CN110084007B - 风险控制模型的构建方法、装置及终端 - Google Patents

风险控制模型的构建方法、装置及终端 Download PDF

Info

Publication number
CN110084007B
CN110084007B CN201811355486.5A CN201811355486A CN110084007B CN 110084007 B CN110084007 B CN 110084007B CN 201811355486 A CN201811355486 A CN 201811355486A CN 110084007 B CN110084007 B CN 110084007B
Authority
CN
China
Prior art keywords
service
control model
terminal
user
risk control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811355486.5A
Other languages
English (en)
Chinese (zh)
Other versions
CN110084007A (zh
Inventor
吕鲲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201811355486.5A priority Critical patent/CN110084007B/zh
Publication of CN110084007A publication Critical patent/CN110084007A/zh
Application granted granted Critical
Publication of CN110084007B publication Critical patent/CN110084007B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/384Payment protocols; Details thereof using social networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Qualifying participants for shopping transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Social Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)
CN201811355486.5A 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端 Active CN110084007B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811355486.5A CN110084007B (zh) 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811355486.5A CN110084007B (zh) 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端
CN201410539483.2A CN105516071B (zh) 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410539483.2A Division CN105516071B (zh) 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器

Publications (2)

Publication Number Publication Date
CN110084007A CN110084007A (zh) 2019-08-02
CN110084007B true CN110084007B (zh) 2023-11-28

Family

ID=55655636

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201410539483.2A Active CN105516071B (zh) 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器
CN201811355486.5A Active CN110084007B (zh) 2014-10-13 2014-10-13 风险控制模型的构建方法、装置及终端

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201410539483.2A Active CN105516071B (zh) 2014-10-13 2014-10-13 验证业务操作安全性的方法、装置、终端及服务器

Country Status (10)

Country Link
US (1) US10313353B2 (enExample)
EP (1) EP3207464B1 (enExample)
JP (1) JP6800147B2 (enExample)
KR (1) KR102107560B1 (enExample)
CN (2) CN105516071B (enExample)
ES (1) ES2867751T3 (enExample)
PL (1) PL3207464T3 (enExample)
SG (1) SG11201702758WA (enExample)
TW (1) TWI666563B (enExample)
WO (1) WO2016093945A1 (enExample)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296406A (zh) 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 交互数据的处理方法及装置
CN111404887B (zh) 2015-11-02 2023-03-10 创新先进技术有限公司 一种业务处理方法及装置
US10303889B2 (en) * 2016-01-07 2019-05-28 Emmanuel Gonzalez System and method to reduce inappropriate email and online behavior
CN107016473B (zh) * 2016-01-27 2022-11-22 创新先进技术有限公司 一种风险控制方法和设备
US10038700B1 (en) * 2016-03-29 2018-07-31 EMC IP Holding Company LLC Establishing trustworthiness of devices in the internet of things (IoT) to control inter-device communication
CN107644340A (zh) 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 风险识别方法、客户端设备及风险识别系统
CN108074024B (zh) * 2016-11-10 2022-04-08 蚂蚁蓉信(成都)网络科技有限公司 可信数据传输方法、装置及系统
TWI668657B (zh) * 2017-01-20 2019-08-11 香港商阿里巴巴集團服務有限公司 Business processing method and device
CN109754319B (zh) * 2017-11-07 2022-11-25 腾讯科技(深圳)有限公司 信用分值确定系统、方法、终端及服务器
US11017100B2 (en) * 2018-08-03 2021-05-25 Verizon Patent And Licensing Inc. Identity fraud risk engine platform
CN112418580A (zh) 2019-08-22 2021-02-26 上海哔哩哔哩科技有限公司 一种风险控制方法、计算机设备及可读存储介
CN112434894A (zh) * 2019-08-23 2021-03-02 上海哔哩哔哩科技有限公司 一种实时风险控制方法、计算机设备及可读存储介质
CN110781500A (zh) * 2019-09-30 2020-02-11 口碑(上海)信息技术有限公司 一种数据风控系统以及方法
CN111310196B (zh) * 2020-05-09 2020-12-04 支付宝(杭州)信息技术有限公司 风险识别方法及装置和电子设备
CN112184231B (zh) * 2020-11-02 2022-06-28 支付宝(杭州)信息技术有限公司 一种可信业务确定方法及装置
CN114124343B (zh) * 2020-11-16 2023-11-14 神州融安数字科技(北京)有限公司 保护隐私的风险评分信息查询方法、装置、系统及设备
CN112988727B (zh) * 2021-03-25 2022-09-16 北京百度网讯科技有限公司 数据标注方法、装置、设备、存储介质及计算机程序产品
CN114389901B (zh) * 2022-03-24 2022-08-23 湖南三湘银行股份有限公司 一种基于在线化的客户认证系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201104602A (en) * 2009-07-29 2011-02-01 Danal Taiwan Co Ltd Transaction control method and system for evaluating network consumption risk, and payment method for network transaction
CN102045634A (zh) * 2010-11-12 2011-05-04 深圳市爱贝信息技术有限公司 基于移动终端地理位置异常的用户安全控制方法及装置
CN103024744A (zh) * 2012-12-24 2013-04-03 百度在线网络技术(北京)有限公司 移动终端的身份验证的方法和系统
CN103123712A (zh) * 2011-11-17 2013-05-29 阿里巴巴集团控股有限公司 一种网络行为数据的监控方法和系统
CN103530772A (zh) * 2013-09-30 2014-01-22 深圳钱盒信息技术有限公司 一种移动互联支付风险控制方法及系统
CN103944722A (zh) * 2014-04-17 2014-07-23 华北科技学院 一种互联网环境下用户可信行为的识别方法

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7614078B1 (en) * 2003-04-02 2009-11-03 Cisco Technology, Inc. Threshold access based upon stored credentials
JP5087850B2 (ja) * 2006-03-14 2012-12-05 富士通株式会社 サービス仲介方法、サービス仲介装置及びサービス仲介システム
US9003488B2 (en) * 2007-06-06 2015-04-07 Datavalet Technologies System and method for remote device recognition at public hotspots
US8635662B2 (en) * 2008-01-31 2014-01-21 Intuit Inc. Dynamic trust model for authenticating a user
US20110219424A1 (en) * 2010-03-05 2011-09-08 Microsoft Corporation Information protection using zones
US20130097659A1 (en) * 2011-10-17 2013-04-18 Mcafee, Inc. System and method for whitelisting applications in a mobile network environment
US9747440B2 (en) * 2012-08-15 2017-08-29 Qualcomm Incorporated On-line behavioral analysis engine in mobile device with multiple analyzer model providers
US9166962B2 (en) * 2012-11-14 2015-10-20 Blackberry Limited Mobile communications device providing heuristic security authentication features and related methods
US8856894B1 (en) * 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
US9262610B2 (en) * 2013-01-23 2016-02-16 Facebook, Inc. Imposter account detection and remediation in a social networking system
WO2014145395A2 (en) * 2013-03-15 2014-09-18 Rohter Consulting LLC System and method for consumer fraud protection
US10475029B2 (en) 2013-03-15 2019-11-12 Allowify Llc System and method for consumer fraud protection
US9003196B2 (en) * 2013-05-13 2015-04-07 Hoyos Labs Corp. System and method for authorizing access to access-controlled environments
US10362136B2 (en) * 2014-08-20 2019-07-23 Visa International Service Association Device profile data usage for state management in mobile device authentication
US20160239649A1 (en) * 2015-02-13 2016-08-18 Qualcomm Incorporated Continuous authentication
US9654477B1 (en) * 2015-05-05 2017-05-16 Wells Fargo Bank, N. A. Adaptive authentication
US10140600B2 (en) * 2015-07-01 2018-11-27 Liveensure, Inc. System and method for mobile peer authentication and asset control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201104602A (en) * 2009-07-29 2011-02-01 Danal Taiwan Co Ltd Transaction control method and system for evaluating network consumption risk, and payment method for network transaction
CN102045634A (zh) * 2010-11-12 2011-05-04 深圳市爱贝信息技术有限公司 基于移动终端地理位置异常的用户安全控制方法及装置
CN103123712A (zh) * 2011-11-17 2013-05-29 阿里巴巴集团控股有限公司 一种网络行为数据的监控方法和系统
CN103024744A (zh) * 2012-12-24 2013-04-03 百度在线网络技术(北京)有限公司 移动终端的身份验证的方法和系统
CN103530772A (zh) * 2013-09-30 2014-01-22 深圳钱盒信息技术有限公司 一种移动互联支付风险控制方法及系统
CN103944722A (zh) * 2014-04-17 2014-07-23 华北科技学院 一种互联网环境下用户可信行为的识别方法

Also Published As

Publication number Publication date
CN105516071A (zh) 2016-04-20
JP6800147B2 (ja) 2020-12-16
ES2867751T3 (es) 2021-10-20
KR102107560B1 (ko) 2020-05-08
EP3207464A1 (en) 2017-08-23
CN105516071B (zh) 2019-01-18
EP3207464B1 (en) 2021-04-07
US20160103997A1 (en) 2016-04-14
US10313353B2 (en) 2019-06-04
EP3207464A4 (en) 2017-10-04
JP2017531875A (ja) 2017-10-26
CN110084007A (zh) 2019-08-02
KR20170069271A (ko) 2017-06-20
SG11201702758WA (en) 2017-05-30
TW201614535A (en) 2016-04-16
PL3207464T3 (pl) 2021-07-19
WO2016093945A1 (en) 2016-06-16
TWI666563B (zh) 2019-07-21

Similar Documents

Publication Publication Date Title
CN110084007B (zh) 风险控制模型的构建方法、装置及终端
US10862843B2 (en) Computerized system and method for modifying a message to apply security features to the message's content
CN107994991B (zh) 一种数据处理方法、数据处理服务器及存储介质
US12401510B2 (en) Systems and methods for user control and exclusion of cryptographic tokenized data
CN105743851B (zh) 业务处理方法、装置及业务服务器
EP4111334B1 (en) Registered applications for electronic devices
US20160189151A1 (en) Distributed authentication for mobile devices
US9942757B2 (en) Identifying a mobile computing device
US20210099431A1 (en) Synthetic identity and network egress for user privacy
CN103914520B (zh) 数据查询方法、终端设备和服务器
US12468820B2 (en) Systems and methods for user characteristic determination through cryptographic tokenized data
US12355732B2 (en) Transactional identity system and server
CN110704826A (zh) 信息推荐方法及装置、存储介质和电子设备
US20230206246A1 (en) Systems for Securing Transactions Based on Merchant Trust Score
CN105308991A (zh) 基于位置的网络cookie的系统和方法
KR20150065441A (ko) 서버기반의 간편 로그인 시스템 및 간편 로그인 방법
CN115459910A (zh) 数据加密方法、装置及存储介质
US12340402B2 (en) Systems and methods for proactively informing users of an age of a merchant during online transactions
Lee et al. Building location-based service based on social network API: An example of check-in app

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant