of method and relevant device of determining adventure account |
CN109460930B (en) * | 2018-11-15 | 2021-11-26 | 武汉斗鱼网络科技有限公司 | Method for determining risk account and related equipment |
CN109615423A (en) * | 2018-11-29 | 2019-04-12 | 阿里巴巴集团控股有限公司 | The processing method and processing device of business |
CN109615423B (en) * | 2018-11-29 | 2020-06-16 | 阿里巴巴集团控股有限公司 | Service processing method and device |
US11461503B2 (en) | 2018-11-29 | 2022-10-04 | Advanced New Technologies Co., Ltd. | Service processing method and apparatus |
CN111385136A (en) * | 2018-12-29 | 2020-07-07 | 华为技术服务有限公司 | Method and device for determining user communication identifier |
CN111861483A (en) * | 2019-04-26 | 2020-10-30 | 阿里巴巴集团控股有限公司 | Communication method, computer equipment and storage medium |
CN110264191A (en) * | 2019-05-17 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of Risk Identification Method and device of payment |
CN110232630A (en) * | 2019-05-29 | 2019-09-13 | 腾讯科技(深圳)有限公司 | The recognition methods of malice account, device and storage medium |
CN112437034A (en) * | 2019-08-26 | 2021-03-02 | 腾讯科技(深圳)有限公司 | False terminal detection method and device, storage medium and electronic device |
CN110597574A (en) * | 2019-08-29 | 2019-12-20 | 凡普数字技术有限公司 | Account matching method and device and storage medium |
CN110852761A (en) * | 2019-10-11 | 2020-02-28 | 支付宝(杭州)信息技术有限公司 | Method and device for formulating anti-cheating strategy and electronic equipment |
CN111031017B (en) * | 2019-11-29 | 2021-12-14 | 腾讯科技(深圳)有限公司 | Abnormal business account identification method, device, server and storage medium |
CN111031017A (en) * | 2019-11-29 | 2020-04-17 | 腾讯科技(深圳)有限公司 | Abnormal business account identification method, device, server and storage medium |
CN111383025A (en) * | 2020-03-04 | 2020-07-07 | 支付宝(杭州)信息技术有限公司 | Method and device for forwarding wind control data and electronic equipment |
CN111383025B (en) * | 2020-03-04 | 2022-09-02 | 支付宝(杭州)信息技术有限公司 | Method and device for forwarding wind control data and electronic equipment |
CN111724194A (en) * | 2020-05-08 | 2020-09-29 | 厦门极致互动网络技术股份有限公司 | Substitute device detection method, system, mobile terminal and storage medium |
CN111724194B (en) * | 2020-05-08 | 2022-09-06 | 厦门极致互动网络技术股份有限公司 | Substitute device detection method, system, mobile terminal and storage medium |
CN111860655A (en) * | 2020-07-23 | 2020-10-30 | 中国联合网络通信集团有限公司 | User processing method, device and equipment |
CN111860655B (en) * | 2020-07-23 | 2023-05-30 | 中国联合网络通信集团有限公司 | User processing method, device and equipment |
CN112491994B (en) * | 2020-11-17 | 2022-04-22 | 中国联合网络通信集团有限公司 | Identification method and communication device of Internet of vehicles terminal |
CN112491994A (en) * | 2020-11-17 | 2021-03-12 | 中国联合网络通信集团有限公司 | Identification method and communication device of Internet of vehicles terminal |
WO2022267769A1 (en) * | 2021-06-24 | 2022-12-29 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for generating graph data |
CN113610175A (en) * | 2021-08-16 | 2021-11-05 | 上海冰鉴信息科技有限公司 | Service strategy generation method and device and computer readable storage medium |
CN113641972A (en) * | 2021-08-20 | 2021-11-12 | 北京达佳互联信息技术有限公司 | Account identification method and device, electronic equipment and storage medium |
CN113676497A (en) * | 2021-10-22 | 2021-11-19 | 广州锦行网络科技有限公司 | Data blocking method and device, electronic equipment and storage medium |
CN114742479B (en) * | 2022-06-10 | 2022-09-06 | 深圳竹云科技股份有限公司 | Account identification method, account identification device, server and storage medium |
CN114742479A (en) * | 2022-06-10 | 2022-07-12 | 深圳竹云科技股份有限公司 | Account identification method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108171519A (en) | The processing of business datum, account recognition methods and device, terminal | |
KR101821511B1 (en) | Data processing method based on instant messaging or social applications, and device thereof | |
CN109063966A (en) | The recognition methods of adventure account and device | |
CN106529288A (en) | Account risk identification method and device | |
CN110689438A (en) | Enterprise financial risk scoring method and device, computer equipment and storage medium | |
CN108540431A (en) | The recognition methods of account type, device and system | |
CN107211016A (en) | Secure session is divided and application program parser | |
CN105100029B (en) | The method and apparatus that authentication is carried out to user | |
CN108123926A (en) | Identity identifying method and device and computing device | |
CN103425703B (en) | A kind for the treatment of method and apparatus of the network information | |
CN104836696B (en) | A kind of detection method and device of IP address | |
CN107820114A (en) | Special efficacy methods of exhibiting and device | |
US20230086276A1 (en) | Fraud prevention in programmatic advertising | |
CN106651580A (en) | Method and device for judging whether financial account is malicious or not, and computing device | |
CN109547426A (en) | Service response method and server | |
US20160267578A1 (en) | System and method for implementation of sharing economy in a web environment | |
CN103634117A (en) | Control method and control device for online shopping safety protection | |
CN104618336B (en) | A kind of account management method, equipment and system | |
CN112370793A (en) | Risk control method and device for user account | |
CN108335191A (en) | Account-opening method, financial services system end and the computer storage media of finance account | |
Chaganti et al. | Recent trends in social engineering scams and case study of gift card scam | |
CN106257507A (en) | The methods of risk assessment of user behavior and device | |
CN107465685A (en) | Communication products real-name authentication system | |
CN111385272A (en) | Weak password detection method and device | |
CN109615393A (en) | The follow-up processing method and processing device of breakpoint |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180615 |