CN111432227A - Virtual resource transfer risk determination method, device, server and storage medium - Google Patents

Virtual resource transfer risk determination method, device, server and storage medium Download PDF

Info

Publication number
CN111432227A
CN111432227A CN202010231116.1A CN202010231116A CN111432227A CN 111432227 A CN111432227 A CN 111432227A CN 202010231116 A CN202010231116 A CN 202010231116A CN 111432227 A CN111432227 A CN 111432227A
Authority
CN
China
Prior art keywords
resource transfer
virtual resource
risk
target user
risk coefficient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010231116.1A
Other languages
Chinese (zh)
Other versions
CN111432227B (en
Inventor
黄桂志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Kugou Computer Technology Co Ltd
Original Assignee
Guangzhou Kugou Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Kugou Computer Technology Co Ltd filed Critical Guangzhou Kugou Computer Technology Co Ltd
Priority to CN202010231116.1A priority Critical patent/CN111432227B/en
Publication of CN111432227A publication Critical patent/CN111432227A/en
Application granted granted Critical
Publication of CN111432227B publication Critical patent/CN111432227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2543Billing, e.g. for subscription services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/262Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists
    • H04N21/26258Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists for generating a list of items to be played back in a given order, e.g. playlist, or scheduling item distribution according to such list
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application

Abstract

The application discloses a risk determination method, device, server and storage medium for virtual resource transfer, and belongs to the technical field of networks. The method comprises the following steps: receiving a virtual resource transfer instruction of a target user account, wherein the virtual resource transfer instruction is triggered by the virtual resource transfer behavior of the target user account in a live broadcast room; determining a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to a target user account, wherein the target user portrait is generated according to a historical watching behavior and a historical virtual resource transfer behavior corresponding to the target user account, and the risk coefficient is used for representing the risk degree of the virtual resource transfer behavior; and responding to the virtual resource transfer instruction according to the risk coefficient. According to the method, the risk coefficient can be calculated before the virtual resource is transferred, and then different response modes are determined according to different risk coefficients, so that the safety of the virtual resource transfer process is improved, and the fund safety of the target user account is maintained.

Description

Virtual resource transfer risk determination method, device, server and storage medium
Technical Field
The embodiment of the application relates to the technical field of networks, in particular to a risk determination method, a risk determination device, a risk determination server and a storage medium for virtual resource transfer.
Background
With the development of network technology, the application of the live broadcast platform is more and more extensive. The live broadcast platform can comprise a main broadcast and a user, the main broadcast can carry out network live broadcast in a live broadcast room identification code, and the user can enter the live broadcast room identification code and watch the contents of the main broadcast carrying out network live broadcast. In the course of viewing by the user, in order to express support and liking for the main broadcast, virtual items may be viewed to the main broadcast, for example, interesting icons, animation, and the like may be given to the main broadcast. The virtual goods enjoyed by the user correspond to a certain amount of virtual resources, and the virtual resources can be exchanged for currency.
For the reward behavior of the user, the reward system can be bound with a third-party payment platform when the virtual resource transfer is completed for the first time, so that reward of the main broadcast can be quickly completed directly through the user account and the payment password in the subsequent virtual resource transfer process.
However, when the user account is maliciously occupied and the user equipment is poisoned, a large amount of funds under the user account may be lost, and the virtual resource transfer security of the user in the internet virtual resource transfer process may not be ensured.
Disclosure of Invention
The embodiment of the application provides a method, a device, a server and a storage medium for determining risk of virtual resource transfer, and the technical scheme is as follows:
in one aspect, a method for determining risk of virtual resource transfer is provided, where the method includes:
receiving a virtual resource transfer instruction of a target user account, wherein the virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in a live broadcast room, and the virtual resource transfer behavior comprises at least one of giving a virtual gift, giving a virtual item and giving a virtual currency;
determining a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account, wherein the target user portrait is generated according to a historical viewing behavior and a historical virtual resource transfer behavior corresponding to the target user account, and the risk coefficient is used for representing the risk degree of the virtual resource transfer behavior;
and responding the virtual resource transfer instruction according to the risk coefficients, wherein different response modes correspond to different risk coefficients.
In another aspect, an apparatus for risk determination of virtual resource transfer is provided, the apparatus comprising:
the instruction receiving module is used for receiving a virtual resource transfer instruction of a target user account, the virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in a live broadcast room, and the virtual resource transfer behavior comprises at least one of giving a virtual gift, giving a virtual prop and giving a virtual currency;
a risk determination module, configured to determine a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account, where the target user portrait is generated according to a historical viewing behavior and a historical virtual resource transfer behavior corresponding to the target user account, and the risk coefficient is used to represent a risk degree of the virtual resource transfer behavior;
and the instruction response module is used for responding the virtual resource transfer instruction according to the risk coefficients, wherein different response modes correspond to different risk coefficients.
In another aspect, a server is provided, the server comprising a processor and a memory; the memory stores at least one instruction for execution by the processor to implement the method for risk determination of virtual resource transfer as described in the above aspect.
In another aspect, a computer-readable storage medium is provided, the storage medium storing at least one instruction for execution by a processor to implement the method for risk determination of virtual resource transfer as described in the above aspect.
In another aspect, a computer program product is provided, which stores at least one instruction that is loaded and executed by the processor to implement the risk determination method for virtual resource transfer according to the above aspect.
In the embodiment of the application, in a live broadcast scene, after receiving a virtual resource transfer instruction of a target user account, a background server does not directly respond to transfer of virtual resources, but determines a risk coefficient corresponding to the virtual resource transfer instruction according to a target user figure corresponding to the target user account, further characterizes the risk degree of virtual resource transfer behavior according to the risk coefficient, and makes different response modes for the virtual resource transfer instruction according to different risk coefficients; compared with the virtual resource transfer method in the related art, the risk determining method for virtual resource transfer can calculate the risk coefficient before the virtual resource transfer, and further determine different response modes according to different risk coefficients so as to improve the safety of the virtual resource transfer process and maintain the fund safety of the target user account.
Drawings
FIG. 1 is a schematic diagram illustrating an implementation environment of a risk determination method for virtual resource migration according to an exemplary embodiment of the present application;
FIG. 2 is a flowchart illustrating a risk determination method for virtual resource migration according to an exemplary embodiment of the present application;
FIG. 3 illustrates a flowchart of a risk determination method for virtual resource migration provided by another exemplary embodiment of the present application;
fig. 4 is a block diagram illustrating a structure of a risk determination apparatus for virtual resource transfer according to an exemplary embodiment of the present application;
fig. 5 is a block diagram illustrating a server according to an exemplary embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Reference herein to "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Optionally, the method for determining risk of virtual resource transfer according to the present application may be applied to a live broadcast platform scenario, for example, when a user rewards a certain anchor, the terminal determines whether a risk exists in a current virtual resource transfer behavior based on the method for determining risk of virtual resource transfer according to the present application, and finally determines whether to allow implementation of the current virtual resource transfer behavior according to a risk coefficient.
Fig. 1 is a schematic diagram of an implementation environment of a risk determination method for virtual resource transfer according to an exemplary embodiment of the present application. Referring to fig. 1, the implementation environment may include: terminal 100 and backend server 200.
Optionally, the background server 200 may be an independent server, or may be integrated into any one of a server cluster, a virtual cloud storage, or a cloud computing center, for example, the background server 200 is a server cluster, and the background server 200 may include: risk factor determination server 110 and user representation generation server 120. Wherein the terminal 100 and the risk factor determination server 110 may communicate via a wired or wireless connection, and the risk factor determination server 110 and the user representation generation server 120 may also communicate via a wired or wireless connection. Each server may be any one of a server, a server cluster composed of a plurality of servers, a virtual cloud storage, or a cloud computing center.
Optionally, the background server 200 may further include a shared-anchor identifier management server, where the shared-anchor identifier management server is configured to manage events such as creation of an anchor identifier and supervision of the anchor identifier in a network live broadcast process; optionally, the background server 200 may further include a live broadcast room identifier management server, where the live broadcast room identifier management server is configured to manage events such as creation of a live broadcast room identifier and monitoring of a live broadcast room identifier in a network live broadcast process. The servers that the backend server 200 may include are only exemplary and do not limit the structure of the backend server 200 in the present application.
In addition, when the backend server 200 is an independent server, the backend server 200 has the backend service function of each server.
In one example, as shown in fig. 1, the terminal 100 receives a virtual resource transfer instruction of a target user account, and sends the virtual resource transfer instruction to the risk factor determination server 110; the risk factor determination server 110 obtains a target user account, which is an object of virtual resource transfer currently performed, according to the virtual resource transfer instruction, and obtains a target user portrait corresponding to the target user account from the user portrait generation server 120; further, the risk coefficient determination server 110 determines a risk coefficient corresponding to the virtual resource transfer instruction according to the target user portrait corresponding to the target user account, and then determines a risk degree of the current virtual resource transfer behavior; optionally, the risk coefficient determining server 110 may determine the corresponding response mode according to the risk coefficient, or the risk coefficient determining server 110 sends the risk coefficient to the terminal 100, and the terminal 100 determines the corresponding response mode according to the risk coefficient.
It should be noted that the above servers may be independent servers, or may be integrated into any one of a server cluster, a virtual cloud storage, or a cloud computing center, and in any one of the integrated server cluster, virtual cloud storage, or cloud computing center, the content of the embodiment of the present application may be supplemented according to the content of the embodiment of the present application, which is not limited in the embodiment of the present application.
Referring to fig. 2, a flowchart of a risk determination method for virtual resource transfer according to an exemplary embodiment of the present application is shown. The method is suitable for the terminal 100 and the background server 200 in the implementation environment shown in fig. 1, and includes:
step 201, receiving a virtual resource transfer instruction of a target user account.
The virtual resource transfer instruction is triggered by the virtual resource transfer behavior of the target user account in the live broadcast room, and the virtual resource transfer behavior comprises at least one of giving a virtual gift, giving a virtual item and giving virtual money.
The virtual gifts, the virtual props and the virtual currency are all virtual articles, the virtual articles refer to virtual identifications used for indicating the wealth values in a virtual scene, such as virtual identifications used for indicating the wealth values, such as flowers, balloons and rockets, displayed on a terminal interface in a live broadcast scene, and optionally, different virtual identifications refer to different wealth values, such as flowers, 10 wealth values, 20 wealth values, such as balloons and 1000 wealth values, and the like.
Optionally, the value of the wealth value can be directly equivalent to the currency of circulation, and can also have a certain exchange ratio with the currency of circulation. For example, in the case of 1: 10, the user plays a flower, namely a prize 1 yuan, a balloon, and a rocket, namely a prize 100 yuan.
The virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in the live broadcast room, and optionally, the virtual resource transfer instruction at least includes parameters related to the current virtual resource transfer behavior of the target user account, such as a resource transfer number, a live broadcast room identifier, and an anchor identifier.
Wherein the resource transfer amount is determined according to the type and the amount of the virtual article. If the user under the target user account plays three flowers as the reward anchor, and the wealth value indicated by the virtual article under the flower type is 10, the current resource transfer amount is 30 (or replaced by an equivalent currency value).
In a possible implementation manner, a terminal triggers and generates a virtual resource transfer instruction according to a virtual resource transfer behavior of a target user account in a live broadcast room, and sends the virtual resource transfer instruction to a background server; correspondingly, the background server receives a virtual resource transfer instruction of the target user account.
Step 202, determining a risk coefficient corresponding to the virtual resource transfer instruction according to the target user representation corresponding to the target user account.
The target user portrait is generated according to the historical watching behavior and the historical virtual resource transferring behavior corresponding to the target user account, and the risk coefficient is used for representing the risk degree of the virtual resource transferring behavior.
The different user accounts correspond to respective historical watching behaviors and historical virtual resource transfer behaviors, so that the different user accounts correspond to respective user figures.
Optionally, the target user representation may be used as an instruction parameter index to calculate a risk coefficient for each instruction parameter included in the virtual resource transfer instruction.
In one example, the virtual resource transfer instruction includes resource transfer time when the virtual resource transfer behavior occurs, the background server obtains a historical resource transfer period corresponding to the account of the target user through the representation of the target user, and if the current resource transfer time is not within the historical resource transfer period, it indicates that a certain risk coefficient exists in the current virtual resource transfer behavior.
In another example, a anchor list in which a historical resource transfer behavior occurs under a target user account is recorded in a target user image corresponding to the target user account, and if an anchor identifier included in a virtual resource transfer instruction does not exist in the anchor list, it indicates that a certain risk coefficient exists in a current virtual resource transfer behavior.
It should be noted that the risk coefficient corresponding to the virtual resource transfer instruction is formed by overlapping the risk coefficients corresponding to the instruction parameters.
Step 203, responding to the virtual resource transfer instruction according to the risk coefficient.
Wherein different response modes correspond to different risk coefficients. In order to prevent the current virtual resource transfer behavior of the target user account from being forcibly restrained, the background server can implement different response modes according to the level of the risk coefficient. And if the risk coefficient is in a first range, responding to the virtual resource transfer instruction through a risk prompt, and if the risk coefficient is in a second higher range, responding to the virtual resource transfer instruction through a verification mode, and the like.
In addition, the process of generating the response mode can be further refined, if the background server has already performed a risk prompt on the target user account for once, but still performs a normal response on the current virtual resource transfer behavior of the target user account, when the number of times of performing the risk prompt on the target user account by the background server is greater than a certain threshold, the current virtual resource transfer behavior of the target user account is verified, and when the verification is passed, the target user account can continue the virtual resource transfer behavior.
To sum up, in the embodiment of the application, in a live broadcast scenario, after receiving a virtual resource transfer instruction of a target user account, a background server determines a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account instead of directly transferring virtual resources, and further characterizes a risk degree of a virtual resource transfer behavior according to the risk coefficient, and makes different response modes for the virtual resource transfer instruction according to different risk coefficients; compared with the virtual resource transfer method in the related art, the risk determining method for virtual resource transfer can calculate the risk coefficient before the virtual resource transfer, and further determine different response modes according to different risk coefficients so as to improve the safety of the virtual resource transfer process and maintain the fund safety of the target user account.
Before another exemplary embodiment is illustrated, a description of how a target user representation is generated will first be set forth. And generating the target user portrait according to the historical watching behavior and the historical virtual resource transferring behavior corresponding to the target user account.
Optionally, the historical viewing behavior includes the following: the live broadcast watching time length and the watching time period of the target user account in different live broadcast rooms, and the live broadcast watching time length and the watching time period of the target user account in different anchor broadcasts.
Optionally, the historical virtual resource transfer behavior includes the following: the virtual resource transfer method comprises the steps of transferring the virtual resources of a target user account every time, transferring the virtual resources of the target user account every day, carrying out virtual resource transfer on different anchor broadcasts by the target user account in a ratio of the number of the target user account to the virtual resource transfer between different live broadcast rooms, transferring the virtual resources of the target user account to the anchor broadcasts with different live broadcast watching durations, and transferring the virtual resources of the target user every day.
It should be noted that the historical viewing behavior and the historical virtual resource transfer behavior are only exemplary, and are not limited in the present application.
Further, according to the historical watching behavior and the historical virtual resource transfer behavior corresponding to the target user account, the background server can generate a target user portrait including a target live broadcast room list, a target anchor broadcast list, a resource transfer quantity threshold and a historical resource transfer time period.
The target live broadcast room list comprises at least one target live broadcast room identifier, and the target user account has a live broadcast room with historical virtual resource transfer behavior in the target live broadcast room; the target anchor list comprises at least one target anchor mark, and the target user account has historical virtual resource transfer behavior in a direct broadcast room corresponding to the target anchor; the resource transfer quantity threshold is determined according to the historical virtual resource transfer quantity corresponding to the historical virtual resource transfer behavior, for example, the resource transfer quantity threshold is an average value of virtual resource transfer quantities of the target user account every time; in addition, the historical resource transfer time period is determined according to the time corresponding to the historical virtual resource transfer behavior, for example, the historical resource transfer time period is all the time periods when the target user performs virtual resource transfer every day.
Referring to fig. 3, a flowchart of a risk determination method for virtual resource migration according to another exemplary embodiment of the present application is shown. The method is suitable for the terminal 100 and the background server 200 in the implementation environment shown in fig. 1, and includes:
step 301, receiving a virtual resource transfer instruction of a target user account.
Please refer to step 201, and the embodiments of the present application are not described herein again.
Step 302, obtain the transfer parameters contained in the virtual resource transfer instruction.
In order to compare with each parameter index included in the target user representation, the background server first needs to obtain a transfer parameter included in the virtual resource transfer instruction. Optionally, the transfer parameter includes at least one of a resource transfer number, a resource transfer time, a live broadcast room identifier, a main broadcast identifier, and a live broadcast watching duration.
In addition, the transfer parameters may also include a live room type and a anchor type. For example, live-air room types include, but are not limited to, a singing live-air room, a gaming live-air room, a play fighting (PK) live-air room, an outdoor live-air room, and a dance live-air room; for example, anchor types include, but are not limited to, live platform headcasts, live platform newcasts, and anchors having a duration of play per day exceeding a specified threshold.
Correspondingly, the target user representation will also include a list of target live room types and a list of target anchor types corresponding to the live room type and the anchor type.
Step 303, obtaining parameter indexes corresponding to each transfer parameter from the target user portrait.
When the transfer parameter includes a live room identification, step 303 includes the following.
The background server acquires a target live broadcast room list from the target user portrait, the target live broadcast room list comprises at least one target live broadcast room identifier, and the target user account has a live broadcast room with historical virtual resource transfer behavior in the target live broadcast room.
In a possible implementation manner, the background server determines a live broadcast room with historical virtual resource transfer behavior as a target live broadcast room of a target user account, and arranges identifiers of the target live broadcast rooms to obtain a target live broadcast room list. The arrangement mode can be arranged according to the historical virtual resource transfer total amount of each target live broadcast room, the target live broadcast room with the highest historical virtual resource transfer total amount is arranged to the head, and the like; or the target live broadcast watching time lengths of the target live broadcast watching time lengths are arranged according to the historical live broadcast watching time lengths of the target live broadcast watching time lengths, the target live broadcast watching time length with the longest historical live broadcast watching time length is arranged to the top, and the like.
When the transfer parameter includes the anchor identification, step 303 includes the following.
The background server acquires a target anchor list from the target user portrait, the target anchor list comprises at least one target anchor identification, and historical virtual resource transfer behaviors exist in a live broadcast room corresponding to the target anchor by a target user account.
In a possible implementation manner, the background server determines the anchor with the historical virtual resource transfer behavior as a target anchor of a target user account, and arranges the identifiers of the target anchors to obtain a target anchor list, wherein the arrangement manner can be arranged according to the historical virtual resource transfer total amount of each target anchor, and the target anchor with the highest historical virtual resource transfer total amount is arranged to the head, and so on; or the target anchor with the longest historical live broadcast watching time length is arranged according to the historical live broadcast watching time length of each target anchor, and the like.
When the transfer parameter includes the resource transfer number, step 303 includes the following.
And the background server acquires a resource transfer quantity threshold value from the target user portrait, and the resource transfer quantity threshold value is determined according to the historical virtual resource transfer quantity corresponding to the historical virtual resource transfer behavior.
Optionally, if the historical virtual resource transfer quantity is measured in units of times, the resource transfer quantity threshold value obtained by the background server from the target user portrait is the maximum resource transfer quantity under a single virtual resource transfer behavior; if the historical virtual resource transfer quantity is measured according to other time units, the threshold value of the resource transfer quantity acquired by the background server from the target user portrait is the maximum resource transfer quantity in other time units, such as the maximum resource transfer quantity per day, the maximum resource transfer quantity per week and the like.
Optionally, the resource transfer quantity threshold includes a resource transfer quantity threshold of the target live broadcast room and a resource transfer quantity threshold of the target anchor.
When the transfer parameter includes a resource transfer time, step 303 includes the following.
And the background server acquires a historical resource transfer time period from the target user portrait, and the historical resource transfer time period is determined according to the time corresponding to the historical virtual resource transfer behavior.
In a possible implementation manner, the background server uses the concentrated time as the historical resource transfer period in the target user representation according to the time corresponding to the historical virtual resource transfer behavior, or determines the historical resource transfer period in the target user representation according to all the time corresponding to the historical virtual resource transfer behavior.
Optionally, the historical resource transfer period includes a historical resource transfer period of the target live broadcast room and a historical resource transfer period of the target anchor.
When the transition parameter comprises a live viewing duration, step 303 comprises the following.
And the background server acquires a live broadcast watching time length threshold value from the target user portrait, and the live broadcast watching time length threshold value is determined according to the live broadcast watching time length between the execution of the historical virtual resource transfer behaviors.
Optionally, the live viewing duration threshold includes a live viewing duration threshold of the target live broadcast room and a live viewing duration threshold of the target anchor.
In a possible implementation manner, the background server obtains historical virtual resource transfer behaviors of the target user account, and determines a live broadcast watching time length threshold of the target live broadcast room and a live broadcast watching time length threshold of the target anchor broadcast according to a live broadcast watching time length between execution of the historical virtual resource transfer behaviors. Optionally, the live viewing duration threshold may be an average viewing duration of all historical live viewing durations, or may be a maximum viewing duration of the historical live viewing durations.
And step 304, determining a risk coefficient corresponding to the virtual resource transfer instruction according to the at least one transfer parameter and the parameter index.
Correspondingly, when the transfer parameter includes a live-air identification, step 304 includes the following.
And in response to the fact that the live broadcast room identification does not belong to the target live broadcast room list, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a first risk coefficient.
In one example, the first risk factor is 1 if the live room identifier does not belong to the target live room list, and the first risk factor is 0 if the live room identifier belongs to the target live room list. And when the transfer parameter only contains the live broadcast room identifier, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a first risk coefficient 1.
Correspondingly, when the transfer parameter includes the anchor identification, step 304 includes the following.
And in response to the fact that the anchor identification does not belong to the target anchor list, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a second risk coefficient.
In one example, the second risk factor is 0.8 if the anchor identification does not belong to the target anchor list, and the first risk factor is 0 if the live room identification belongs to the target live room list. And when the transfer parameter only contains the anchor identification, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a second risk coefficient of 0.8.
Further, in the above example, when the transfer parameter includes a live broadcast room identifier in addition to the anchor broadcast identifier, the backend server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a sum of the first risk coefficient and the second risk coefficient, that is, the risk coefficient is 1.8.
Correspondingly, when the transfer parameter includes the resource transfer amount, step 304 includes the following.
And in response to the fact that the resource transfer quantity is larger than the resource transfer quantity threshold value, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a third risk coefficient.
In a possible implementation manner, the background server determines the third risk coefficient according to a ratio of the resource transfer quantity to the resource transfer quantity threshold value and the reference coefficient. Step 304 also includes the following.
The method comprises the steps that in response to the fact that the resource transfer quantity is larger than a resource transfer quantity threshold value, a background server determines the ratio of the resource transfer quantity to the resource transfer quantity threshold value.
And secondly, the background server determines a third risk coefficient according to the ratio and the reference coefficient, wherein the third risk coefficient and the ratio are in positive correlation.
And thirdly, the background server determines the third risk coefficient as a risk coefficient corresponding to the virtual resource transfer instruction.
In one example, the threshold of the resource transfer quantity is 50, the current resource transfer quantity is 200, and the reference coefficient is 0.6, then the ratio of the resource transfer quantity to the threshold of the resource transfer quantity is 4, and then the third risk coefficient is the product of the reference coefficient and the ratio, that is, the third risk coefficient is 2.4; if the resource transfer number is smaller than the resource transfer number threshold, the third risk coefficient is 0. And when the transfer parameters only contain the resource transfer quantity, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a third risk coefficient 2.4.
Further, in the above example, when the transfer parameter includes the resource transfer quantity in addition to the anchor identifier and the live broadcast room identifier, the backend server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a sum of the first risk coefficient, the second risk coefficient and the third risk coefficient, that is, the risk coefficient is 4.2.
Correspondingly, when the transfer parameter includes a resource transfer time, step 304 includes the following.
And in response to the fact that the resource transfer time does not belong to the historical resource transfer period, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a fourth risk coefficient.
In one possible embodiment, the closer the resource transfer time is to the historical resource transfer period, the smaller the fourth risk factor.
In one example, if the resource transfer time does not belong to the historical resource transfer period, then the fourth risk factor is 1.5; the resource transfer time belongs to the historical resource transfer period, and the fourth risk coefficient is 0. And when the transfer parameter only contains the resource transfer time, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a fourth risk coefficient 1.5.
Further, in the above example, when the transfer parameter includes the resource transfer time in addition to the anchor identifier, the live broadcast identifier, and the resource transfer quantity, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is the sum of the first risk coefficient, the second risk coefficient, the third risk coefficient, and the fourth risk coefficient, that is, the risk coefficient is 5.7.
Correspondingly, when the transition parameter comprises a live viewing duration, step 304 comprises the following.
And in response to the fact that the live broadcast watching time length is smaller than the live broadcast watching time length threshold value, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a fifth risk coefficient.
In a possible implementation manner, when the live viewing duration is smaller than the live viewing duration threshold, if the live viewing duration is closer to the live viewing duration threshold, the fifth risk coefficient is smaller.
In one example, the fifth risk factor is 0.8 if the live viewing duration is less than the live viewing duration threshold, and the fifth risk factor is 0 if the live viewing duration is not less than the live viewing duration threshold. And when the transfer parameter only contains the live broadcast watching duration, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is 0.8.
Further, in the above example, when the transfer parameter includes a live viewing duration in addition to the anchor identifier, the live room identifier, the resource transfer amount, and the resource transfer time, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a sum of the first risk coefficient, the second risk coefficient, the third risk coefficient, the fourth risk coefficient, and the fifth risk coefficient, that is, the risk coefficient is 6.5.
And step 305, responding to the fact that the risk coefficient is larger than the risk coefficient threshold value, and recording the transfer times of the risk resources.
In the actual live broadcast watching process of a user, the psychographic anchor broadcast or the live broadcast room can be rewarded for many times under most conditions, namely, the virtual resource transfer behavior is performed for many times. Therefore, the background server can also determine whether to carry out risk prompting, resource transfer verification, resource transfer freezing and the like on the virtual resource transfer behavior according to the virtual resource transfer behavior for a plurality of times.
In a possible implementation mode, the background server is provided with a risk coefficient threshold value, and when the risk coefficient is lower than the risk coefficient threshold value, response modes such as risk prompt and the like are not carried out; and when the risk coefficient is larger than the risk coefficient threshold value, the background server records the transfer times of the risk resources.
And step 306, in response to the fact that the transfer times of the risk resources are larger than the time threshold, the background server determines a target response mode corresponding to the risk coefficient threshold.
Wherein different risk coefficient thresholds correspond to different response modes. In the embodiment of the present application, the response mode including risk prompt, resource transfer verification, and resource transfer freezing is described as an example.
Optionally, step 306 includes the following one to three.
The method comprises the steps that firstly, in response to the fact that the transfer times of the risk resources are larger than a first time threshold value, and the risk coefficient threshold value is a first risk coefficient threshold value, a background server determines a risk prompt as a target response mode.
Wherein the risk prompt is used for indicating that the current virtual resource transfer behavior may have a risk to the terminal.
And secondly, in response to the fact that the transfer times of the risk resources are larger than a second risk coefficient threshold value, and the risk coefficient threshold value is the second risk coefficient threshold value, the background server determines the resource transfer verification as a target response mode, wherein the resource transfer verification comprises at least one of short message verification, biological characteristic verification or password verification.
The resource transfer verification is used for indicating that the current virtual resource transfer behavior is large and risks possibly exist to the terminal, and in order to further have opportunities for avoiding the risks, the background server avoids the risks by adopting a resource transfer verification mode, so that the virtual resource transfer can be continuously carried out through the target user account subjected to the resource transfer verification.
Taking a short message verification mode as an example, in a possible implementation mode, the background server sends a digital verification code to the terminal, and when the digital verification code is correctly filled in the current live broadcast interface by the target user account, the verification is passed.
And thirdly, in response to the fact that the transfer times of the risk resources are larger than a third risk coefficient threshold value, and the risk coefficient threshold value is the third risk coefficient threshold value, the background server determines the resource transfer freezing as a target response mode.
The resource transfer freezing is used for indicating that the current virtual resource transfer behavior risk is large and large amount of fund circulation of a target user account is involved to the terminal. Optionally, the resource transfer freezing includes blocking all resource transfers of the target user account on the same day, and continuing the resource transfers only after the target user account is defrosted by customer service, or transferring resources every other day, and the like.
It should be noted that the third risk coefficient threshold is greater than the second risk coefficient threshold, and the second risk coefficient threshold is greater than the first risk coefficient threshold.
Step 307, responding to the virtual resource transfer instruction in a target response manner.
And finally, the background server determines a target response mode according to the risk resource transfer times and the corresponding time threshold value, and responds to the virtual resource transfer instruction through the target response mode.
On the basis of the above embodiment, the process of determining the risk coefficient corresponding to the virtual resource transfer instruction is elaborated in detail in the embodiment of the application, the risk coefficient corresponding to each transfer parameter is obtained by comparing the transfer parameter included in the virtual resource transfer instruction with the parameter index corresponding to each transfer parameter in the target user portrait, and finally the risk coefficient corresponding to the virtual resource transfer instruction is determined; the transfer parameters comprise information related to virtual resource transfer behaviors, so that the background server can determine risk coefficients from the perspective of more parameters; in addition, parameter indexes corresponding to various transfer parameters in the target user portrait are generated according to historical watching behaviors and historical virtual resource transfer behaviors, so that the behavior characteristics of the user account can be well embodied, and powerful guarantee is provided for calculation of the risk coefficient.
In the embodiment of the application, the process of responding to the virtual resource transfer instruction according to the risk coefficient is further elaborated, wherein the background server determines a target response mode according to the risk resource transfer times and the corresponding time threshold value, and responds to the virtual resource transfer instruction through the target response mode; the background server can appropriately respond to the target user account logged in by the terminal by combining with the actual virtual resource transfer condition.
Referring to fig. 4, a block diagram of a risk determination apparatus for virtual resource transfer according to an exemplary embodiment of the present application is shown, where the apparatus includes:
the instruction receiving module 401 is configured to receive a virtual resource transfer instruction of a target user account, where the virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in a live broadcast room, and the virtual resource transfer behavior includes at least one of a donation of a virtual gift, a donation of a virtual item, and a donation of virtual money;
a risk determining module 402, configured to determine a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account, where the target user portrait is generated according to a historical viewing behavior and a historical virtual resource transfer behavior corresponding to the target user account, and the risk coefficient is used to represent a risk degree of the virtual resource transfer behavior;
the instruction response module 403 is configured to respond to the virtual resource transfer instruction according to the risk coefficients, where different response manners correspond to different risk coefficients.
Optionally, the risk determining module 402 includes:
a parameter determining unit, configured to obtain a transfer parameter included in the virtual resource transfer instruction, where the transfer parameter includes at least one of the resource transfer number, the resource transfer time, a live broadcast room identifier, a anchor identifier, and a live broadcast viewing duration;
the index acquisition unit is used for acquiring parameter indexes corresponding to various transfer parameters from the target user portrait;
and the risk determining unit is used for determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one transfer parameter and the parameter index.
Optionally, the transfer parameter includes the live broadcast room identifier;
optionally, the index obtaining unit includes:
a first obtaining subunit, configured to obtain a target live broadcast room list from the target user representation, where the target live broadcast room list includes an identifier of at least one target live broadcast room, and a live broadcast room in which the historical virtual resource transfer behavior exists in the target live broadcast room for the target user account;
optionally, the risk determining unit includes:
and the first determining subunit is configured to determine, in response to that the live broadcast room identifier does not belong to the target live broadcast room list, that the risk coefficient corresponding to the virtual resource transfer instruction is a first risk coefficient.
Optionally, the transfer parameter includes the anchor identifier;
optionally, the index obtaining unit includes:
a second obtaining subunit, configured to obtain a target anchor list from the target user representation, where the target anchor list includes an identifier of at least one target anchor, and the target user account has the historical virtual resource transfer behavior in a live broadcast room corresponding to the target anchor;
optionally, the risk determining unit includes:
and the second determining subunit is configured to determine, in response to that the anchor identifier does not belong to the target anchor list, that the risk coefficient corresponding to the virtual resource transfer instruction is a second risk coefficient.
Optionally, the transfer parameter includes the resource transfer number;
optionally, the index obtaining unit includes:
a third obtaining subunit, configured to obtain a resource transfer quantity threshold from the target user image, where the resource transfer quantity threshold is determined according to a historical virtual resource transfer quantity corresponding to the historical virtual resource transfer behavior;
optionally, the risk determining unit includes:
a third determining subunit, configured to determine, in response to that the resource transfer number is greater than the resource transfer number threshold, that the risk coefficient corresponding to the virtual resource transfer instruction is a third risk coefficient.
Optionally, the third determining subunit is further configured to:
in response to the number of resource transfers being greater than the threshold number of resource transfers, determining a ratio of the number of resource transfers to the threshold number of resource transfers;
determining the third risk coefficient according to the ratio and a reference coefficient, wherein the third risk coefficient and the ratio have positive correlation;
and determining the third risk coefficient as the risk coefficient corresponding to the virtual resource transfer instruction.
Optionally, the transfer parameter includes the resource transfer time;
optionally, the index obtaining unit includes:
a fourth obtaining subunit, configured to obtain a historical resource transfer time period from the target user representation, where the historical resource transfer time period is determined according to a time corresponding to the historical virtual resource transfer behavior;
optionally, the risk determining unit includes:
a fourth determining subunit, configured to determine, in response to that the resource transfer time does not belong to the historical resource transfer period, that the risk coefficient corresponding to the virtual resource transfer instruction is a fourth risk coefficient.
Optionally, the transfer parameter includes the live viewing duration;
optionally, the index obtaining unit includes:
a fifth obtaining subunit, configured to obtain a live viewing duration threshold from the target user representation, where the live viewing duration threshold is determined according to a live viewing duration between execution of the historical virtual resource transfer behavior;
optionally, the risk determining unit includes:
a fifth determining subunit, configured to determine, in response to that the live viewing duration is smaller than the live viewing duration threshold, that the risk coefficient corresponding to the virtual resource transfer instruction is a fifth risk coefficient.
Optionally, the instruction response module 403 includes:
the first response unit is used for responding to the fact that the risk coefficient is larger than a risk coefficient threshold value and recording the transfer times of the risk resources;
a second response unit, configured to determine, in response to that the number of times of transferring the risk resource is greater than a number threshold, a target response mode corresponding to the risk coefficient threshold, where different response modes corresponding to different risk coefficient thresholds are determined;
and the third response unit is used for responding to the virtual resource transfer instruction in the target response mode.
Optionally, the second response unit includes:
a first response subunit, configured to determine a risk prompt as the target response mode in response to that the number of times of transferring the risk resource is greater than a first time threshold, and that the risk coefficient threshold is a first risk coefficient threshold;
the second response subunit is configured to determine, in response to that the risk resource transfer frequency is greater than a second frequency threshold and that the risk coefficient threshold is a second risk coefficient threshold, a resource transfer verification as the target response mode, where the resource transfer verification includes at least one of short message verification, biometric verification, or password verification;
a third response subunit, configured to determine, in response to that the risk resource transfer frequency is greater than a third frequency threshold and the risk coefficient threshold is a third risk coefficient threshold, a resource transfer freeze as the target response mode;
wherein the third risk coefficient threshold is greater than the second risk coefficient threshold, which is greater than the first risk coefficient threshold.
In the embodiment of the application, in a live broadcast scene, after receiving a virtual resource transfer instruction of a target user account, a background server does not directly respond to transfer of virtual resources, but determines a risk coefficient corresponding to the virtual resource transfer instruction according to a target user figure corresponding to the target user account, further characterizes the risk degree of virtual resource transfer behavior according to the risk coefficient, and makes different response modes for the virtual resource transfer instruction according to different risk coefficients; compared with the virtual resource transfer method in the related art, the risk determining method for virtual resource transfer can calculate the risk coefficient before the virtual resource transfer, and further determine different response modes according to different risk coefficients so as to improve the safety of the virtual resource transfer process and maintain the fund safety of the target user account.
Referring to fig. 5, a schematic structural diagram of a server 500 according to an embodiment of the present application is shown. The server 500 may be used to implement the risk determination method for virtual resource transfer provided in the above-described embodiments. The server 500 may be the server 200 described in the embodiment of fig. 1. Specifically, the method comprises the following steps:
the server 500 includes a Central Processing Unit (CPU)501, a system memory 504 including a Random Access Memory (RAM)502 and a Read Only Memory (ROM)503, and a system bus 505 connecting the system memory 504 and the central processing unit 501. The server 500 also includes a basic input/output system (I/O system) 506, which facilitates information transfer between devices within the computer, and a mass storage device 507, which stores an operating system 513, application programs 514, and other program modules 515.
The basic input/output system 506 comprises a display 508 for displaying information and an input device 509, such as a mouse, keyboard, etc., for user input of information. Wherein the display 508 and the input device 509 are connected to the central processing unit 501 through an input output controller 510 connected to the system bus 505. The basic input/output system 506 may also include an input/output controller 510 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 510 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 507 is connected to the central processing unit 501 through a mass storage controller (not shown) connected to the system bus 505. The mass storage device 507 and its associated computer-readable media provide non-volatile storage for the server 500. That is, the mass storage device 507 may include a computer-readable medium (not shown) such as a hard disk or CD-ROM drive.
Without loss of generality, the computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, DVD, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that the computer storage media is not limited to the foregoing. The system memory 504 and mass storage device 507 described above may be collectively referred to as memory.
The server 500 may also operate as a remote computer connected to a network via a network, such as the internet, according to various embodiments of the present application. That is, the server 500 may be connected to the network 512 through the network interface unit 511 connected to the system bus 505, or may be connected to other types of networks or remote computer systems (not shown) using the network interface unit 511.
The memory also includes one or more programs stored in the memory and configured to be executed by one or more processors. The one or more programs include instructions for implementing the server-side risk determination method for virtual resource transfer.
The memory has stored therein at least one instruction configured to be executed by one or more processors to implement the functions of the various steps in the above-described method of risk determination of virtual resource transfer.
The embodiments of the present application further provide a computer-readable storage medium, where at least one instruction is stored in the storage medium, and the at least one instruction is loaded and executed by a processor to implement the risk determination method for virtual resource transfer provided in the above embodiments.
Optionally, the computer-readable storage medium may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a Solid State Drive (SSD), or an optical disc. The Random Access Memory may include a resistive Random Access Memory (ReRAM) and a Dynamic Random Access Memory (DRAM).
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (13)

1. A method for risk determination of virtual resource transfer, the method comprising:
receiving a virtual resource transfer instruction of a target user account, wherein the virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in a live broadcast room, and the virtual resource transfer behavior comprises at least one of giving a virtual gift, giving a virtual item and giving a virtual currency;
determining a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account, wherein the target user portrait is generated according to a historical viewing behavior and a historical virtual resource transfer behavior corresponding to the target user account, and the risk coefficient is used for representing the risk degree of the virtual resource transfer behavior;
and responding the virtual resource transfer instruction according to the risk coefficients, wherein different response modes correspond to different risk coefficients.
2. The method of claim 1, wherein determining a risk factor corresponding to the virtual resource transfer instruction according to the target user representation corresponding to the target user account comprises:
acquiring transfer parameters contained in the virtual resource transfer instruction, wherein the transfer parameters comprise at least one of the resource transfer quantity, the resource transfer time, a live broadcast room identifier, a main broadcast identifier and live broadcast watching time length;
acquiring parameter indexes corresponding to various transfer parameters from the target user portrait;
and determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one transfer parameter and the parameter index.
3. The method of claim 2, wherein the transfer parameter comprises the live-air identification;
the obtaining of the parameter indexes corresponding to the transfer parameters from the target user portrait includes:
acquiring a target live broadcast room list from the target user portrait, wherein the target live broadcast room list comprises at least one target live broadcast room identifier, and the target user account has a live broadcast room with the historical virtual resource transfer behavior in the target live broadcast room;
the determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one of the transfer parameter and the parameter index includes:
and determining that the risk coefficient corresponding to the virtual resource transfer instruction is a first risk coefficient in response to the live broadcast room identifier not belonging to the target live broadcast room list.
4. The method of claim 2, wherein the transfer parameter comprises the anchor identification;
the obtaining of the parameter indexes corresponding to the transfer parameters from the target user portrait includes:
acquiring a target anchor list from the target user portrait, wherein the target anchor list comprises at least one target anchor identifier, and the historical virtual resource transfer behavior of the target user account exists in a live broadcast room corresponding to the target anchor;
the determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one of the transfer parameter and the parameter index includes:
and determining that the risk coefficient corresponding to the virtual resource transfer instruction is a second risk coefficient in response to the anchor identifier not belonging to the target anchor list.
5. The method of claim 2, wherein the transfer parameter comprises the number of resource transfers;
the obtaining of the parameter indexes corresponding to the transfer parameters from the target user portrait includes:
acquiring a resource transfer quantity threshold value from the target user image, wherein the resource transfer quantity threshold value is determined according to the historical virtual resource transfer quantity corresponding to the historical virtual resource transfer behavior;
the determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one of the transfer parameter and the parameter index includes:
and determining that the risk coefficient corresponding to the virtual resource transfer instruction is a third risk coefficient in response to the resource transfer quantity being greater than the resource transfer quantity threshold.
6. The method of claim 5, wherein the determining that the risk factor corresponding to the virtual resource transfer instruction is a third risk factor in response to the number of resource transfers being greater than the threshold number of resource transfers comprises:
in response to the number of resource transfers being greater than the threshold number of resource transfers, determining a ratio of the number of resource transfers to the threshold number of resource transfers;
determining the third risk coefficient according to the ratio and a reference coefficient, wherein the third risk coefficient and the ratio have positive correlation;
and determining the third risk coefficient as the risk coefficient corresponding to the virtual resource transfer instruction.
7. The method of claim 2, wherein the transfer parameter comprises the resource transfer time;
the obtaining of the parameter indexes corresponding to the transfer parameters from the target user portrait includes:
acquiring a historical resource transfer time period from the target user portrait, wherein the historical resource transfer time period is determined according to the time corresponding to the historical virtual resource transfer behavior;
the determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one of the transfer parameter and the parameter index includes:
and in response to the fact that the resource transfer time does not belong to the historical resource transfer period, determining that the risk coefficient corresponding to the virtual resource transfer instruction is a fourth risk coefficient.
8. The method of claim 2, wherein the transition parameter comprises the live viewing duration;
the obtaining of the parameter indexes corresponding to the transfer parameters from the target user portrait includes:
acquiring a live watching time length threshold from the target user portrait, wherein the live watching time length threshold is determined according to the live watching time length between execution of the historical virtual resource transfer behaviors;
the determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one of the transfer parameter and the parameter index includes:
and in response to the live watching duration being smaller than the live watching duration threshold, determining that the risk coefficient corresponding to the virtual resource transfer instruction is a fifth risk coefficient.
9. The method of any one of claims 1 to 8, wherein said responding to said virtual resource transfer instruction according to said risk factor comprises:
recording the transfer times of the risk resources in response to the risk coefficient being greater than a risk coefficient threshold;
in response to the fact that the transfer times of the risk resources are larger than a time threshold, determining target response modes corresponding to the risk coefficient threshold, wherein the different response modes correspond to different risk coefficient thresholds;
and responding to the virtual resource transfer instruction in the target response mode.
10. The method of claim 9, wherein the determining the target response mode corresponding to the risk factor threshold in response to the number of times the risk resource is transferred being greater than a number threshold comprises:
determining a risk prompt as the target response mode in response to the fact that the transfer times of the risk resources are larger than a first time threshold value and the risk coefficient threshold value is a first risk coefficient threshold value;
in response to the fact that the risk resource transfer times are larger than a second time threshold value and the risk coefficient threshold value is a second risk coefficient threshold value, determining resource transfer verification as the target response mode, wherein the resource transfer verification comprises at least one of short message verification, biological feature verification or password verification;
in response to the fact that the risk resource transfer times are larger than a third time threshold value and the risk coefficient threshold value is a third risk coefficient threshold value, determining resource transfer freezing as the target response mode;
wherein the third risk coefficient threshold is greater than the second risk coefficient threshold, which is greater than the first risk coefficient threshold.
11. A risk determination apparatus for virtual resource transfer, the apparatus comprising:
the instruction receiving module is used for receiving a virtual resource transfer instruction of a target user account, the virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in a live broadcast room, and the virtual resource transfer behavior comprises at least one of giving a virtual gift, giving a virtual prop and giving a virtual currency;
a risk determination module, configured to determine a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account, where the target user portrait is generated according to a historical viewing behavior and a historical virtual resource transfer behavior corresponding to the target user account, and the risk coefficient is used to represent a risk degree of the virtual resource transfer behavior;
and the instruction response module is used for responding the virtual resource transfer instruction according to the risk coefficients, wherein different response modes correspond to different risk coefficients.
12. A server, characterized in that it comprises a processor and a memory in which a computer program is stored, which computer program is loaded and executed by the processor to implement the risk determination method of virtual resource transfer according to any of the preceding claims 1 to 10.
13. A computer-readable storage medium, in which a computer program is stored, which is loaded and executed by a processor to implement the risk determination method for virtual resource transfer according to any one of claims 1 to 10.
CN202010231116.1A 2020-03-27 2020-03-27 Virtual resource transfer risk determination method, device, server and storage medium Active CN111432227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010231116.1A CN111432227B (en) 2020-03-27 2020-03-27 Virtual resource transfer risk determination method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010231116.1A CN111432227B (en) 2020-03-27 2020-03-27 Virtual resource transfer risk determination method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN111432227A true CN111432227A (en) 2020-07-17
CN111432227B CN111432227B (en) 2021-12-03

Family

ID=71551654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010231116.1A Active CN111432227B (en) 2020-03-27 2020-03-27 Virtual resource transfer risk determination method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN111432227B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112506387A (en) * 2020-11-30 2021-03-16 北京达佳互联信息技术有限公司 Virtual resource allocation display method, device and storage medium
CN113766256A (en) * 2021-02-09 2021-12-07 北京沃东天骏信息技术有限公司 Live broadcast wind control method and device
CN114339320A (en) * 2021-12-10 2022-04-12 北京达佳互联信息技术有限公司 Virtual resource processing method, device, equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US20110321127A1 (en) * 2001-01-19 2011-12-29 C-Sam, Inc. Transactional services
CN105005931A (en) * 2014-04-24 2015-10-28 中国银联股份有限公司 Method and device for controlling risk of transfer transaction
CN105160522A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Virtual resource transfer method, related device and system
CN108492104A (en) * 2018-02-12 2018-09-04 阿里巴巴集团控股有限公司 A kind of resource transfer monitoring method and device
WO2018162244A1 (en) * 2017-03-10 2018-09-13 Thomson Licensing Method for controlling a device and corresponding device, electronic assembly, system, computer readable program product and computer readable storage medium
CN108574776A (en) * 2018-03-26 2018-09-25 努比亚技术有限公司 A kind of terminal management method, mobile terminal and computer readable storage medium
CN108596580A (en) * 2018-03-27 2018-09-28 腾讯科技(深圳)有限公司 a kind of virtual resource transfer method, device, terminal and storage medium
CN108830584A (en) * 2018-06-14 2018-11-16 腾讯科技(深圳)有限公司 Message prompt method, device, server and storage medium
US20190005585A1 (en) * 2015-12-23 2019-01-03 Swiss Reinsurance Company Ltd. Automated, reactive flight-delay risk-transfer system and method thereof
CN110852870A (en) * 2019-11-01 2020-02-28 腾讯科技(深圳)有限公司 Virtual resource transfer method, device, equipment and readable storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US20110321127A1 (en) * 2001-01-19 2011-12-29 C-Sam, Inc. Transactional services
US20160110717A1 (en) * 2005-10-06 2016-04-21 Mastercard Mobile Transactions Solutions, Inc. Securing an electronic transaction via a three-dimensional electronic transaction authentication protocol
CN105005931A (en) * 2014-04-24 2015-10-28 中国银联股份有限公司 Method and device for controlling risk of transfer transaction
CN105160522A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Virtual resource transfer method, related device and system
US20190005585A1 (en) * 2015-12-23 2019-01-03 Swiss Reinsurance Company Ltd. Automated, reactive flight-delay risk-transfer system and method thereof
WO2018162244A1 (en) * 2017-03-10 2018-09-13 Thomson Licensing Method for controlling a device and corresponding device, electronic assembly, system, computer readable program product and computer readable storage medium
CN108492104A (en) * 2018-02-12 2018-09-04 阿里巴巴集团控股有限公司 A kind of resource transfer monitoring method and device
CN108574776A (en) * 2018-03-26 2018-09-25 努比亚技术有限公司 A kind of terminal management method, mobile terminal and computer readable storage medium
CN108596580A (en) * 2018-03-27 2018-09-28 腾讯科技(深圳)有限公司 a kind of virtual resource transfer method, device, terminal and storage medium
CN108830584A (en) * 2018-06-14 2018-11-16 腾讯科技(深圳)有限公司 Message prompt method, device, server and storage medium
CN110852870A (en) * 2019-11-01 2020-02-28 腾讯科技(深圳)有限公司 Virtual resource transfer method, device, equipment and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
文慧: ""论未成年人的网络直播打赏行为 "", 《西部学刊》 *
王梦雪: ""直播"打赏"中的法律风险"", 《学习时报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112506387A (en) * 2020-11-30 2021-03-16 北京达佳互联信息技术有限公司 Virtual resource allocation display method, device and storage medium
CN113766256A (en) * 2021-02-09 2021-12-07 北京沃东天骏信息技术有限公司 Live broadcast wind control method and device
CN114339320A (en) * 2021-12-10 2022-04-12 北京达佳互联信息技术有限公司 Virtual resource processing method, device, equipment and storage medium
CN114339320B (en) * 2021-12-10 2023-12-12 北京达佳互联信息技术有限公司 Virtual resource processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111432227B (en) 2021-12-03

Similar Documents

Publication Publication Date Title
CN111432227B (en) Virtual resource transfer risk determination method, device, server and storage medium
CN111866541B (en) Live broadcast recommendation method and device, server and storage medium
JP5335969B1 (en) Server device providing game
CN110830735B (en) Video generation method and device, computer equipment and storage medium
CN111737012B (en) Data packet synchronization method, device, equipment and storage medium
US11426665B2 (en) Method, apparatus, computer program and recording medium for providing game service
WO2014194695A1 (en) Method and server for pvp team matching in computer games
CN112822560B (en) Virtual gift giving method, system, computer device and storage medium
CN107634850B (en) A kind of application state acquisition methods and its equipment, storage medium, server
US20210136432A1 (en) Method for recharging live streaming account, terminal, and storage medium
CN112915548A (en) Data processing method, device and equipment of multimedia playing platform and storage medium
US9061208B2 (en) Video game system
CN112734498A (en) Task reward acquisition method, device, terminal and storage medium
CN109151600B (en) Special effect missing compensation method and device, server and storage medium
CN107281754B (en) A kind of application identities matching process and its equipment, storage medium, server
CN104239519B (en) A kind of information recommendation method and relevant device, system
CN111359220B (en) Game advertisement generation method and device and computer equipment
JP6005022B2 (en) Server device providing game
CN113262494A (en) Task processing method and device in game and electronic equipment
CN115712571A (en) Interactive service test device, interactive service test device, computer equipment and storage medium
CN111589118B (en) User interface display method, device, equipment and storage medium
CN108364228A (en) A kind of business data processing method and its equipment
US20130225266A1 (en) Providing token-based access to application features
CN114344918A (en) Data recording method, device, equipment, medium and product based on virtual scene
CN109561050A (en) A kind of method and apparatus identifying batch account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant