CN113723759B - Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree - Google Patents
Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree Download PDFInfo
- Publication number
- CN113723759B CN113723759B CN202110875634.1A CN202110875634A CN113723759B CN 113723759 B CN113723759 B CN 113723759B CN 202110875634 A CN202110875634 A CN 202110875634A CN 113723759 B CN113723759 B CN 113723759B
- Authority
- CN
- China
- Prior art keywords
- equipment
- risk
- intention
- interval
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000006399 behavior Effects 0.000 claims description 24
- 238000004891 communication Methods 0.000 claims description 10
- 238000013468 resource allocation Methods 0.000 claims description 6
- 208000033999 Device damage Diseases 0.000 claims description 4
- 239000000758 substrate Substances 0.000 claims 1
- 238000012545 processing Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 9
- 230000000694 effects Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000010801 machine learning Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000002787 reinforcement Effects 0.000 description 2
- 239000000126 substance Substances 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Game Theory and Decision Science (AREA)
- Software Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Artificial Intelligence (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method and a device for providing Internet service for equipment based on equipment intention degree and equipment risk degree, wherein the method comprises the following steps: determining a target equipment risk level according to the equipment risk information and the trained risk model; determining the target equipment intention level according to the equipment intention information and the trained intention model; providing the authentication condition of the Internet service for the target equipment according to the risk level and the intention level of the target equipment; and when the target equipment accepts the authentication condition, providing the Internet service for the target equipment. The authentication condition of the invention considers the risk of the equipment on the Internet service and the willingness level of the equipment to acquire the Internet service, can furthest promote the equipment to acquire the Internet service while controlling the risk, achieves the purpose of finely operating various equipment users, and improves the operation efficiency.
Description
Technical Field
The present invention relates to the field of computer information processing technology, and in particular, to a method, an apparatus, an electronic device, and a computer readable medium for providing an internet service for a device based on a device intention degree and a device risk degree.
Background
With the development of the internet, various internet service platforms have emerged. Such as: an online shopping platform, an online about car platform, a sharing platform, a map, music and the like. These platforms bring great convenience to people's life, but because they are tightly combined with the internet, devices may damage the internet service platform when enjoying these internet services, for example: fraud, trust loss, etc.
In order to reduce the possible damage to the internet platform, risk assessment is usually performed on the device applying for internet services in advance, so as to formulate corresponding authentication conditions. In the establishment of authentication conditions, the equipment is usually given different authentication conditions based on risk dimensions so as to achieve the purpose of controlling risks. The method only considers the equipment risk, but does not consider the willingness level of the equipment to acquire the Internet service, and has the problems of single dimension and incapability of refinement.
Disclosure of Invention
Accordingly, the present invention is directed to a method, apparatus, electronic device, and computer readable medium for providing internet service to a device based on device intent and device risk, so as to at least partially solve at least one of the above problems.
In order to solve the above technical problem, a first aspect of the present invention provides a method for providing an internet service for a device based on a device intention degree and a device risk degree, wherein the device intention degree refers to a willingness level of the device to obtain the internet service, and the device risk degree refers to a possibility that the device damages an internet service platform when enjoying the internet service, and the method includes:
Determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the Internet service platform behavior being damaged by the equipment; the device risk information is device information related to a risk behavior of the device;
determining an intention level of the target equipment according to the equipment intention information and a trained intention model, wherein the intention model is used for acquiring the intention degree of the internet service by the computing equipment; the device intention information is device information related to the intention of the device to acquire the internet service;
providing the authentication condition of the Internet service for the target equipment according to the risk level and the intention level of the target equipment;
and when the target equipment accepts the authentication condition, providing the Internet service for the target equipment.
According to a preferred embodiment of the present invention, the providing the authentication condition of the internet service for the target device according to the risk level and the intention level of the target device includes:
Determining a first target interval from a first preset interval according to the risk level; the probability corresponding to the risk level is larger, and the minimum value and the maximum value of the corresponding first target interval are larger;
Determining a second target interval from a second preset interval according to the intention hierarchy; the larger the intention degree corresponding to the intention level is, the larger the minimum value and the maximum value of the corresponding second target interval are;
and determining a target interval as the authentication condition according to the first target interval and the second target interval.
According to a preferred embodiment of the present invention, the providing the authentication condition of the internet service for the target device according to the risk level and the intention level of the target device includes:
The authentication condition is calculated by the following formula:
X=A×a+B×b;
wherein X is a numerical interval corresponding to the authentication condition, a is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
According to a preferred embodiment of the invention, the method further comprises: and rejecting the target equipment to apply for providing the Internet service when the risk model calculates that the probability of damaging the Internet service platform behavior of the target equipment is larger than a threshold value.
According to a preferred embodiment of the present invention, the device risk information includes: device-related information and device risk-related information; wherein the device-related information includes: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: at least one of an application of the equipment through internet service, equipment resource allocation limit, number of days of equipment overdue return resources, number of times of equipment overdue return resources and whether the equipment has fraud records.
To solve the above-mentioned technical problem, a second aspect of the present invention provides an apparatus for providing an internet service to a device based on a device intention degree and a device risk degree, wherein the device intention degree refers to a willingness level of the device to obtain the internet service, and the device risk degree refers to a possibility that the device damages an internet service platform when enjoying the internet service, the apparatus includes:
The first determining module is used for determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the Internet service platform behavior being damaged by the equipment; the device risk information is device information related to a risk behavior of the device;
The second determining module is used for determining the intention level of the target equipment according to the equipment intention information and the trained intention model, and the intention model is used for acquiring the intention degree of the internet service by the computing equipment; the device intention information is device information related to the intention of the device to acquire the internet service;
The first providing module is used for providing the authentication condition of the internet service for the target equipment according to the risk level and the intention level of the target equipment;
And the second providing module is used for providing the internet service for the target equipment when the target equipment accepts the authentication condition.
According to a preferred embodiment of the present invention, the first providing module includes:
The first sub-determining module is used for determining a first target interval from a first preset interval according to the risk level; the probability corresponding to the risk level is larger, and the minimum value and the maximum value of the corresponding first target interval are larger;
The second sub-determining module is used for determining a second target interval from a second preset interval according to the intention level; the larger the intention degree corresponding to the intention level is, the larger the minimum value and the maximum value of the corresponding second target interval are;
And the third sub-determining module is used for determining a target interval as the authentication condition according to the first target interval and the second target interval.
According to a preferred embodiment of the present invention, the first providing module calculates the authentication condition by the following formula:
X=A×a+B×b;
wherein X is a numerical interval corresponding to the authentication condition, a is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
According to a preferred embodiment of the invention, the device further comprises: and the rejecting module is used for rejecting the request of the target equipment for providing the Internet service when the risk model calculates that the probability of damaging the Internet service platform behavior of the target equipment is larger than a threshold value.
According to a preferred embodiment of the present invention, the device risk information includes: device-related information and device risk-related information; wherein the device-related information includes: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: at least one of an application of the equipment through internet service, equipment resource allocation limit, number of days of equipment overdue return resources, number of times of equipment overdue return resources and whether the equipment has fraud records.
To solve the above technical problem, a third aspect of the present invention provides an electronic device, including:
a processor; and
A memory storing computer executable instructions that, when executed, cause the processor to perform the method described above.
To solve the above technical problem, a fourth aspect of the present invention provides a computer-readable storage medium storing one or more programs, which when executed by a processor, implement the above method.
According to the method and the device, the risk level of the target device is determined according to the risk model, the intention level of the target device is determined according to the intention model, and the authentication conditions of the Internet service are provided for the target device by integrating the risk level and the intention level of the target device, so that the requirements of multidimensional and refined operation are met.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects achieved more clear, specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted, however, that the drawings described below are merely illustrative of exemplary embodiments of the present invention and that other embodiments of the drawings may be derived from these drawings by those skilled in the art without undue effort.
Fig. 1 is a schematic flow chart of a method for providing internet service for a device based on device intent and device risk according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of determining a target device risk level and an intent level in accordance with an embodiment of the present invention;
FIG. 3 is a schematic diagram of a structural framework for providing an Internet service device for a device based on device intent and device risk according to an embodiment of the present invention;
FIG. 4 is a block diagram of an exemplary embodiment of an electronic device in accordance with the present invention;
FIG. 5 is a schematic diagram of one embodiment of a computer readable medium of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown, although the exemplary embodiments may be practiced in various specific ways. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, capabilities, effects, or other features described in a particular embodiment may be incorporated in one or more other embodiments in any suitable manner without departing from the spirit of the present invention.
In describing particular embodiments, specific details of construction, performance, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by those skilled in the art. It is not excluded that one skilled in the art may implement the present invention in a particular case in a solution that does not include the structures, properties, effects, or other characteristics described above.
The flow diagrams in the figures are merely exemplary flow illustrations and do not represent that all of the elements, operations, and steps in the flow diagrams must be included in the aspects of the present invention, nor that the steps must be performed in the order shown in the figures. For example, some operations/steps in the flowcharts may be decomposed, some operations/steps may be combined or partially combined, etc., and the order of execution shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The same reference numerals in the drawings denote the same or similar elements, components or portions, and thus repeated descriptions of the same or similar elements, components or portions may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various devices, elements, components or portions, these devices, elements, components or portions should not be limited by these terms. That is, these phrases are merely intended to distinguish one from the other. For example, a first device may also be referred to as a second device without departing from the spirit of the invention. Furthermore, the term "and/or," "and/or" is meant to include all combinations of any one or more of the items listed.
In the invention, the device intention degree refers to the intention level of the device for acquiring the Internet service; illustratively, the device intent may be obtained through a trained intent model. The equipment risk degree refers to the possibility that the equipment damages an internet service platform when enjoying the internet service; illustratively, the device risk level may be obtained by a trained risk model. The internet service may be any service provided based on internet technology, such as: shopping, travel, payment, navigation, group purchase, sharing of items, social, online education, translation, paid member services, and the like provided based on internet technology
Referring to fig. 1, fig. 1 is a flow chart of a method for providing internet service for a device based on a device intent degree and a device risk degree, provided by the invention, as shown in fig. 1, the method includes:
S1, determining a target equipment risk level according to equipment risk information and a trained risk model;
The risk model is used for calculating the probability of the equipment damaging the behavior of the Internet service platform, and the equipment risk degree can be reflected through the probability calculated by the risk model.
The device risk information is device information related to a risk behavior of the device; wherein the device information may be any device related information, such as: the present invention is not particularly limited, and the device ID, device attribute information of the device model, etc., user information using the device, communication information of the device, shopping information of the device, location information of the device, etc. The risk behavior may be fraud, belief loss behavior, etc.
In one example, the device risk information may include: device-related information and device risk-related information; wherein the device-related information includes: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device user information may include: device user gender, device user age, device user academy, device location, etc.; the location of the device may be determined based on the longitude and latitude of the device. The device risk related information is related to internet services, such as: in an internet-based resource exchange service, the device risk related information includes: at least one of an application of the equipment through internet service, equipment resource allocation limit, number of days of equipment overdue return resources, number of times of equipment overdue return resources and whether the equipment has fraud records. The internet-based resource exchange service is a service for providing resource exchange to user equipment based on the internet. The resource refers to any substance, information, money, time, etc. that can be utilized. Information resources include computing resources and various types of data resources. The data resources include various dedicated data in various fields.
The risk model may be built by a machine learning algorithm based on historical device risk information. Among them, algorithms used in machine learning are generally classified into 3 categories: supervised learning, unsupervised learning, and reinforcement learning. Supervised learning provides feedback to indicate whether the prediction is correct or not, whereas unsupervised learning does not respond: the algorithm only attempts to classify the data according to its implicit structure. Reinforcement learning is similar to supervised learning in that it receives feedback, but feedback is not necessary for every input or state.
As shown in fig. 2, the probability value output by the risk model may be divided into a plurality of intervals in advance according to M configured first thresholds Si, the interval formed by two adjacent first thresholds is a risk level, the probability value output by the intention model is divided into a plurality of intervals according to N configured second thresholds Ri, wherein the interval formed by two adjacent second thresholds is an intention level, and the M risk levels and the N intention levels are cross-combined into preset m×n categories. As shown in fig. 2, the risk level in the interval S M-1 and S M and the intention level in the interval R N-1 and R N cross-form the shadow area in the same category.
The risk level divides the equipment from a risk dimension, obtains the probability of damaging the internet service platform behavior of the target equipment after the equipment risk information is input into a risk model, compares the probability of damaging the internet service platform behavior of the target equipment with each first threshold value, and can find the risk level of the target equipment.
S2, determining the target equipment intention level according to the equipment intention information and the trained intention model,
The intention model is used for acquiring the intention degree of the internet service by the computing equipment; the device intention information is device information related to the intention of the device to acquire the internet service. Wherein the device information may be any device related information, such as: the present invention is not particularly limited, and the device ID, device attribute information of the device model, etc., user information using the device, communication information of the device, shopping information of the device, location information of the device, etc.
In one example, the device intent information may include: device-related information and device intent-related information; wherein the device-related information includes: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device intent-related information includes: whether the device registers with an internet service platform, whether the device applies for internet service, whether the device successfully acquires internet service, and the like.
The intention hierarchy divides the devices by the dimension in which the intention hierarchy obtains internet service intention from the devices. The probability that the target device obtains the internet service is obtained after the device intention information is input into the trained intention model, and the intention level where the target device is located can be found by comparing the probability that the target device obtains the internet service with each second threshold.
S3, providing authentication conditions of the Internet service for the target equipment according to the target equipment risk level and the intention level;
Wherein the authentication condition is the amount of resources that the device needs to provide when providing internet services to the device, the resources being any available substance, information, money, time, etc. Information resources include computing resources and various types of data resources. The data resources include various dedicated data in various fields. In one example, the authentication condition is a fee for acquiring internet services. Such as: the internet service is a paid member service, and the authentication condition may be: any one of total price, unit price, point, virtual coin.
In one example, the category of the target device may be determined from the preset mxn categories according to the risk level and the intention level of the target device. As shown in fig. 2, the area formed by crossing the risk level where the target device is located and the second hierarchy is taken as the category where the target device is located. Before the step, the authentication conditions of each category can be configured according to the intention level and the risk level of each category, so that the step can directly find the authentication conditions of the target equipment according to the category of the target equipment and provide the authentication conditions of the internet service for the target equipment.
In one configuration mode of the authentication condition, the authentication condition is a cost interval for providing internet service, and when the risk level and the intention level are both relatively high, the authentication condition is set as a highest interval (namely, a highest cost interval); the authentication condition is set to the lowest interval (i.e., highest cost interval) when both the risk level and the intent level are relatively low intervals. In one example, the relatively higher interval includes only the highest interval, the relatively lower interval includes only the lowest interval, and the authentication condition is set to be the highest interval when both the risk level and the intention level are the highest intervals; and when the risk level and the intention level are both the lowest interval, setting the authentication condition as the lowest interval. In another example, the relatively higher interval may contain all intervals having a minimum value greater than the first threshold, such as: the first high section, the second high section, etc., the relatively lower section may include all sections having a maximum value less than the second threshold, such as: the first low section, the second low section and the like, and when the risk level and the intention level are both the first high section or both the second high section or one is the first high section and the other is the second high section, setting the authentication condition as the highest section; the risk level and the intention level are both first low intervals, or both second low intervals, or one is the first low interval and the other is the second low interval, and the authentication condition is set as the lowest interval. The first threshold and the second threshold are configured according to actual needs.
In another configuration mode of the authentication condition, the authentication condition is a unit price for providing internet service, and when the risk level and the intention level are both the highest interval, namely the equipment with high risk and high intention is given to the highest unit price, so that higher profit is obtained while the purchase rate is ensured; for devices with high risk and low intention, which are in a relatively lower interval of the intention level of the relatively higher interval of the risk level, the corresponding low unit price is given in order to improve the purchase intention through price reduction; the higher interval may be all intervals higher than the first preset value, the lower interval may be all intervals lower than the second preset value, and the risk level includes, by way of example, a first high interval to a fifth high interval in which the intervals are sequentially reduced, five higher intervals, the intention level includes a first low interval to a fifth low interval in which the intervals are sequentially reduced, and five lower intervals may be configured with low unit prices in which the five higher intervals respectively intersect with the five low intervals; for the equipment with low risk and high intention in the relatively higher interval of the intention level of the relatively lower interval of the risk level, the corresponding high unit price is given, so that higher benefit is obtained while purchasing is ensured; the higher interval may be all intervals higher than the first preset value, the lower interval may be all intervals lower than the second preset value, and the risk level includes, by way of example, a first low interval to a fifth low interval in which the intervals are sequentially reduced, the five lower intervals, the intention level includes a first high interval to a fifth high interval in which the intervals are sequentially reduced, and the five higher intervals may be configured with high unit prices corresponding to the intersections of the five higher intervals with the five low intervals, respectively; devices that are both lowest intervals, i.e., low risk low intent, for both the risk tier and the intent tier are given the lowest unit price to attract device purchases.
In another example, providing authentication conditions of the internet service to the target device according to the target device risk level and the intent level includes:
s31, determining a first target interval from a first preset interval according to the risk level of the target equipment;
The probability corresponding to the risk level is larger, and the minimum value and the maximum value of the corresponding first target interval are larger; the first preset interval may be an interval of authentication conditions corresponding to different risk levels that are preconfigured. The probability corresponding to the risk level is used to represent an average risk probability of the devices within the risk level, which may be an average of the risk probabilities of the devices within the risk level.
S32, determining a second target interval from a second preset interval according to the intention level;
The larger the intention degree corresponding to the intention level is, the larger the minimum value and the maximum value of the corresponding second target interval are; the second preset interval may be an interval that is preconfigured and does not agree with the authentication condition corresponding to the hierarchy. The intent corresponding to the intent level is used to represent the average intent of the devices in the intent level to obtain the internet service, which may be the average of the intent of all the devices in the risk level to obtain the internet service.
S33, determining a target section as the authentication condition according to the first target section and the second target section.
For example, the authentication condition is a fee interval for providing the internet service, and the overlapping interval of the first target interval and the second target interval may be directly used as the target interval, and the target interval is the authentication condition. Further, if the first target section and the second target section do not overlap, a smaller section of the first target section and the second target section may be used as the target section. For example, if the first target section and the second target section do not overlap, the maximum value of the first target section and the minimum value of the second target section may be compared, and if the maximum value of the first target section is smaller than the minimum value of the second target section, the first target section is regarded as the target section, otherwise, the second target section is regarded as the target section.
In another example, the authentication condition is a unit price for providing the internet service, and an average value of a maximum value and a minimum value of the first target section and the second target section may be used as the authentication condition.
In yet another example, the providing the authentication condition of the internet service for the target device according to the target device risk level and the intent level includes:
The authentication condition is calculated by the following formula:
X=A×a+B×b;
Wherein X is a numerical interval corresponding to the authentication condition, a is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval. The preset risk interval is a value interval of authentication conditions corresponding to a preset lowest risk level, and the preset intention interval is a value interval of authentication conditions corresponding to a preset lowest intention level.
And S4, when the target equipment receives the authentication condition, providing the Internet service for the target equipment.
Furthermore, the invention can also adjust the device policy according to the device feedback, and the method further comprises:
s5, receiving feedback of the target equipment;
Wherein the feedback of the target device comprises: accepting the authentication condition and rejecting the authentication condition.
S6, adjusting the authentication condition according to feedback of the target equipment.
For example, the ratio Q1 of the device rejecting the authentication condition to all devices providing the authentication condition, the ratio Q2 of the device accepting the authentication condition to the device rejecting the authentication condition, and the like may be calculated according to the feedback of the target device, and the authentication condition may be adjusted when Q1 is greater than a preset ratio and/or Q2 is greater than a preset ratio, for example: reducing the cost of providing internet services according to a preset ratio, and the like.
In addition, in order to avoid loss of the internet service platform, when the risk model calculates that the probability of damaging the internet service platform behavior of the target device is greater than a threshold value, the risk of fraud or overdue state of the device is large, and the target device is refused to apply for providing the internet service. Further, the device may be stored in a blacklist, rejecting any internet service applications for the device.
Fig. 3 is an apparatus for providing an internet service to a device based on a degree of intention and a degree of risk, wherein the degree of intention of the device is a level of intention of the device for obtaining the internet service, and the degree of risk of the device is a possibility that the device damages an internet service platform when enjoying the internet service, as shown in fig. 3, the apparatus comprises:
A first determining module 31, configured to determine a target device risk level according to the device risk information and the trained risk model; the risk model is used for calculating the probability of the Internet service platform behavior being damaged by the equipment; the device risk information is device information related to a risk behavior of the device;
A second determining module 32, configured to determine the target device intent level according to device intent information and a trained intent model, where the intent model is used for obtaining the intent of the internet service by the computing device; the device intention information is device information related to the intention of the device to acquire the internet service;
A first providing module 33, configured to provide the target device with authentication conditions of the internet service according to the risk level and the intention level of the target device;
a second providing module 34, configured to provide the internet service to the target device when the target device accepts the authentication condition.
Optionally, the internet service is any one of the following: shopping, travel, payment, navigation, group purchase, sharing of items, social, online education, translation.
Optionally, the internet service is a paid member service, and the authentication condition includes any one of the following: total price, unit price, point, virtual coin.
In one embodiment, the first providing module 33 includes:
The first sub-determining module is used for determining a first target interval from a first preset interval according to the risk level; the probability corresponding to the risk level is larger, and the minimum value and the maximum value of the corresponding first target interval are larger;
The second sub-determining module is used for determining a second target interval from a second preset interval according to the intention level; the larger the intention degree corresponding to the intention level is, the larger the minimum value and the maximum value of the corresponding second target interval are;
And the third sub-determining module is used for determining a target interval as the authentication condition according to the first target interval and the second target interval.
In another embodiment, the first providing module 33 calculates the authentication condition by the following formula:
X=A×a+B×b;
wherein X is a numerical interval corresponding to the authentication condition, a is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
Further, the device further comprises: and the rejecting module is used for rejecting the request of the target equipment for providing the Internet service when the risk model calculates that the probability of damaging the Internet service platform behavior of the target equipment is larger than a threshold value.
Preferably, the device risk information includes: device-related information and device risk-related information; wherein the device-related information includes: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: at least one of an application of the equipment through internet service, equipment resource allocation limit, number of days of equipment overdue return resources, number of times of equipment overdue return resources and whether the equipment has fraud records.
It will be appreciated by those skilled in the art that the modules in the embodiments of the apparatus described above may be distributed in an apparatus as described, or may be distributed in one or more apparatuses different from the embodiments described above with corresponding changes. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
The following describes an embodiment of an electronic device of the present invention, which may be regarded as a physical form of implementation for the above-described embodiment of the method and apparatus of the present invention. Details described in relation to the embodiments of the electronic device of the present invention should be considered as additions to the embodiments of the method or apparatus described above; for details not disclosed in the embodiments of the electronic device of the present invention, reference may be made to the above-described method or apparatus embodiments.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. The electronic device shown in fig. 4 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present invention.
As shown in fig. 4, the electronic device 400 of the exemplary embodiment is in the form of a general-purpose data processing device. The components of electronic device 400 may include, but are not limited to: at least one processing unit 410, at least one memory unit 420, a bus 430 connecting the different electronic device components (including memory unit 420 and processing unit 410), a display unit 440, and the like.
The storage unit 420 stores a computer readable program, which may be a source program or code of a read only program. The program may be executed by the processing unit 410 such that the processing unit 410 performs the steps of various embodiments of the present invention. For example, the processing unit 410 may perform the steps shown in fig. 1.
The memory unit 420 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 4201 and/or cache memory 4202, and may further include Read Only Memory (ROM) 4203. The storage unit 420 may also include a program/utility 4204 having a set (at least one) of program modules 4205, such program modules 4205 including, but not limited to: an operating electronic device, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 430 may be a local bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or using any of a variety of bus architectures.
The electronic device 400 may also communicate with one or more external devices 100 (e.g., keyboard, display, network device, bluetooth device, etc.), such that a user can interact with the electronic device 400 via the external devices 100, and/or such that the electronic device 400 can communicate with one or more other data processing devices (e.g., routers, modems, etc.). Such communication may occur through an input/output (I/O) interface 450, and may also occur through a network adapter 460 to one or more networks, such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet. The network adapter 460 may communicate with other modules of the electronic device 400 via the bus 430. It should be appreciated that although not shown in fig. 4, other hardware and/or software modules may be used in electronic device 400, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID electronics, tape drives, data backup storage electronics, and the like.
FIG. 5 is a schematic diagram of one embodiment of a computer readable medium of the present invention. As shown in fig. 5, the computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but not limited to, an electronic device, apparatus, or means of electronic, magnetic, optical, electromagnetic, infrared, or semiconductor, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. The computer program, when executed by one or more data processing devices, enables the computer readable medium to carry out the above-described method of the present invention, namely: determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the Internet service platform behavior being damaged by the equipment; the device risk information is device information related to a risk behavior of the device; determining an intention level of the target equipment according to the equipment intention information and a trained intention model, wherein the intention model is used for acquiring the intention degree of the internet service by the computing equipment; the device intention information is device information related to the intention of the device to acquire the internet service; providing the authentication condition of the Internet service for the target equipment according to the risk level and the intention level of the target equipment; and when the target equipment accepts the authentication condition, providing the Internet service for the target equipment.
From the above description of embodiments, those skilled in the art will readily appreciate that the exemplary embodiments described herein may be implemented in software, or may be implemented in software in combination with necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer readable storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, comprising several instructions to cause a data processing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described method according to the present invention.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution electronic device, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In summary, the present invention may be implemented in a method, apparatus, electronic device, or computer readable medium that executes a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or Digital Signal Processor (DSP).
The above-described specific embodiments further describe the objects, technical solutions and advantageous effects of the present invention in detail, and it should be understood that the present invention is not inherently related to any particular computer, virtual device or electronic apparatus, and various general-purpose devices may also implement the present invention. The foregoing description of the embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (10)
1. A method of providing internet services to a device based on a device intent level, which is a level of intent of the device to obtain the internet services, and a device risk level, which is a likelihood of the device damaging an internet service platform while enjoying the internet services, the method comprising:
Determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the Internet service platform behavior being damaged by the equipment; the device risk information is device information related to a risk behavior of the device;
determining an intention level of the target equipment according to the equipment intention information and a trained intention model, wherein the intention model is used for acquiring the intention degree of the internet service by the computing equipment; the device intention information is device information related to the intention of the device to acquire the internet service;
Dividing probability values output by the risk model into a plurality of intervals according to M configured first thresholds in advance, dividing the intervals formed by two adjacent first thresholds into a risk level, dividing the probability values output by the intention model into a plurality of intervals according to N configured second thresholds, wherein the intervals formed by two adjacent second thresholds are an intention level, and combining the M risk levels and the N intention levels into preset M multiplied by N categories in a crossing way; m and N are natural numbers greater than 2;
Determining a first target interval from a first preset interval according to the risk level, determining a second target interval from a second preset interval according to the intention level, and directly taking a superposition interval of the first target interval and the second target interval as the authentication condition when the authentication condition is a expense interval for providing internet service; if the first target interval and the second target interval do not overlap, taking the smaller interval of the first target interval and the second target interval as the authentication condition; when the authentication condition is a unit price for providing the internet service, taking an average value of the maximum value and the minimum value of the first target interval and the second target interval as the authentication condition;
or the authentication condition is calculated by the following formula:
;
Wherein, For the value interval corresponding to the authentication condition,/>For the risk level,/>For presetting risk interval,/>For the intent level,/>Is a preset intention interval;
and when the target equipment accepts the authentication condition, providing the Internet service for the target equipment.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The larger the probability corresponding to the risk level is, the larger the minimum value and the maximum value of the corresponding first target interval are; the larger the intention degree corresponding to the intention level is, the larger the minimum value and the maximum value of the corresponding second target interval are.
3. The method according to claim 1 or 2, characterized in that the method further comprises: and rejecting the target equipment to apply for providing the Internet service when the risk model calculates that the probability of damaging the Internet service platform behavior of the target equipment is larger than a threshold value.
4. The method according to claim 1 or 2, wherein the device risk information comprises: device-related information and device risk-related information; wherein the device-related information includes: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: at least one of an application of the equipment through internet service, equipment resource allocation limit, number of days of equipment overdue return resources, number of times of equipment overdue return resources and whether the equipment has fraud records.
5. An apparatus for providing internet service to a device based on a device intention degree, which is a level of intention of the device for obtaining the internet service, and a device risk degree, which is a possibility that the device damages an internet service platform when enjoying the internet service, comprising:
The first determining module is used for determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the Internet service platform behavior being damaged by the equipment; the device risk information is device information related to a risk behavior of the device;
The second determining module is used for determining the intention level of the target equipment according to the equipment intention information and the trained intention model, and the intention model is used for acquiring the intention degree of the internet service by the computing equipment; the device intention information is device information related to the intention of the device to acquire the internet service;
The first providing module is used for dividing the probability value output by the risk model into a plurality of intervals according to the configured M first thresholds, wherein the interval formed by the two adjacent first thresholds is a risk level, dividing the probability value output by the intention model into a plurality of intervals according to the configured N second thresholds, wherein the interval formed by the two adjacent second thresholds is an intention level, and combining the M risk levels and the N intention levels into preset M multiplied by N categories in a crossing way; m and N are natural numbers greater than 2; determining a first target interval from a first preset interval according to the risk level, determining a second target interval from a second preset interval according to the intention level, and directly taking a superposition interval of the first target interval and the second target interval as the authentication condition when the authentication condition is a expense interval for providing internet service; if the first target interval and the second target interval do not overlap, taking the smaller interval of the first target interval and the second target interval as the authentication condition; when the authentication condition is a unit price for providing the internet service, taking an average value of the maximum value and the minimum value of the first target interval and the second target interval as the authentication condition;
or the authentication condition is calculated by the following formula:
;
Wherein, For the value interval corresponding to the authentication condition,/>For the risk level,/>For presetting risk interval,/>For the intent level,/>Is a preset intention interval;
And the second providing module is used for providing the internet service for the target equipment when the target equipment accepts the authentication condition.
6. The apparatus of claim 5, wherein the greater the probability of correspondence of the risk level, the greater the minimum and maximum values of the corresponding first target interval; the larger the intention degree corresponding to the intention level is, the larger the minimum value and the maximum value of the corresponding second target interval are.
7. The apparatus according to claim 5 or 6, characterized in that the apparatus further comprises: and the rejecting module is used for rejecting the request of the target equipment for providing the Internet service when the risk model calculates that the probability of damaging the Internet service platform behavior of the target equipment is larger than a threshold value.
8. The apparatus of claim 5 or 6, wherein the device risk information comprises: device-related information and device risk-related information; wherein the device-related information includes: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: at least one of an application of the equipment through internet service, equipment resource allocation limit, number of days of equipment overdue return resources, number of times of equipment overdue return resources and whether the equipment has fraud records.
9. An electronic device, comprising:
a processor; and
A memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-4.
10. A computer readable storage medium storing one or more programs, which when executed by a processor, implement the method of any of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110875634.1A CN113723759B (en) | 2021-07-30 | 2021-07-30 | Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110875634.1A CN113723759B (en) | 2021-07-30 | 2021-07-30 | Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113723759A CN113723759A (en) | 2021-11-30 |
CN113723759B true CN113723759B (en) | 2024-06-04 |
Family
ID=78674510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110875634.1A Active CN113723759B (en) | 2021-07-30 | 2021-07-30 | Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113723759B (en) |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8280805B1 (en) * | 2006-01-10 | 2012-10-02 | Sas Institute Inc. | Computer-implemented risk evaluation systems and methods |
JP2016099702A (en) * | 2014-11-19 | 2016-05-30 | キヤノン株式会社 | Authentication management method by means of device cooperation, information processing apparatus, wearable device, and computer program |
US9661011B1 (en) * | 2014-12-17 | 2017-05-23 | Amazon Technologies, Inc. | Techniques for data routing and management using risk classification and data sampling |
CN107491862A (en) * | 2017-07-26 | 2017-12-19 | 广州供电局有限公司 | The method and device of power grid risk evaluation and test |
CN107888574A (en) * | 2017-10-27 | 2018-04-06 | 深信服科技股份有限公司 | Method, server and the storage medium of Test database risk |
CN109614997A (en) * | 2018-11-29 | 2019-04-12 | 武汉大学 | A kind of stealing Risk Forecast Method and device based on deep learning |
CN110009359A (en) * | 2019-01-22 | 2019-07-12 | 阿里巴巴集团控股有限公司 | Training method, update method and the device of unsupervised risk prevention system model |
CN110033153A (en) * | 2018-12-05 | 2019-07-19 | 阿里巴巴集团控股有限公司 | A kind of pair of information recommendation carries out resource bonusing method, device and equipment |
CN110348727A (en) * | 2019-07-02 | 2019-10-18 | 北京淇瑀信息科技有限公司 | A kind of marketing strategy formulating method, device and electronic equipment moving branch wish based on consumer's risk grade and user |
CN110443617A (en) * | 2019-07-10 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Information processing method, device and computer equipment |
WO2020037942A1 (en) * | 2018-08-20 | 2020-02-27 | 平安科技(深圳)有限公司 | Risk prediction processing method and apparatus, computer device and medium |
CN110992169A (en) * | 2019-11-29 | 2020-04-10 | 深圳乐信软件技术有限公司 | Risk assessment method, device, server and storage medium |
WO2020077895A1 (en) * | 2018-10-16 | 2020-04-23 | 深圳壹账通智能科技有限公司 | Signing intention determining method and apparatus, computer device, and storage medium |
CN111210109A (en) * | 2019-12-20 | 2020-05-29 | 上海淇玥信息技术有限公司 | Method and device for predicting user risk based on associated user and electronic equipment |
CN111478890A (en) * | 2020-03-30 | 2020-07-31 | 中国科学院计算技术研究所 | Network service access control method and system based on intelligent contract |
WO2020211388A1 (en) * | 2019-04-16 | 2020-10-22 | 深圳壹账通智能科技有限公司 | Behavior prediction method and device employing prediction model, apparatus, and storage medium |
CN112308387A (en) * | 2020-10-20 | 2021-02-02 | 深圳思为科技有限公司 | Client intention degree evaluation method and device and cloud server |
CN112330373A (en) * | 2020-11-30 | 2021-02-05 | 中国银联股份有限公司 | User behavior analysis method and device and computer readable storage medium |
CN112418653A (en) * | 2020-11-19 | 2021-02-26 | 重庆邮电大学 | Number portability and network diver identification system and method based on machine learning algorithm |
CN112668832A (en) * | 2020-11-25 | 2021-04-16 | 广东电网有限责任公司 | Risk quantitative evaluation method and device based on index management system and electronic equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11017100B2 (en) * | 2018-08-03 | 2021-05-25 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
-
2021
- 2021-07-30 CN CN202110875634.1A patent/CN113723759B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8280805B1 (en) * | 2006-01-10 | 2012-10-02 | Sas Institute Inc. | Computer-implemented risk evaluation systems and methods |
JP2016099702A (en) * | 2014-11-19 | 2016-05-30 | キヤノン株式会社 | Authentication management method by means of device cooperation, information processing apparatus, wearable device, and computer program |
US9661011B1 (en) * | 2014-12-17 | 2017-05-23 | Amazon Technologies, Inc. | Techniques for data routing and management using risk classification and data sampling |
CN107491862A (en) * | 2017-07-26 | 2017-12-19 | 广州供电局有限公司 | The method and device of power grid risk evaluation and test |
CN107888574A (en) * | 2017-10-27 | 2018-04-06 | 深信服科技股份有限公司 | Method, server and the storage medium of Test database risk |
WO2020037942A1 (en) * | 2018-08-20 | 2020-02-27 | 平安科技(深圳)有限公司 | Risk prediction processing method and apparatus, computer device and medium |
WO2020077895A1 (en) * | 2018-10-16 | 2020-04-23 | 深圳壹账通智能科技有限公司 | Signing intention determining method and apparatus, computer device, and storage medium |
CN109614997A (en) * | 2018-11-29 | 2019-04-12 | 武汉大学 | A kind of stealing Risk Forecast Method and device based on deep learning |
CN110033153A (en) * | 2018-12-05 | 2019-07-19 | 阿里巴巴集团控股有限公司 | A kind of pair of information recommendation carries out resource bonusing method, device and equipment |
CN110009359A (en) * | 2019-01-22 | 2019-07-12 | 阿里巴巴集团控股有限公司 | Training method, update method and the device of unsupervised risk prevention system model |
WO2020211388A1 (en) * | 2019-04-16 | 2020-10-22 | 深圳壹账通智能科技有限公司 | Behavior prediction method and device employing prediction model, apparatus, and storage medium |
CN110348727A (en) * | 2019-07-02 | 2019-10-18 | 北京淇瑀信息科技有限公司 | A kind of marketing strategy formulating method, device and electronic equipment moving branch wish based on consumer's risk grade and user |
CN110443617A (en) * | 2019-07-10 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Information processing method, device and computer equipment |
CN110992169A (en) * | 2019-11-29 | 2020-04-10 | 深圳乐信软件技术有限公司 | Risk assessment method, device, server and storage medium |
CN111210109A (en) * | 2019-12-20 | 2020-05-29 | 上海淇玥信息技术有限公司 | Method and device for predicting user risk based on associated user and electronic equipment |
CN111478890A (en) * | 2020-03-30 | 2020-07-31 | 中国科学院计算技术研究所 | Network service access control method and system based on intelligent contract |
CN112308387A (en) * | 2020-10-20 | 2021-02-02 | 深圳思为科技有限公司 | Client intention degree evaluation method and device and cloud server |
CN112418653A (en) * | 2020-11-19 | 2021-02-26 | 重庆邮电大学 | Number portability and network diver identification system and method based on machine learning algorithm |
CN112668832A (en) * | 2020-11-25 | 2021-04-16 | 广东电网有限责任公司 | Risk quantitative evaluation method and device based on index management system and electronic equipment |
CN112330373A (en) * | 2020-11-30 | 2021-02-05 | 中国银联股份有限公司 | User behavior analysis method and device and computer readable storage medium |
Non-Patent Citations (2)
Title |
---|
Risk knowledge and concern as influences of purchase intention for internet of things devices;Nitin Aggarwal et al;《Technology in Society》;20201231;101311:1-11 * |
手机银行用户使用意向影响因素的证实研究;张明明;《中国优秀硕士学位全文数据库 经济与管理科学辑》;20150731(第2015/07期);J159-86 * |
Also Published As
Publication number | Publication date |
---|---|
CN113723759A (en) | 2021-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110349009B (en) | Multi-head lending default prediction method and device and electronic equipment | |
US20190035015A1 (en) | Method and apparatus for obtaining a stable credit score | |
CN110599335A (en) | User financial risk assessment method and device based on multiple models | |
CN110349004A (en) | Risk of fraud method for detecting and device based on user node relational network | |
CN112508580A (en) | Model construction method and device based on rejection inference method and electronic equipment | |
CN112016794B (en) | Resource quota management method and device and electronic equipment | |
CN111583018A (en) | Credit granting strategy management method and device based on user financial performance analysis and electronic equipment | |
CN111210109A (en) | Method and device for predicting user risk based on associated user and electronic equipment | |
CN111967954A (en) | Resource return increase ratio determination method and device and electronic equipment | |
CN112017042A (en) | Resource quota determining method and device based on tweed distribution and electronic equipment | |
CN110675250A (en) | Credit line management method and device based on user marketing score and electronic equipment | |
CN110363583B (en) | Method and device for creating user consumption behavior label based on position information and electronic equipment | |
CN113191565A (en) | Security prediction method, security prediction device, security prediction medium, and security prediction apparatus | |
CN109087089A (en) | Payment method, payment device and terminal equipment | |
CN111899111A (en) | Capital matching method, device, server and storage medium | |
CN112292699B (en) | Method and device for determining action selection policy of execution device | |
CN110689425A (en) | Method and device for pricing quota based on income and electronic equipment | |
CN107798125B (en) | Access judgment method, system, equipment and storage medium based on intimacy model | |
CN111209930B (en) | Method and device for generating trust policy and electronic equipment | |
WO2023185125A1 (en) | Product resource data processing method and apparatus, electronic device and storage medium | |
CN113723759B (en) | Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree | |
CN111738846A (en) | Method and device for generating post-loan management strategy and electronic equipment | |
CN111695988A (en) | Information processing method, information processing apparatus, electronic device, and medium | |
CN112446777A (en) | Credit evaluation method, device, equipment and storage medium | |
CN112016789B (en) | Internet financial service processing method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |