WO2016180267A1 - 交互数据的处理方法及装置 - Google Patents

交互数据的处理方法及装置 Download PDF

Info

Publication number
WO2016180267A1
WO2016180267A1 PCT/CN2016/081089 CN2016081089W WO2016180267A1 WO 2016180267 A1 WO2016180267 A1 WO 2016180267A1 CN 2016081089 W CN2016081089 W CN 2016081089W WO 2016180267 A1 WO2016180267 A1 WO 2016180267A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
data
interaction data
behavior
interaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/081089
Other languages
English (en)
French (fr)
Chinese (zh)
Inventor
付杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to SG11201709271SA priority Critical patent/SG11201709271SA/en
Priority to JP2017559441A priority patent/JP6745818B2/ja
Priority to EP16792117.0A priority patent/EP3296943A4/en
Priority to KR1020177035795A priority patent/KR102127039B1/ko
Publication of WO2016180267A1 publication Critical patent/WO2016180267A1/zh
Priority to US15/809,799 priority patent/US10956847B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • the present application relates to the field of computers, and in particular, to a method and an apparatus for processing interactive data.
  • the existing method is to collect device information of the user terminal device, and/or environmental information of the user (for example) , the geographical location, the IP address, and the like) to determine the security of the currently initiated interaction data, for example, to determine whether it is the interaction data initiated by the user himself.
  • the purpose of the application is to provide a method and device for processing interactive data, which can improve the security of interactive data and reduce the user's interference rate.
  • an embodiment of the present application provides a method for processing interaction data, including:
  • the method further includes establishing a risk model, which specifically includes:
  • the security threshold range corresponding to the dimension and constructing a risk model corresponding to the user, wherein the length of the first time interval is greater than the second time interval.
  • the substituting the value of the user behavior of the at least one preset dimension corresponding to the service interaction data into the risk model specifically includes:
  • the value of the user behavior of the at least one preset dimension corresponding to the service interaction data is substituted into the risk model.
  • the preset dimension and the user are related to an instant information interaction behavior between a third party involved in the business interaction data.
  • the preset user behavior includes:
  • the communication time of the user's interaction with the third party's instant information involved in the business interaction data, the data size of the user's interaction with the third party's instant information involved in the business interaction data, and the instant information of the third party involved in the user and business interaction data The interval between the end of the interaction and the initiation of business interaction data.
  • determining whether the user behavior data of the preset dimension is located within a security threshold of the risk model specifically includes:
  • the communication time of the user's interaction with the third party involved in the business interaction data, the data size of the user's interaction with the third party involved in the business interaction data, and the instant information of the third party involved in the user interaction data Whether the interval from the end of the interaction to the initiation of the service interaction data falls within the corresponding security threshold.
  • an embodiment of the present application provides an apparatus for processing interactive data, the apparatus comprising:
  • An interaction module configured to receive user-initiated business interaction data
  • a processing module configured to substitute user behavior data of at least one preset dimension corresponding to the service interaction data into a risk model corresponding to the user, wherein the preset dimension is related to an interaction behavior between the user and a third party involved in the business interaction data;
  • the device further includes a model construction module, configured to:
  • the security threshold range corresponding to the dimension and constructing a risk model corresponding to the user, wherein the length of the first time interval is greater than the second time interval.
  • the device further includes an adaptation module, configured to:
  • the preset user behavior includes:
  • the communication time of the user's interaction with the third party's instant information involved in the business interaction data, the data size of the user's interaction with the third party's instant information involved in the business interaction data, and the instant information of the third party involved in the user and business interaction data The interval between the end of the interaction and the initiation of business interaction data.
  • the processing module is specifically configured to:
  • the communication time of the user's interaction with the third party involved in the business interaction data, the data size of the user's interaction with the third party involved in the business interaction data, and the instant information of the third party involved in the user interaction data Whether the interval from the end of the interaction to the initiation of the service interaction data falls within the corresponding security threshold.
  • the technical effect of the present application lies in: the history before the user initiates the business interaction data. Behavior, construct a risk model of business interaction data, to judge the security of current business interaction data through the risk model, reduce the interference rate to the user, and improve the network communication efficiency.
  • FIG. 1 is a flowchart of a method for processing interaction data in an embodiment of the present application
  • FIG. 2 is a flow chart of establishing a risk model in an embodiment of the present application.
  • the method for processing the interaction data includes:
  • S101 Receive service interaction data initiated by a user.
  • the technical solution of the present application is described in detail by taking the service interaction data of the network transaction service as an example.
  • the service interaction data may not be limited to the service interaction data of the network transaction service, and the technical solution of the application may be applied to other services by using a technical means, and details are not described herein again.
  • the user-initiated real-time transaction may generate the business transaction data, and after generating the business transaction data, the transaction system/server may receive the business transaction data.
  • the business transaction data needs to be evaluated to determine whether it is safe.
  • determining whether the business transaction data is secure is performed by a user-specific risk model (for example, confirming a corresponding risk model by a user ID), and user behavior data of a preset dimension corresponding to the business transaction data. of.
  • the preset dimension and the interaction behavior between the user and the third party involved in the business interaction data are related.
  • the risk model may be The risk model updated by the user history behavior of the preset dimension corresponding to the historical business interaction data of the pre-network transaction service initiation time of 24 hours.
  • the step of substituting the value of the user behavior of the at least one preset dimension corresponding to the service interaction data into the risk model specifically includes:
  • the value of the user behavior of the at least one preset dimension corresponding to the service interaction data is substituted into the risk model.
  • the business interaction data does not have a user behavior of a corresponding preset dimension.
  • the user when the user A conducts the network transaction service, the user does not interact with the third party involved in the business interaction data. It can be understood that in such a case, it is impossible to judge the security of the current business interaction data by substituting the user behavior data of the preset dimension into the risk model.
  • the security of the service interaction data can be judged by comparing the traditional technical solutions, for example, by collecting device information of the user terminal device, and/or environment information of the user (for example, geographic location, IP address, etc.) ) to determine the security of the currently initiated interaction data.
  • the user behavior data of the preset dimension is brought into the risk model to determine the security of the current business interaction data.
  • the number of network transaction services of user A is small, or the user interaction data of user A's network transaction service has less user behavior corresponding to the preset dimension, which is not enough to form corresponding user A.
  • the risk model that is, the risk model of the corresponding user A is not established in the transaction system/server. It can be understood that in this case, it is impossible to judge the security of the business interaction data by substituting the user behavior data of the preset dimension into the risk model. Sex.
  • the security of the service interaction data can be judged by comparing the traditional technical solutions, for example, by collecting device information of the user terminal device, and/or environment information of the user (for example, geographic location, IP address, etc.) ) to determine the security of the currently initiated interaction data.
  • the preset dimension and the user are related to the instant information interaction behavior between the third parties involved in the business interaction data.
  • the user behavior data of the preset dimension includes: a communication time of the user interacting with the instant information of the third party involved in the business interaction data, a data size of the instant information interaction between the user and the third party involved in the business interaction data, and the user and the user The interval between the end of the instant information interaction of the third party involved in the business interaction data and the time of initiating the business interaction data.
  • the user After analyzing the big data, the user has the habit of communicating with the seller (third party) on the details of the product, whether there is a desired style, and whether or not the transaction details are available in the online transaction.
  • Time for different users and sellers to communicate The length, the size of the recorded data communicated with the seller, and the interval between the completion of the communication with the seller and the initiation of the payment have their own unique behavioral habits, and the use of these behavioral habits of the user can identify whether the current user is the user, whether the current business interaction data is Security will provide a good protection for the buyer's payment security when shopping.
  • determining whether the user behavior data of the preset dimension is located within a security threshold of the risk model specifically includes: determining, by the user, the interaction of the instant information of the third party involved in the service interaction data.
  • the time, the data size of the user's interaction with the third party's instant information involved in the business interaction data, the time interval between the user's interaction with the third party's instant information involved in the business interaction data, and the interval between the initiation of the service interaction data are all in the corresponding security.
  • the threshold range that is, all the above three dimensions fall within the corresponding security threshold range, indicating that the service interaction data is secure.
  • the method further includes establishing a risk model, which specifically includes:
  • S205 Calculate the difference between the first average value or the first variance and the second average value or the second variance, or the difference between the first average value and the second average value, using a decision tree Presetting the security threshold range corresponding to the dimension and constructing a risk model corresponding to the user, wherein the first time interval length is greater than the second time interval.
  • the user ID is used as the main key to obtain the chat records of the user before the transaction and the seller on all the designated platforms in one year, including: the length of time the user and the seller communicate, the record data size communicated with the seller, and the communication with the seller to initiate the payment. Interval.
  • the users who have met certain conditions in the past such as the number of network transaction services is greater than or equal to the preset number.
  • the length of time for selecting the user and the seller to communicate with the seller the size of the record data exchanged with the seller, and the interval between the completion of the communication by the seller and the initiation of the payment are respectively aggregated.
  • the average or variance of the length of time for each selected user and seller to communicate, the average or variance of the size of the record data communicated by the seller, and the average or square of the interval between the seller's communication and the initiation of the payment can be obtained. difference. It is possible to go to the historical behavior data that the user communicates with the seller when initiating business interaction data (before transaction payment).
  • the risk model can be constructed based on the historical behavior data and the sample behavior data, and the decision tree is constructed; of course, the absolute value of the deviation between the sample behavior data and the corresponding data in the historical behavior data can be calculated first, and then according to the absolute value.
  • the decision tree is used to construct a risk model, which can define a security threshold corresponding to each preset dimension (the length of time the user and the seller communicate, the size of the record data communicated with the seller, and the interval between the seller's communication completion and the initiation of the payment). range.
  • the apparatus for processing interactive data includes:
  • the interaction module 100 is configured to receive user-initiated service interaction data.
  • the processing module 200 is configured to substitute the user behavior data of the at least one preset dimension corresponding to the service interaction data into the risk model 400 corresponding to the user;
  • the technical solution of the present application is described in detail by taking the service interaction data of the network transaction service as an example.
  • the service interaction data may not be limited to the service interaction data of the network transaction service, and the technical solution of the application may be applied to other services by using a technical means, and details are not described herein again.
  • the user-initiated real-time transaction may generate the business transaction data, and after generating the business transaction data, the transaction system/server may receive the business transaction data.
  • the business transaction data needs to be evaluated to determine whether it is safe.
  • determining whether the business transaction data is secure is a risk model 400 corresponding to the user (for example, confirming the corresponding risk model 400 by the user ID), and a user behavior of a preset dimension corresponding to the business transaction data.
  • the data is carried out.
  • the preset dimension and the interaction behavior between the user and the third party involved in the business interaction data are related.
  • the risk model 400 may be a user of a preset dimension corresponding to the historical service interaction data of the current network transaction service initiation time of 24 hours. A risk model updated by historical behavior.
  • the device further includes an adaptation module 500, configured to determine whether there is user behavior data of a preset dimension corresponding to the service interaction data;
  • the value of the user behavior of the at least one preset dimension corresponding to the service interaction data is substituted into the risk model 400 by the processing module 200.
  • the business interaction data does not have a user behavior of a corresponding preset dimension.
  • the user when the user A conducts the network transaction service, the user does not interact with the third party involved in the business interaction data. It can be understood that, in such a case, it is impossible to judge the security of the current business interaction data by substituting the user behavior data of the preset dimension into the risk model 400.
  • the security of the service interaction data can be judged by comparing the traditional technical solutions, for example, by collecting device information of the user terminal device, and/or environment information of the user (for example, geographic location, IP address, etc.) ) to determine the security of the currently initiated interaction data.
  • the user behavior data of the preset dimension is brought into the risk model 400 to determine the security of the current business interaction data.
  • the number of network transaction services of user A is small, or the user interaction data of user A's network transaction service has less user behavior corresponding to the preset dimension, which is not enough to form corresponding user A.
  • the risk model that is, the risk model of the corresponding user A is not established in the transaction system/server. It can be understood that in this case, it is impossible to judge the security of the business interaction data by substituting the user behavior data of the preset dimension into the risk model. Sex.
  • the security of the service interaction data can be judged by comparing the traditional technical solutions, for example, by collecting device information of the user terminal device, and/or environment information of the user (for example, geographic location, IP address, etc.) ) to determine the security of the currently initiated interaction data.
  • the preset dimension and the user are related to the instant information interaction behavior between the third parties involved in the business interaction data.
  • the user After analyzing the big data, the user has the habit of communicating with the seller (third party) on the details of the product, whether there is a desired style, and whether or not the transaction details are available in the online transaction.
  • the length of time that different users and sellers communicate with each other, the size of the recorded data communicated with the seller, and the interval between the completion of the communication with the seller and the time the payment is initiated have their own unique behavioral habits, and the use of these behavioral habits of the user can identify whether the current user is User himself, when Whether the pre-business interaction data is secure will play a very good role in protecting the security of the buyer when shopping.
  • the processing module 200 is specifically configured to: determine a communication time of a user interacting with an instant information of a third party involved in the service interaction data, and an instant information of a third party involved in the user and the service interaction data. Whether the interaction of the data size, the user's interaction with the third party's instant information involved in the business interaction data, and the interval between the initiation of the service interaction data fall within the corresponding security threshold range, that is, the above three dimensions all fall into the corresponding The security threshold is within the scope of the security data.
  • the apparatus further includes a model construction module 300, configured to:
  • the security threshold range corresponding to the dimension and the risk model 400 corresponding to the user is constructed, wherein the first time interval length is greater than the second time interval.
  • the user ID is used as the main key to obtain the chat records of the user before the transaction and the seller on all the designated platforms in one year, including: the length of time the user and the seller communicate, the record data size communicated with the seller, and the communication with the seller to initiate the payment. Interval.
  • the users who have met certain conditions in the past such as the number of network transaction services is greater than or equal to the preset number.
  • the length of time for selecting the user and the seller to communicate with the seller the size of the record data exchanged with the seller, and the interval between the completion of the communication by the seller and the initiation of the payment are respectively aggregated.
  • the average or variance of the length of time that each selected user and seller communicates, the average or variance of the size of the recorded data communicated by the seller, and the average or variance of the interval between the seller's communication and the initiation of the payment can be obtained. It is possible to go to the historical behavior data that the user communicates with the seller when initiating business interaction data (before transaction payment).
  • the risk model 400 can be constructed according to the historical behavior data and the sample behavior data, and the decision tree is constructed; of course, the absolute value of the deviation between the sample behavior data and the corresponding data in the historical behavior data can be calculated first, and then according to the absolute Value, using the decision tree to construct a risk model 400, which can define each preset dimension (the length of time the user and the seller communicate, the size of the record data communicated with the seller, and the interval between the seller's communication completion and the initiation of the payment) The range of security thresholds.
  • the present application constructs a risk model of business interaction data through the historical behavior of the user before initiating the business interaction data, so as to judge the security of the current business interaction data through the risk model, and reduce the interruption rate to the user and improve Network communication efficiency.
  • the disclosed apparatus, apparatus, and method may be implemented in other manners.
  • the device implementations described above are merely illustrative.
  • the division of the modules is only a logical function division.
  • there may be another division manner for example, multiple modules or components may be combined or It can be integrated into another device, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or module, and may be electrical, mechanical or otherwise.
  • the modules described as separate components may or may not be physically separated.
  • the components displayed as modules may or may not be physical modules, that is, may be located in one place, or may be distributed to multiple network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
  • each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist physically separately, or two or more modules may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of hardware plus software function modules.
  • the above-described integrated modules implemented in the form of software function modules can be stored in a computer readable storage medium.
  • the software function module described above is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute the method of various embodiments of the present application. Part of the steps.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, and a read only A medium that can store program codes, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Software Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Educational Administration (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)
  • Input From Keyboards Or The Like (AREA)
PCT/CN2016/081089 2015-05-13 2016-05-05 交互数据的处理方法及装置 Ceased WO2016180267A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
SG11201709271SA SG11201709271SA (en) 2015-05-13 2016-05-05 Interaction data processing method and apparatus
JP2017559441A JP6745818B2 (ja) 2015-05-13 2016-05-05 対話データ処理方法及び装置
EP16792117.0A EP3296943A4 (en) 2015-05-13 2016-05-05 Method of processing exchanged data and device utilizing same
KR1020177035795A KR102127039B1 (ko) 2015-05-13 2016-05-05 상호작용 데이터 프로세싱 방법, 및 이를 이용하는 장치
US15/809,799 US10956847B2 (en) 2015-05-13 2017-11-10 Risk identification based on historical behavioral data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510244028.4A CN106296406A (zh) 2015-05-13 2015-05-13 交互数据的处理方法及装置
CN201510244028.4 2015-05-13

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/809,799 Continuation US10956847B2 (en) 2015-05-13 2017-11-10 Risk identification based on historical behavioral data

Publications (1)

Publication Number Publication Date
WO2016180267A1 true WO2016180267A1 (zh) 2016-11-17

Family

ID=57248651

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/081089 Ceased WO2016180267A1 (zh) 2015-05-13 2016-05-05 交互数据的处理方法及装置

Country Status (7)

Country Link
US (1) US10956847B2 (enExample)
EP (1) EP3296943A4 (enExample)
JP (1) JP6745818B2 (enExample)
KR (1) KR102127039B1 (enExample)
CN (1) CN106296406A (enExample)
SG (2) SG11201709271SA (enExample)
WO (1) WO2016180267A1 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581191A (zh) * 2020-04-10 2020-08-25 岭东核电有限公司 核安全数据校验方法、装置、计算机设备及存储介质

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10021120B1 (en) 2015-11-09 2018-07-10 8X8, Inc. Delayed replication for protection of replicated databases
WO2019104350A1 (en) * 2017-11-27 2019-05-31 ArmorBlox, Inc. User model-based data loss prevention
CN110020861A (zh) * 2018-01-08 2019-07-16 阿里巴巴集团控股有限公司 交易风险分值处理方法、装置、服务器及存储介质
CN108449313B (zh) * 2018-02-01 2021-02-19 平安科技(深圳)有限公司 电子装置、互联网服务系统风险预警方法及存储介质
CN110390445A (zh) * 2018-04-16 2019-10-29 阿里巴巴集团控股有限公司 操作风险的识别方法、装置和系统
CN108880879B (zh) * 2018-06-11 2021-11-23 北京五八信息技术有限公司 用户身份识别方法、装置、设备及计算机可读存储介质
CN110046779B (zh) * 2018-11-01 2023-05-02 创新先进技术有限公司 一种数据处理方法及装置、一种计算设备及存储介质
US11176556B2 (en) * 2018-11-13 2021-11-16 Visa International Service Association Techniques for utilizing a predictive model to cache processing data
CN109815533A (zh) * 2018-12-14 2019-05-28 南京河海南自水电自动化有限公司 一种不同工况下水电机组部件运行数据分析方法及系统
CN110059984A (zh) * 2019-04-30 2019-07-26 深信服科技股份有限公司 安全风险识别方法、装置、设备及存储介质
CN110516418A (zh) * 2019-08-21 2019-11-29 阿里巴巴集团控股有限公司 一种操作用户识别方法、装置及设备
US10885160B1 (en) 2019-08-21 2021-01-05 Advanced New Technologies Co., Ltd. User classification
CN110648052B (zh) * 2019-09-02 2022-07-01 浙江大搜车软件技术有限公司 风控决策方法、装置、计算机设备和存储介质
CN111612499B (zh) * 2020-04-03 2023-07-28 浙江口碑网络技术有限公司 信息的推送方法及装置、存储介质、终端
CN111598622A (zh) * 2020-05-21 2020-08-28 深圳市元征科技股份有限公司 一种资格权益数据的生成方法、装置、设备及存储介质
CN111639318A (zh) * 2020-05-26 2020-09-08 深圳壹账通智能科技有限公司 移动终端上基于手势监测的风控方法及相关装置
CN111913859B (zh) * 2020-07-13 2023-11-14 北京天空卫士网络安全技术有限公司 一种异常行为检测方法和装置
CN112085609A (zh) * 2020-08-28 2020-12-15 车主邦(北京)科技有限公司 一种保险服务数据处理方法及装置
CN112529481A (zh) * 2021-02-08 2021-03-19 北京淇瑀信息科技有限公司 一种用户捞回方法、装置及电子设备
US12266022B2 (en) * 2021-03-22 2025-04-01 Ncr Voyix Corporation Data-driven valuable media balance optimization processing
CN113420941A (zh) * 2021-07-16 2021-09-21 湖南快乐阳光互动娱乐传媒有限公司 用户行为的风险预测方法及装置
US20230055605A1 (en) * 2021-08-17 2023-02-23 The Toronto-Dominion Bank Targeted, criteria-specific provisioning of digital content based on structured messaging data
CN114219324B (zh) * 2021-12-17 2024-12-24 中国建设银行股份有限公司 一种服务订单的风险管控方法及相关装置
WO2023128865A2 (en) * 2021-12-29 2023-07-06 Gp Network Asia Pte. Ltd. A communications server, a method, a user device, and system
CN115034914A (zh) * 2022-06-17 2022-09-09 中国银行股份有限公司 一种银行智能柜台提供夜间业务的处理方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103853841A (zh) * 2014-03-19 2014-06-11 北京邮电大学 一种社交网用户异常行为的分析方法
CN103875015A (zh) * 2011-08-25 2014-06-18 T移动美国公司 利用用户行为的多因子身份指纹采集
US20140201120A1 (en) * 2013-01-17 2014-07-17 Apple Inc. Generating notifications based on user behavior
CN104318138A (zh) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 一种验证用户身份的方法和装置
CN104469805A (zh) * 2013-09-13 2015-03-25 同济大学 基于用户行为分析的即时通讯业务流量生成方法

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7403922B1 (en) 1997-07-28 2008-07-22 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
JPH11338924A (ja) * 1998-05-25 1999-12-10 Omron Corp カード決済システム
US7668769B2 (en) 2005-10-04 2010-02-23 Basepoint Analytics, LLC System and method of detecting fraud
EP1816595A1 (en) * 2006-02-06 2007-08-08 MediaKey Ltd. A method and a system for identifying potentially fraudulent customers in relation to network based commerce activities, in particular involving payment, and a computer program for performing said method
JP2008158683A (ja) * 2006-12-21 2008-07-10 Hitachi Software Eng Co Ltd 認証システム
US20090307049A1 (en) * 2008-06-05 2009-12-10 Fair Isaac Corporation Soft Co-Clustering of Data
US10410220B2 (en) 2008-06-12 2019-09-10 Guardian Analytics, Inc. Fraud detection and analysis system
JP5142883B2 (ja) * 2008-08-14 2013-02-13 株式会社東芝 本人識別装置
US20100161399A1 (en) * 2008-11-14 2010-06-24 Nicholas David Posner Instant payout incentive system
US10242540B2 (en) * 2009-09-02 2019-03-26 Fair Isaac Corporation Visualization for payment card transaction fraud analysis
JP2011059837A (ja) * 2009-09-08 2011-03-24 Hitachi Ltd 行動履歴情報活用個人認証システム及び方法
US8504456B2 (en) 2009-12-01 2013-08-06 Bank Of America Corporation Behavioral baseline scoring and risk scoring
US20110307381A1 (en) * 2010-06-10 2011-12-15 Paul Kim Methods and systems for third party authentication and fraud detection for a payment transaction
US20120109821A1 (en) 2010-10-29 2012-05-03 Jesse Barbour System, method and computer program product for real-time online transaction risk and fraud analytics and management
US9117074B2 (en) * 2011-05-18 2015-08-25 Microsoft Technology Licensing, Llc Detecting a compromised online user account
JP2013008232A (ja) * 2011-06-24 2013-01-10 Sony Corp 情報処理装置とサーバと情報処理システムおよび情報処理方法とプログラム
WO2013086048A1 (en) 2011-12-05 2013-06-13 Visa International Service Association Dynamic network analytic system
JP5246823B1 (ja) 2012-06-29 2013-07-24 サミー株式会社 弾球遊技機
JP6003586B2 (ja) * 2012-11-29 2016-10-05 富士通株式会社 クラスタリングプログラム、クラスタリング方法、およびクラスタリング装置
CN103793484B (zh) * 2014-01-17 2017-03-15 五八同城信息技术有限公司 分类信息网站中的基于机器学习的欺诈行为识别系统
US20150032589A1 (en) 2014-08-08 2015-01-29 Brighterion, Inc. Artificial intelligence fraud management solution
CN105516071B (zh) 2014-10-13 2019-01-18 阿里巴巴集团控股有限公司 验证业务操作安全性的方法、装置、终端及服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103875015A (zh) * 2011-08-25 2014-06-18 T移动美国公司 利用用户行为的多因子身份指纹采集
US20140201120A1 (en) * 2013-01-17 2014-07-17 Apple Inc. Generating notifications based on user behavior
CN104469805A (zh) * 2013-09-13 2015-03-25 同济大学 基于用户行为分析的即时通讯业务流量生成方法
CN103853841A (zh) * 2014-03-19 2014-06-11 北京邮电大学 一种社交网用户异常行为的分析方法
CN104318138A (zh) * 2014-09-30 2015-01-28 杭州同盾科技有限公司 一种验证用户身份的方法和装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3296943A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581191A (zh) * 2020-04-10 2020-08-25 岭东核电有限公司 核安全数据校验方法、装置、计算机设备及存储介质
CN111581191B (zh) * 2020-04-10 2023-10-13 岭东核电有限公司 核安全数据校验方法、装置、计算机设备及存储介质

Also Published As

Publication number Publication date
CN106296406A (zh) 2017-01-04
US10956847B2 (en) 2021-03-23
EP3296943A4 (en) 2018-10-10
JP2018517976A (ja) 2018-07-05
SG10201907626TA (en) 2019-09-27
US20180082229A1 (en) 2018-03-22
JP6745818B2 (ja) 2020-08-26
SG11201709271SA (en) 2017-12-28
KR20180006955A (ko) 2018-01-19
KR102127039B1 (ko) 2020-06-26
EP3296943A1 (en) 2018-03-21

Similar Documents

Publication Publication Date Title
WO2016180267A1 (zh) 交互数据的处理方法及装置
EP3797396B1 (en) Blockchain transaction safety
KR102151862B1 (ko) 서비스 처리 방법 및 장치
JP2018517976A5 (enExample)
CN109191226B (zh) 风险控制方法和装置
WO2020177450A1 (zh) 信息归并方法、交易查询方法、装置、计算机及存储介质
WO2015043491A1 (zh) 一种用于对互联网账号的登录进行安全验证的方法及系统
WO2020211247A1 (zh) 账户信息的登录方法、装置、计算机设备及计算机存储介质
WO2017028630A1 (zh) 一种验证方法及服务器
CN105389488B (zh) 身份认证方法及装置
CN103578030B (zh) 一种web业务数据处理方法和web业务数据处理装置
JP2018520447A (ja) トークン化のためのシステムおよび方法
CN105516133A (zh) 用户身份的验证方法、服务器及客户端
CN108022181A (zh) 酒店快速入住方法及装置和电子设备
WO2021068626A1 (zh) 异常交易识别方法和装置
US20240283802A1 (en) Device analytics engine
WO2018006717A1 (zh) 订单信息处理以及订单类型转换处理方法及装置
WO2019024497A1 (zh) 客户回访事件的生成方法、装置、终端设备及介质
WO2020038036A1 (zh) 一种基于区块链存证的识别证据真实性的方法及装置
US11227220B2 (en) Automatic discovery of data required by a rule engine
WO2017128684A1 (zh) 一种交易系统及交易处理方法
CN111506486B (zh) 数据处理方法及系统
CN111460403A (zh) 一种信息处理方法和系统
JP2016051396A (ja) 取引管理システムおよび取引管理方法
CN107516213B (zh) 风险识别方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16792117

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 11201709271S

Country of ref document: SG

ENP Entry into the national phase

Ref document number: 2017559441

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20177035795

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2016792117

Country of ref document: EP