CN110084007B - 风险控制模型的构建方法、装置及终端 - Google Patents
风险控制模型的构建方法、装置及终端 Download PDFInfo
- Publication number
- CN110084007B CN110084007B CN201811355486.5A CN201811355486A CN110084007B CN 110084007 B CN110084007 B CN 110084007B CN 201811355486 A CN201811355486 A CN 201811355486A CN 110084007 B CN110084007 B CN 110084007B
- Authority
- CN
- China
- Prior art keywords
- service
- terminal
- control model
- user
- risk control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012954 risk control Methods 0.000 title claims abstract description 107
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000013475 authorization Methods 0.000 claims abstract description 14
- 238000004458 analytical method Methods 0.000 claims description 134
- 238000012546 transfer Methods 0.000 description 19
- 238000012795 verification Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 230000006399 behavior Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/384—Payment protocols; Details thereof using social networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/303—Terminal profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811355486.5A CN110084007B (zh) | 2014-10-13 | 2014-10-13 | 风险控制模型的构建方法、装置及终端 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410539483.2A CN105516071B (zh) | 2014-10-13 | 2014-10-13 | 验证业务操作安全性的方法、装置、终端及服务器 |
CN201811355486.5A CN110084007B (zh) | 2014-10-13 | 2014-10-13 | 风险控制模型的构建方法、装置及终端 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410539483.2A Division CN105516071B (zh) | 2014-10-13 | 2014-10-13 | 验证业务操作安全性的方法、装置、终端及服务器 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110084007A CN110084007A (zh) | 2019-08-02 |
CN110084007B true CN110084007B (zh) | 2023-11-28 |
Family
ID=55655636
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410539483.2A Active CN105516071B (zh) | 2014-10-13 | 2014-10-13 | 验证业务操作安全性的方法、装置、终端及服务器 |
CN201811355486.5A Active CN110084007B (zh) | 2014-10-13 | 2014-10-13 | 风险控制模型的构建方法、装置及终端 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410539483.2A Active CN105516071B (zh) | 2014-10-13 | 2014-10-13 | 验证业务操作安全性的方法、装置、终端及服务器 |
Country Status (10)
Country | Link |
---|---|
US (1) | US10313353B2 (zh) |
EP (1) | EP3207464B1 (zh) |
JP (1) | JP6800147B2 (zh) |
KR (1) | KR102107560B1 (zh) |
CN (2) | CN105516071B (zh) |
ES (1) | ES2867751T3 (zh) |
PL (1) | PL3207464T3 (zh) |
SG (1) | SG11201702758WA (zh) |
TW (1) | TWI666563B (zh) |
WO (1) | WO2016093945A1 (zh) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106296406A (zh) | 2015-05-13 | 2017-01-04 | 阿里巴巴集团控股有限公司 | 交互数据的处理方法及装置 |
CN111404887B (zh) | 2015-11-02 | 2023-03-10 | 创新先进技术有限公司 | 一种业务处理方法及装置 |
US10303889B2 (en) * | 2016-01-07 | 2019-05-28 | Emmanuel Gonzalez | System and method to reduce inappropriate email and online behavior |
CN107016473B (zh) * | 2016-01-27 | 2022-11-22 | 创新先进技术有限公司 | 一种风险控制方法和设备 |
US10038700B1 (en) * | 2016-03-29 | 2018-07-31 | EMC IP Holding Company LLC | Establishing trustworthiness of devices in the internet of things (IoT) to control inter-device communication |
CN107644340A (zh) | 2016-07-22 | 2018-01-30 | 阿里巴巴集团控股有限公司 | 风险识别方法、客户端设备及风险识别系统 |
CN108074024B (zh) * | 2016-11-10 | 2022-04-08 | 蚂蚁蓉信(成都)网络科技有限公司 | 可信数据传输方法、装置及系统 |
TWI668657B (zh) * | 2017-01-20 | 2019-08-11 | 香港商阿里巴巴集團服務有限公司 | Business processing method and device |
CN109754319B (zh) * | 2017-11-07 | 2022-11-25 | 腾讯科技(深圳)有限公司 | 信用分值确定系统、方法、终端及服务器 |
US11017100B2 (en) * | 2018-08-03 | 2021-05-25 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
CN112418580A (zh) * | 2019-08-22 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | 一种风险控制方法、计算机设备及可读存储介 |
CN112434894A (zh) * | 2019-08-23 | 2021-03-02 | 上海哔哩哔哩科技有限公司 | 一种实时风险控制方法、计算机设备及可读存储介质 |
CN110781500A (zh) * | 2019-09-30 | 2020-02-11 | 口碑(上海)信息技术有限公司 | 一种数据风控系统以及方法 |
CN111310196B (zh) * | 2020-05-09 | 2020-12-04 | 支付宝(杭州)信息技术有限公司 | 风险识别方法及装置和电子设备 |
CN112184231B (zh) * | 2020-11-02 | 2022-06-28 | 支付宝(杭州)信息技术有限公司 | 一种可信业务确定方法及装置 |
CN114124343B (zh) * | 2020-11-16 | 2023-11-14 | 神州融安数字科技(北京)有限公司 | 保护隐私的风险评分信息查询方法、装置、系统及设备 |
CN112988727B (zh) * | 2021-03-25 | 2022-09-16 | 北京百度网讯科技有限公司 | 数据标注方法、装置、设备、存储介质及计算机程序产品 |
CN114389901B (zh) * | 2022-03-24 | 2022-08-23 | 湖南三湘银行股份有限公司 | 一种基于在线化的客户认证系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201104602A (en) * | 2009-07-29 | 2011-02-01 | Danal Taiwan Co Ltd | Transaction control method and system for evaluating network consumption risk, and payment method for network transaction |
CN102045634A (zh) * | 2010-11-12 | 2011-05-04 | 深圳市爱贝信息技术有限公司 | 基于移动终端地理位置异常的用户安全控制方法及装置 |
CN103024744A (zh) * | 2012-12-24 | 2013-04-03 | 百度在线网络技术(北京)有限公司 | 移动终端的身份验证的方法和系统 |
CN103123712A (zh) * | 2011-11-17 | 2013-05-29 | 阿里巴巴集团控股有限公司 | 一种网络行为数据的监控方法和系统 |
CN103530772A (zh) * | 2013-09-30 | 2014-01-22 | 深圳钱盒信息技术有限公司 | 一种移动互联支付风险控制方法及系统 |
CN103944722A (zh) * | 2014-04-17 | 2014-07-23 | 华北科技学院 | 一种互联网环境下用户可信行为的识别方法 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7614078B1 (en) * | 2003-04-02 | 2009-11-03 | Cisco Technology, Inc. | Threshold access based upon stored credentials |
US9003488B2 (en) * | 2007-06-06 | 2015-04-07 | Datavalet Technologies | System and method for remote device recognition at public hotspots |
US8635662B2 (en) * | 2008-01-31 | 2014-01-21 | Intuit Inc. | Dynamic trust model for authenticating a user |
US20110219424A1 (en) * | 2010-03-05 | 2011-09-08 | Microsoft Corporation | Information protection using zones |
US20130097659A1 (en) * | 2011-10-17 | 2013-04-18 | Mcafee, Inc. | System and method for whitelisting applications in a mobile network environment |
US9747440B2 (en) * | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
US9166962B2 (en) * | 2012-11-14 | 2015-10-20 | Blackberry Limited | Mobile communications device providing heuristic security authentication features and related methods |
US8856894B1 (en) * | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US9262610B2 (en) * | 2013-01-23 | 2016-02-16 | Facebook, Inc. | Imposter account detection and remediation in a social networking system |
WO2014145395A2 (en) * | 2013-03-15 | 2014-09-18 | Rohter Consulting LLC | System and method for consumer fraud protection |
US10475029B2 (en) * | 2013-03-15 | 2019-11-12 | Allowify Llc | System and method for consumer fraud protection |
US9003196B2 (en) * | 2013-05-13 | 2015-04-07 | Hoyos Labs Corp. | System and method for authorizing access to access-controlled environments |
US10362136B2 (en) * | 2014-08-20 | 2019-07-23 | Visa International Service Association | Device profile data usage for state management in mobile device authentication |
US20160239649A1 (en) * | 2015-02-13 | 2016-08-18 | Qualcomm Incorporated | Continuous authentication |
US9654477B1 (en) * | 2015-05-05 | 2017-05-16 | Wells Fargo Bank, N. A. | Adaptive authentication |
US10140600B2 (en) * | 2015-07-01 | 2018-11-27 | Liveensure, Inc. | System and method for mobile peer authentication and asset control |
-
2014
- 2014-10-13 CN CN201410539483.2A patent/CN105516071B/zh active Active
- 2014-10-13 CN CN201811355486.5A patent/CN110084007B/zh active Active
-
2015
- 2015-04-29 TW TW104113714A patent/TWI666563B/zh active
- 2015-10-12 US US14/880,637 patent/US10313353B2/en active Active
- 2015-10-12 PL PL15866753T patent/PL3207464T3/pl unknown
- 2015-10-12 ES ES15866753T patent/ES2867751T3/es active Active
- 2015-10-12 WO PCT/US2015/055120 patent/WO2016093945A1/en active Application Filing
- 2015-10-12 JP JP2017518928A patent/JP6800147B2/ja active Active
- 2015-10-12 SG SG11201702758WA patent/SG11201702758WA/en unknown
- 2015-10-12 EP EP15866753.5A patent/EP3207464B1/en active Active
- 2015-10-12 KR KR1020177012991A patent/KR102107560B1/ko active IP Right Grant
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201104602A (en) * | 2009-07-29 | 2011-02-01 | Danal Taiwan Co Ltd | Transaction control method and system for evaluating network consumption risk, and payment method for network transaction |
CN102045634A (zh) * | 2010-11-12 | 2011-05-04 | 深圳市爱贝信息技术有限公司 | 基于移动终端地理位置异常的用户安全控制方法及装置 |
CN103123712A (zh) * | 2011-11-17 | 2013-05-29 | 阿里巴巴集团控股有限公司 | 一种网络行为数据的监控方法和系统 |
CN103024744A (zh) * | 2012-12-24 | 2013-04-03 | 百度在线网络技术(北京)有限公司 | 移动终端的身份验证的方法和系统 |
CN103530772A (zh) * | 2013-09-30 | 2014-01-22 | 深圳钱盒信息技术有限公司 | 一种移动互联支付风险控制方法及系统 |
CN103944722A (zh) * | 2014-04-17 | 2014-07-23 | 华北科技学院 | 一种互联网环境下用户可信行为的识别方法 |
Also Published As
Publication number | Publication date |
---|---|
CN105516071A (zh) | 2016-04-20 |
TW201614535A (en) | 2016-04-16 |
CN105516071B (zh) | 2019-01-18 |
WO2016093945A1 (en) | 2016-06-16 |
JP2017531875A (ja) | 2017-10-26 |
EP3207464B1 (en) | 2021-04-07 |
JP6800147B2 (ja) | 2020-12-16 |
CN110084007A (zh) | 2019-08-02 |
EP3207464A1 (en) | 2017-08-23 |
ES2867751T3 (es) | 2021-10-20 |
KR102107560B1 (ko) | 2020-05-08 |
US20160103997A1 (en) | 2016-04-14 |
EP3207464A4 (en) | 2017-10-04 |
SG11201702758WA (en) | 2017-05-30 |
US10313353B2 (en) | 2019-06-04 |
TWI666563B (zh) | 2019-07-21 |
KR20170069271A (ko) | 2017-06-20 |
PL3207464T3 (pl) | 2021-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110084007B (zh) | 风险控制模型的构建方法、装置及终端 | |
US11284260B1 (en) | Augmented reality security access | |
US10862843B2 (en) | Computerized system and method for modifying a message to apply security features to the message's content | |
CN105262779B (zh) | 身份认证方法、装置及系统 | |
KR101932871B1 (ko) | 서비스 프로세싱 방법 및 장치, 및 서비스 서버 | |
US20160189151A1 (en) | Distributed authentication for mobile devices | |
US11593082B2 (en) | Registered applications for electronic devices | |
US10380590B2 (en) | Transaction authentication based on metadata | |
US20170208463A1 (en) | Identifying a Mobile Computing Device | |
US20210328973A1 (en) | Transactional identity system and server | |
US12062052B2 (en) | Systems for securing transactions based on merchant trust score | |
US20240089105A1 (en) | Systems and methods for user control and exclusion of cryptographic tokenized data | |
KR20190021406A (ko) | 1차 지불 수단의 확대를 가능하게 하는 방법 및 디바이스 | |
WO2014127659A1 (en) | Method, device, and system for processing contact information | |
KR101103634B1 (ko) | 이동 단말기를 이용한 카드사 서버의 인증 방법 및 카드사 서버 | |
US20220358503A1 (en) | Systems and methods for providing in-person status to a user device | |
KR20150065441A (ko) | 서버기반의 간편 로그인 시스템 및 간편 로그인 방법 | |
US11704709B2 (en) | Systems and methods for proactively informing users of an age of a merchant during online transactions | |
US20240086549A1 (en) | Systems and methods for user characteristic determination through cryptographic tokenized data | |
US20230140712A1 (en) | Systems and methods for generating and using virtual card numbers | |
US20140236853A1 (en) | Method, device, and system for processing contact information | |
CN102945352A (zh) | 在计算机系统中分析并执行动作信息的方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201012 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20201012 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Applicant before: Alibaba Group Holding Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |