CN117035782A - Recharging risk control method, device, equipment and storage medium - Google Patents

Recharging risk control method, device, equipment and storage medium Download PDF

Info

Publication number
CN117035782A
CN117035782A CN202310946657.6A CN202310946657A CN117035782A CN 117035782 A CN117035782 A CN 117035782A CN 202310946657 A CN202310946657 A CN 202310946657A CN 117035782 A CN117035782 A CN 117035782A
Authority
CN
China
Prior art keywords
risk
information
recharging
user
user account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310946657.6A
Other languages
Chinese (zh)
Inventor
叶子彬
徐治钦
万梓荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yingfeng Network Technology Co ltd
Original Assignee
Guangzhou Yingfeng Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yingfeng Network Technology Co ltd filed Critical Guangzhou Yingfeng Network Technology Co ltd
Priority to CN202310946657.6A priority Critical patent/CN117035782A/en
Publication of CN117035782A publication Critical patent/CN117035782A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
    • A63F13/792Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories for payment purposes, e.g. monthly subscriptions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses a recharging risk control method, device, equipment and storage medium. According to the technical scheme provided by the embodiment of the application, the user associated information of the user account is obtained, the user associated information is input into the trained risk score model when the user associated information meets the set score updating condition, the risk score analysis is carried out on the basis of the user associated information through the risk score model, the risk score information of the user account is determined, the risk score information of the user account is recorded, the user account carrying out recharging risk control processing on recharging behaviors can be carried out on the basis of the recorded risk score information, the recharging risk control is accurately carried out on the user account corresponding to the recharging behaviors with recharging risks, and the recharging risk control effect is effectively improved.

Description

Recharging risk control method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a recharging risk control method, device and equipment and a storage medium.
Background
With the rapid development of computer technology and internet technology, the living and entertainment modes of people are more and more diversified, and the types of games are more and more. In order to further alert the player to the game play experience, props, fashion items, etc. may be provided on the gaming platform, which may be recharged and accessed by the user.
With the increase of game players, the need for game recharging is increasing, and some game alternative recharging merchants use black cards, stolen credit cards, malicious refunds and other modes to recharge players maliciously by recharging holes, so that the recharging risk control effect is poor.
Disclosure of Invention
The embodiment of the application provides a recharging risk control method, device, equipment and storage medium, which are used for solving the technical problem of poor recharging risk control effect in the related technology and effectively improving the recharging risk control effect.
In a first aspect, an embodiment of the present application provides a recharging risk control method, including:
acquiring user association information of a user account;
under the condition that the user associated information meets the set score updating condition, inputting the user associated information into a trained risk score model, and carrying out risk score analysis based on the user associated information through the risk score model to determine risk score information of the user account;
recording the risk score information of the user account;
and carrying out recharging risk control processing on the user account carrying out recharging behaviors based on the recorded risk score information.
In a second aspect, an embodiment of the present application provides a recharging risk control device, including an information acquisition module, a risk evaluation module, a score recording module, and a risk control module, where:
the information acquisition module is used for acquiring user association information of a user account;
the risk evaluation module is used for inputting the user associated information into a trained risk score model under the condition that the user associated information meets a set score updating condition, and carrying out risk score analysis on the basis of the user associated information through the risk score model to determine risk score information of the user account;
the score recording module is used for recording the risk score information of the user account;
and the risk control module is used for carrying out recharging risk control processing on the user account carrying out recharging behaviors based on the recorded risk score information.
In a third aspect, an embodiment of the present application provides a recharging risk control device, including: a memory and one or more processors;
the memory is used for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of risk control of top-up as described in the first aspect.
In a fourth aspect, an embodiment of the present application provides a storage medium storing computer-executable instructions for performing the top-up risk control method according to the first aspect when executed by a computer processor.
According to the embodiment of the application, the user associated information of the user account is obtained, and when the user associated information meets the set score updating condition, the user associated information is input into the trained risk score model, the risk score model is used for carrying out risk score analysis based on the user associated information, the risk score information of the user account is determined, the risk score information of the user account is recorded, the user account carrying out recharging risk control processing on recharging behaviors can be carried out based on the recorded risk score information, the recharging risk control is accurately carried out on the user account corresponding to the recharging behaviors with recharging risks, and the recharging risk control effect is effectively improved.
Drawings
Fig. 1 is a flowchart of a recharging risk control method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a training process of a risk score model according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a recharging risk control device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a recharging risk control device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the following detailed description of specific embodiments of the present application is given with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the matters related to the present application are shown in the accompanying drawings. Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The above-described process may be terminated when its operations are completed, but may have additional steps not included in the drawings. The processes described above may correspond to methods, functions, procedures, subroutines, and the like.
Fig. 1 shows a flowchart of a recharging risk control method provided by the embodiment of the present application, where the recharging risk control method provided by the embodiment of the present application may be implemented by a recharging risk control device, and the recharging risk control device may be implemented by hardware and/or software and integrated in a recharging risk control apparatus.
The following describes an example of a method for performing the recharging risk control by the recharging risk control device. Referring to fig. 1, the recharging risk control method includes:
s110: user association information of a user account is obtained.
The user-related information of the user account may include device data (for example, device number, address information (IP information), device system, system version, device power, etc.) of a user terminal logged in the user account, device data of the user terminal logged in and the user terminal logged in, account number corresponding to the user terminal, recharging condition of the logged-in account (for example, refund occurring in the logged-in account, illegal behavior risk behavior by using a vulnerability), IP address corresponding to recharging of the user account, registered IP address, number and/or frequency of recharging behavior of the user account, abnormal behavior (for example, refund, swipe bug) of the user account, recharging number and abnormal behavior duty ratio of the user account, and IP address associated with the user account. The recharging action of the user may be to recharge a voucher (or a gold coin, a point ticket, a token, or the like) to the game account, or to purchase a prop in the game mall.
In one embodiment, the user-associated information of the user account may be acquired when the information acquisition condition is satisfied, and the user-associated information of different numbers of user accounts may be acquired with different information acquisition conditions. For example, when the information acquisition condition is that the risk score model is configured or updated, user associated information of all user accounts is correspondingly acquired. And when the information acquisition condition is that a new user account performing recharging behavior is detected, correspondingly acquiring user association information of the user account.
In a possible embodiment, as shown in a schematic diagram of a risk score model training flow provided in fig. 2, the recharging risk control method provided in the present embodiment further includes:
s101: and acquiring user sample information and recharging result information of the sample account, and performing data cleaning on the user sample information to determine risk sample data.
S102: and determining a plurality of risk sample labels based on the recharging result information and the risk sample data, and determining sample risk scores corresponding to the risk sample labels.
S103: a risk score model is trained based on the risk sample tags and the sample risk scores.
For example, user sample information and recharging result information of a sample account are collected, for example, an account subjected to recharging is taken as a sample account, and user sample information and recharging result information of a plurality of sample accounts are collected. The recharging result information may be used to indicate whether the sample account performs abnormal actions (e.g., whether the sample account performs malicious refunds, swipes bug, etc.).
Further, after the user sample information and the recharging result information of the sample account are obtained, the user sample information is subjected to data cleaning, and the user sample information with larger influence on recharging risk analysis is reserved, so that risk sample data are obtained. The retained user sample information may be device data (for example, device number, address information (IP information), device system, system version, device power, etc.) of a user terminal logging in the sample account, device data of the user terminal logged in and the user terminal logged in by the sample account, account number corresponding to the user terminal, recharging condition of the logged in account (for example, refund occurred in the logged in account and illegal behavior risk behavior performed by using the vulnerability), IP address corresponding to recharging of the sample account, registered IP address, number and/or frequency of recharging behavior of the sample account, abnormal behavior (for example, refund, vulnerability bug brushing) of the sample account, recharging number and abnormal behavior duty ratio of the sample account, and IP address associated with the sample account.
Further, according to the recharging result information and the risk sample data corresponding to each recharging behavior, a plurality of risk sample labels are determined from the risk sample data, and sample risk scores corresponding to the risk sample labels are determined. Optionally, the user sample information, the recharging result information and the risk sample labels can be visually displayed, the risk sample label with a larger relationship with the abnormal recharging behavior is determined according to the visual display result, and the corresponding sample risk score is determined for each risk sample label. Further, the risk sample label is used as input, the sample risk score is used as output, and the risk score model is trained until the accuracy of the risk score model reaches the set accuracy requirement. According to the method, the risk sample labels required by the user training risk score model and the sample risk scores corresponding to the risk sample labels are constructed by utilizing the user sample information and the recharging result information of the sample accounts collected through historic, the accuracy of the risk score model is higher, and the user sample information and the recharging result information of the sample accounts are collected widely and legally and then are subjected to data cleaning, so that the user risk degree describing risk sample labels and sample risk scores can be converted, the relevance of training data to the risk score training targets is effectively improved, and the accuracy of the risk score model is higher.
S120: under the condition that the user associated information meets the set score updating condition, the user associated information is input into a trained risk score model, risk score analysis is conducted on the basis of the user associated information through the risk score model, and risk score information of a user account is determined.
The recharging risk control provided by the scheme is configured with a risk score model after training is completed, and the risk score model provided by the scheme is used for carrying out risk score analysis according to input user associated information and outputting risk score information obtained by the risk score analysis.
For example, after the user associated information of the user account is obtained, whether the user associated information meets the set score updating condition is determined, and the user associated information meeting the set score updating condition is input into the risk score model after training is completed. And the risk score model analyzes the risk score based on the user association information to obtain risk score information of the user account. The greater the possibility that the abnormal risk exists in the recharging behavior of the user account, the higher the corresponding score of the corresponding risk score information.
In one embodiment, when user associated information of all user accounts is acquired when the risk score model is configured or updated, the user associated information of all user accounts is respectively input into the risk score model, and risk score information corresponding to each user account is respectively output through the risk score model. When a new user account performing recharging behavior is detected, user related information of the user account is input into a risk score model, and risk score information corresponding to the user account is output through the risk score model.
In one possible embodiment, the recharging risk control method provided by the present application further includes, after obtaining the user association information of the user account: and determining that the user-related information meets the set score updating condition under the condition that the change amount of the user-related information reaches the set change threshold value.
Illustratively, after the user associated information of the user account is obtained, the user associated information is compared with the historical user associated information input to the risk score model last time, the change amount of the current user associated information relative to the historical user associated information is determined, and the change amount is compared with a set change threshold. And when the variation reaches a set variation threshold, determining that the current user associated information meets a set score updating condition, and inputting the user associated information into the risk score model after training. And when the variation quantity does not reach the set variation threshold value, the fact that the current user associated information does not meet the set score updating condition is determined, and the user associated information does not need to be input into the risk score model after training is completed. According to the scheme, whether the user associated information meets the set score updating condition or not is determined according to the comparison condition of the change quantity of the user associated information and the set change threshold value, and the user associated information which does not meet the set score updating condition is ignored, so that the quality of the recharging risk control is ensured, and meanwhile, the calculated quantity of the recharging risk control is effectively reduced.
S130: and recording risk score information of the user account.
Illustratively, after the risk score information corresponding to the user account is obtained, the user account and the corresponding risk score information are recorded. For example, when determining risk score information of all user accounts in response to configuration or updating of the risk score model, risk score information corresponding to each user account is newly created or updated in a set score record table. When determining risk score information corresponding to a user account in response to detecting a new user account performing recharging, newly establishing the risk score information corresponding to the user account in a set score record table.
In one possible embodiment, the recharging risk control method provided by the present embodiment further includes, after recording risk score information of the user account: determining risk trend information of the user account according to the risk score information and the risk score information of the history record under the condition that the user account is determined to have no abnormal risk based on the recorded risk score information; and under the condition that the risk trend information reaches the set trend threshold value, acquiring user associated information of the user account according to a first set information updating period so as to update risk score information of the user account.
Optionally, the recharging risk control method provided by the scheme obtains the user associated information of the user account according to the second setting information updating period, and inputs the user associated information into the risk score model to obtain corresponding risk score information, so as to update the recorded risk score information of the user account, update the risk score information corresponding to each user account in time, and ensure that the recharging risk control effect is improved.
For example, after the risk score information of the user account is recorded, the risk score information is used to determine whether the risk score is abnormal to the user account performing the recharging operation. For example, the risk score information of the user account is compared with a set risk score threshold, and when the risk score information does not reach the set risk score threshold, the user account performing the recharging action is considered to have no abnormal risk.
And when the user account is determined to have no abnormal risk, determining risk trend information of the user account according to the risk score information and the risk score information of the historical record. For example, calculating the change rate of the risk score information according to the currently collected risk score information and the risk score information recorded in the history in a set time period, and determining the change rate as risk trend information of the user account. Further, comparing the risk trend information with a set trend threshold, acquiring user associated information of the user account according to a first set information updating period when the risk trend information reaches the set trend threshold, and inputting the user associated information into a risk score model to obtain corresponding risk score information so as to update recorded risk score information of the user account. Wherein the first setting information updating period is smaller than the setting information updating period. According to the method and the device, when the risk trend information of the user account reaches the set trend threshold, the user associated information of the user account is acquired according to the smaller first updating period, the risk score information is updated, the user account with abnormal recharging behaviors is detected in real time, the user account with recharging risks is determined in time, and the recharging risk control effect is effectively improved.
S140: and carrying out recharging risk control processing on the user account carrying out recharging behaviors based on the recorded risk score information.
When detecting that the user account performs recharging, the risk score information of the user account is determined, and recharging risk control processing is performed on the user account performing recharging according to the recorded risk score information.
In one possible embodiment, the recharging risk control method provided in the present application includes, when performing recharging risk control processing on a user account performing recharging actions based on recorded risk score information: and sending a risk reminder to the user account when the user account performing recharging actions is determined to have abnormal risk based on the recorded risk score information.
In an exemplary embodiment, when a user account performing recharging is detected, risk score information of the recorded user account is determined, and whether an abnormal risk exists in the user account performing recharging is determined according to the risk score information of the user account. For example, the risk score information of the user account is compared with the set risk score threshold, when the risk score information reaches the set risk score threshold, the user account performing the recharging operation is considered to have abnormal risk, and when the abnormal risk of the user account is determined, a risk reminder is sent to the user account to perform recharging risk control processing, for example, recharging risk reminder information is sent to the user account, or risk security verification is sent to the user account, and after the user account passes the risk security verification, the user account is allowed to continue the recharging operation. According to the scheme, when the abnormal risk exists in the user account for recharging based on the risk score information, the risk prompt is sent to the user account, the abnormal recharging of the user is stopped in time, and the control effect on the recharging risk is guaranteed.
In one embodiment, the recharging risk control method provided by the scheme further includes, after sending a risk reminder to the user account if it is determined that the user account performing the recharging action has abnormal risk based on the recorded risk score information: and under the condition that the abnormal behavior of the user account for recharging is detected, the user account is subjected to blocking processing until the user end completes the set compensation behavior.
For example, after determining that the user account performing the recharging operation has an abnormal risk and sending a risk alert to the user account, if a situation that a set abnormal operation (such as malicious refund and a reloaded bug) occurs in the user account performing the recharging operation is detected, performing blocking processing on the user account until the user end completes a set compensation operation (such as an amount of the user account compensating for the malicious refund or an amount obtained by using the reloaded bug). According to the scheme, the user account is forbidden when the set abnormal behavior of the user account for recharging behavior is detected, until the user side completes the set compensation behavior, the supervision effect on the abnormal recharging behavior is improved, and the loss caused by the malicious abnormal recharging behavior of a player or a merchant is reduced.
In one possible embodiment, the recharging risk control method provided in the present application includes, when performing recharging risk control processing on a user account performing recharging actions based on recorded risk score information: determining historical behavior information of the user account under the condition that the user account performing recharging behavior is determined to have abnormal risk based on the recorded risk score information; and sending a user verification request to the user account based on the historical behavior information, and carrying out recharging risk control processing on recharging behaviors of the user terminal based on the user verification information returned by the user account based on the user verification request.
In an exemplary embodiment, when a user account performing recharging is detected, risk score information of the recorded user account is determined, and whether an abnormal risk exists in the user account performing recharging is determined according to the risk score information of the user account. Upon determining that the user account is at risk of anomaly, historical behavior information of the user account (previously recorded historical behavior of the user account after recharging behavior, such as malicious refunds, swipe recharged vulnerability bugs, etc.) is determined.
Further, when the historical behavior information indicates that abnormal recharging behaviors occur within a set time length or the duty ratio of the abnormal recharging behaviors relative to all the historical behaviors reaches a set duty ratio threshold, a user verification request is sent to the user account. When receiving a user verification request, a user end logging in a user account sends out a user verification prompt and returns user verification information to the recharging risk control equipment in response to the verification operation of the user. And after receiving user verification information returned by the user account based on the user verification request, carrying out recharging risk control processing on recharging behaviors of the user according to user verification. For example, when the user authentication information indicates that the user account passes the user authentication, the recharging behavior of the user account is continuously monitored, when the abnormal behavior of the user account occurs, the abnormal behavior of the user account is timely limited, and when the user authentication information indicates that the user account does not pass the user authentication, the recharging behavior of the user is limited. According to the scheme, the user verification request is sent to the user account based on the historical behavior information of the user account, the recharging risk control processing is conducted on the recharging behavior of the user terminal based on the user verification information returned by the user account based on the user verification request, the recharging risk control processing mode of the user account is determined according to the historical recharging behavior of the user account, the recharging risk control is conducted on the user account corresponding to the recharging behavior with the recharging risk accurately, and the recharging risk control effect is effectively improved.
According to the method, the user association information of the user account is obtained, the user association information is input into the trained risk score model when the user association information meets the set score updating condition, risk score analysis is conducted on the basis of the user association information through the risk score model, the risk score information of the user account is determined, the risk score information of the user account is recorded, the user account performing recharging risk control processing on recharging behaviors can be conducted on the basis of the recorded risk score information, recharging risk control is conducted on the user account corresponding to the recharging behaviors with recharging risk accurately, and the recharging risk control effect is effectively improved. Meanwhile, by utilizing the user sample information and the recharging result information of the sample account collected by the history, risk sample labels required by the user for training the risk score model and sample risk scores corresponding to the risk sample labels are constructed, and the accuracy of the risk score model is higher.
Fig. 3 is a schematic structural diagram of a recharging risk control device according to an embodiment of the present application. Referring to fig. 3, the recharging risk control device includes an information acquisition module 31, a risk evaluation module 32, a score recording module 33, and a risk control module 34.
The information obtaining module 31 is configured to obtain user association information of a user account; the risk evaluation module 32 is configured to input the user-related information to a trained risk score model, perform risk score analysis based on the user-related information through the risk score model, and determine risk score information of the user account when the user-related information meets a set score update condition; the score recording module 33 is used for recording risk score information of the user account; the risk control module 34 is configured to perform a recharging risk control process on the user account performing the recharging action based on the recorded risk score information.
According to the method, the user association information of the user account is obtained, the user association information is input into the trained risk score model when the user association information meets the set score updating condition, risk score analysis is conducted on the basis of the user association information through the risk score model, the risk score information of the user account is determined, the risk score information of the user account is recorded, the user account performing recharging risk control processing on recharging behaviors can be conducted on the basis of the recorded risk score information, recharging risk control is conducted on the user account corresponding to the recharging behaviors with recharging risk accurately, and the recharging risk control effect is effectively improved.
In one possible embodiment, the recharging risk control device further includes a model training module for: acquiring user sample information and recharging result information of a sample account, and performing data cleaning on the user sample information to determine risk sample data; determining a plurality of risk sample labels based on the recharging result information and the risk sample data, and determining sample risk scores corresponding to the risk sample labels; a risk score model is trained based on the risk sample tags and the sample risk scores.
In one possible embodiment, the recharging risk control device further includes a condition judgment module for determining that the user-associated information satisfies the set score updating condition when the change amount of the user-associated information reaches the set change threshold.
In one possible embodiment, the recharging risk control device further includes a score updating module for: determining risk trend information of the user account according to the risk score information and the risk score information of the history record under the condition that the user account is determined to have no abnormal risk based on the recorded risk score information; and under the condition that the risk trend information reaches the set trend threshold value, acquiring user associated information of the user account according to a first set information updating period so as to update risk score information of the user account.
In one possible embodiment, risk control module 34, when performing a recharge risk control process on a user account performing a recharge act based on the recorded risk score information, includes: and sending a risk reminder to the user account when the user account performing recharging actions is determined to have abnormal risk based on the recorded risk score information.
In one possible embodiment, the risk control module 34 is further configured to, after sending the risk alert to the user account if it is determined that the user account performing the recharging operation has an abnormal risk based on the recorded risk score information, disable the user account until the user side completes the set compensation operation if it is detected that the user account performing the recharging operation has an abnormal behavior.
In one possible embodiment, risk control module 34, when performing a recharge risk control process on a user account performing a recharge act based on the recorded risk score information, includes: determining historical behavior information of the user account under the condition that the user account performing recharging behavior is determined to have abnormal risk based on the recorded risk score information; and sending a user verification request to the user account based on the historical behavior information, and carrying out recharging risk control processing on recharging behaviors of the user terminal based on the user verification information returned by the user account based on the user verification request.
It should be noted that, in the embodiment of the recharging risk control device, each unit and module included are only divided according to the functional logic, but are not limited to the above-mentioned division, so long as the corresponding functions can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the embodiments of the present application.
The embodiment of the application also provides a recharging risk control device which can integrate the recharging risk control device provided by the embodiment of the application. Fig. 4 is a schematic structural diagram of a recharging risk control device according to an embodiment of the present application. Referring to fig. 4, the recharging risk control device includes: an input device 43, an output device 44, a memory 42, and one or more processors 41; a memory 42 for storing one or more programs; the one or more programs, when executed by the one or more processors 41, cause the one or more processors 41 to implement the method of risk control of top-up as provided in the above embodiments. Wherein the input device 43, the output device 44, the memory 42 and the processor 41 may be connected by a bus or otherwise, for example in fig. 4 by a bus connection.
The memory 42 is used as a computer readable storage medium for storing software programs, computer executable programs and modules, such as program instructions/modules corresponding to the method for controlling risk of recharging according to any embodiment of the present application (e.g., the information obtaining module 31, the risk evaluating module 32, the score recording module 33 and the risk control module 34 in the risk controlling device). The memory 42 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, at least one application program required for functions; the storage data area may store data created according to the use of the device, etc. In addition, memory 42 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some examples, memory 42 may further comprise memory located remotely from processor 41, which may be connected to the device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 43 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the device. The output device 44 may include a display device such as a display screen.
The processor 41 executes various functional applications of the device and data processing, namely, implements the recharging risk control method described above by running software programs, instructions and modules stored in the memory 42.
The recharging risk control device, the recharging risk control equipment and the recharging risk control computer provided by the embodiment can be used for executing the recharging risk control method provided by any embodiment, and have corresponding functions and beneficial effects.
The embodiment of the present application also provides a storage medium storing computer-executable instructions that when executed by a computer processor are configured to perform the risk of top-up control method provided in the embodiment, the risk of top-up control method including: acquiring user association information of a user account; under the condition that the user associated information meets the set score updating condition, the user associated information is input into a trained risk score model, risk score analysis is carried out on the basis of the user associated information through the risk score model, and risk score information of a user account is determined; recording risk score information of the user account; and carrying out recharging risk control processing on the user account carrying out recharging behaviors based on the recorded risk score information.
Storage media-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, lanbas (Rambus) RAM, etc.; nonvolatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a second, different computer system connected to the first computer system through a network such as the internet. The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations (e.g., in different computer systems connected by a network). The storage medium may store program instructions (e.g., embodied as a computer program) executable by one or more processors.
Of course, the storage medium storing the computer executable instructions provided in the embodiments of the present application is not limited to the recharging risk control method provided above, and may also perform the relevant operations in the recharging risk control method provided in any embodiment of the present application.
The recharging risk control device, the recharging risk control equipment and the storage medium provided in the foregoing embodiments may execute the recharging risk control method provided in any embodiment of the present application, and technical details not described in detail in the foregoing embodiments may be referred to the recharging risk control method provided in any embodiment of the present application.
The foregoing description is only of the preferred embodiments of the application and the technical principles employed. The present application is not limited to the specific embodiments provided herein, and various obvious changes, rearrangements and substitutions can be made by those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit of the application, the scope of which is set forth in the following claims.

Claims (10)

1. A method for risk control of recharging, comprising:
acquiring user association information of a user account;
under the condition that the user associated information meets the set score updating condition, inputting the user associated information into a trained risk score model, and carrying out risk score analysis based on the user associated information through the risk score model to determine risk score information of the user account;
recording the risk score information of the user account;
and carrying out recharging risk control processing on the user account carrying out recharging behaviors based on the recorded risk score information.
2. The refill risk control method of claim 1, further comprising:
acquiring user sample information and recharging result information of a sample account, and performing data cleaning on the user sample information to determine risk sample data;
determining a plurality of risk sample labels based on the recharging result information and the risk sample data, and determining sample risk scores corresponding to the risk sample labels;
and training a risk score model based on the risk sample tags and the sample risk scores.
3. The method for risk control of recharging according to claim 1, further comprising, after the obtaining the user-associated information of the user account:
and under the condition that the change amount of the user associated information reaches a set change threshold value, determining that the user associated information meets a set score updating condition.
4. The method for risk control of claim 1, further comprising, after the recording of the risk score information of the user account:
determining risk trend information of the user account according to the risk score information and the risk score information of the history record under the condition that the user account is determined to have no abnormal risk based on the recorded risk score information;
and under the condition that the risk trend information reaches a set trend threshold value, acquiring user associated information of the user account according to a first set information updating period so as to update risk score information of the user account.
5. The method for risk control of recharging according to claim 1, wherein the risk control process for recharging a user account performing recharging based on the recorded risk score information includes:
and sending a risk reminder to the user account under the condition that the user account performing recharging actions is determined to have abnormal risk based on the recorded risk score information.
6. The method according to claim 5, wherein, in a case where it is determined that there is an abnormal risk in the user account performing the recharging operation based on the recorded risk score information, after sending a risk alert to the user account, further comprising:
and under the condition that the abnormal behavior of the setting of the user account for recharging behavior is detected, the user account is subjected to sealing and forbidden processing until the user end finishes the set compensation behavior.
7. The method for risk control of recharging according to claim 1, wherein the risk control process for recharging a user account performing recharging based on the recorded risk score information includes:
determining historical behavior information of a user account for recharging based on the recorded risk score information under the condition that the user account is abnormal in risk;
and sending a user verification request to the user account based on the historical behavior information, and carrying out recharging risk control processing on the recharging behavior of the user terminal based on the user verification information returned by the user account based on the user verification request.
8. The recharging risk control device is characterized by comprising an information acquisition module, a risk evaluation module, a score recording module and a risk control module, wherein:
the information acquisition module is used for acquiring user association information of a user account;
the risk evaluation module is used for inputting the user associated information into a trained risk score model under the condition that the user associated information meets a set score updating condition, and carrying out risk score analysis on the basis of the user associated information through the risk score model to determine risk score information of the user account;
the score recording module is used for recording the risk score information of the user account;
and the risk control module is used for carrying out recharging risk control processing on the user account carrying out recharging behaviors based on the recorded risk score information.
9. A refill risk control device, comprising: a memory and one or more processors;
the memory is used for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the top-up risk control method of any of claims 1-7.
10. A storage medium storing computer executable instructions which, when executed by a computer processor, are for performing the top-up risk control method of any of claims 1-7.
CN202310946657.6A 2023-07-28 2023-07-28 Recharging risk control method, device, equipment and storage medium Pending CN117035782A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310946657.6A CN117035782A (en) 2023-07-28 2023-07-28 Recharging risk control method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310946657.6A CN117035782A (en) 2023-07-28 2023-07-28 Recharging risk control method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117035782A true CN117035782A (en) 2023-11-10

Family

ID=88621828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310946657.6A Pending CN117035782A (en) 2023-07-28 2023-07-28 Recharging risk control method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117035782A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711846A (en) * 2018-11-26 2019-05-03 平安科技(深圳)有限公司 Payment request processing method, device, computer equipment and storage medium
CN110399925A (en) * 2019-07-26 2019-11-01 腾讯科技(武汉)有限公司 Risk Identification Method, device and the storage medium of account
CN111932262A (en) * 2020-09-27 2020-11-13 南京吉拉福网络科技有限公司 Methods, computing devices, and media for identifying transaction risk with respect to consumption credentials
US20230007932A1 (en) * 2021-07-01 2023-01-12 Novi Digital Entertainment Private Limited System and Method for Mitigating Risk of Frauds Related to Streaming Content Consumption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711846A (en) * 2018-11-26 2019-05-03 平安科技(深圳)有限公司 Payment request processing method, device, computer equipment and storage medium
CN110399925A (en) * 2019-07-26 2019-11-01 腾讯科技(武汉)有限公司 Risk Identification Method, device and the storage medium of account
CN111932262A (en) * 2020-09-27 2020-11-13 南京吉拉福网络科技有限公司 Methods, computing devices, and media for identifying transaction risk with respect to consumption credentials
US20230007932A1 (en) * 2021-07-01 2023-01-12 Novi Digital Entertainment Private Limited System and Method for Mitigating Risk of Frauds Related to Streaming Content Consumption

Similar Documents

Publication Publication Date Title
CN104836781B (en) Distinguish the method and device for accessing user identity
US8370389B1 (en) Techniques for authenticating users of massive multiplayer online role playing games using adaptive authentication
CN110442712B (en) Risk determination method, risk determination device, server and text examination system
WO2018072580A1 (en) Method for detecting illegal transaction and apparatus
CN105913257A (en) System And Method For Detecting Fraudulent Online Transactions
CN112508568B (en) Nuclear product pushing and nuclear method and system
CN106790220B (en) A kind of game account lease management system
CN112561633B (en) Virtual object order data verification method, device and equipment
CN110009365B (en) User group detection method, device and equipment for abnormally transferring electronic assets
CN112330355B (en) Method, device, equipment and storage medium for processing consumption coupon transaction data
US11520916B2 (en) System and method for automated on-screen sensitive data identification and obfuscation
CN110020512A (en) A kind of method, apparatus, equipment and the storage medium of anti-crawler
CN108133373A (en) Seek the method and device for the adventure account for relating to machine behavior
CN109389400A (en) The system and method for potential danger equipment are identified during user interacts with bank service
US11786825B2 (en) Fraud detection system
EP4095783A1 (en) System, method and apparatus for creating, testing and disseminating fraud rules
CN113344695B (en) Elastic wind control method, device, equipment and readable medium
Kim et al. Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors
CN110490698A (en) A kind of unmanned misplaced detection method and device of store shelf article
CN109657148A (en) For abnormal operation recognition methods, device, server and the medium for reporting POI
CN108460269A (en) Verification method and device, verification terminal device
CN117035782A (en) Recharging risk control method, device, equipment and storage medium
CN111191215A (en) Safety equipment identification method and system
CN110209563A (en) Examination question assessment monitoring and managing method, electronic equipment and computer storage medium
CN110876851A (en) Plug-in identification method, server, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination