WO2021004123A1 - Blockchain-based information processing apparatus and method, and storage medium - Google Patents

Blockchain-based information processing apparatus and method, and storage medium Download PDF

Info

Publication number
WO2021004123A1
WO2021004123A1 PCT/CN2020/086276 CN2020086276W WO2021004123A1 WO 2021004123 A1 WO2021004123 A1 WO 2021004123A1 CN 2020086276 W CN2020086276 W CN 2020086276W WO 2021004123 A1 WO2021004123 A1 WO 2021004123A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
score
risk
information
records
Prior art date
Application number
PCT/CN2020/086276
Other languages
French (fr)
Chinese (zh)
Inventor
张起
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021004123A1 publication Critical patent/WO2021004123A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Definitions

  • This application relates to the field of information analysis technology, and in particular to a blockchain-based information processing device, method, and storage medium.
  • the risk control and anti-fraud system can analyze the user's risk.
  • the traditional risk control and anti-fraud system stores a user blacklist. When the user handles the business, the blacklist can determine whether the user is at risk.
  • the inventor found that for some users who use fake identity information, it is impossible to further determine whether the user is at risk, which reduces the accuracy of risk control and anti-fraud system analysis and cannot effectively identify risky users. In view of this, a method that can improve the accuracy of analysis and effectively identify risk users has become a problem to be solved.
  • This application provides a block chain-based information processing device, method, and storage medium, aiming to improve the accuracy of analysis and effectively identify risky users.
  • the present application provides a blockchain-based information processing device.
  • the blockchain-based information processing device includes a memory and a processor connected to the memory.
  • the processing system running on the processor when the processing system is executed by the processor, the following steps are implemented: after the user logs in to the application platform for business processing using a terminal device, the first authorization agreement application is sent for the user to confirm whether to enable extraction
  • the authority of the terminal device s device information; if the instruction to confirm the activation of the authority is received, the device information of the terminal device is extracted, the user information of the user, and the list of risky users pre-stored in the blockchain are obtained based on the terminal device’s Device information, user information, and risk user list analyze whether the user is a risk user; if the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to enable the permission to extract user behavior information recorded in the terminal device ; If an instruction to confirm the permission is received, the user behavior information recorded in the terminal device is extracted every predetermined time, and
  • the blockchain-based information processing method includes: S1. After the user logs in to the application platform for business processing using a terminal device, the first Authorization agreement application for the user to confirm whether to open the permission to extract the device information of the terminal device; S2, if an instruction to confirm the permission is received, extract the device information of the terminal device, and obtain the user information and blockchain of the user Based on the device information, user information and risk user list of the terminal device, analyze whether the user is a risk user; S3, if the user is a non-risk user, send a second authorization agreement application for the user to confirm Whether to enable the permission to extract the user behavior information recorded in the terminal device; S4, if an instruction to confirm enabling the permission is received, extract the user behavior information recorded in the terminal device at predetermined intervals, and calculate the user behavior information based on the user behavior information.
  • the risk value of the user; S5 obtain the corresponding predetermined risk threshold based on the user behavior information, if the risk value of the user is greater than or equal to the risk threshold, mark the user as a risk user, and combine the user information of the user and the terminal
  • the device information of the device is added to the list of risky users of the blockchain.
  • the present application also provides a computer-readable storage medium having a processing system stored on the computer-readable storage medium, and when the processing system is executed by a processor, the steps of the above-mentioned blockchain-based information processing method are realized.
  • FIG. 1 is a schematic diagram of an optional application environment of each embodiment of this application.
  • FIG. 2 is a schematic diagram of the hardware architecture of an embodiment of the information processing device based on blockchain in FIG. 1;
  • Fig. 3 is a program module diagram of an embodiment of the processing system in Fig. 1 and Fig. 2;
  • FIG. 4 is a schematic flowchart of an embodiment of a blockchain-based information processing method of this application.
  • the blockchain-based information processing device 1 is connected to a terminal device used by the user (for example, a tablet computer, a notebook, or a smart phone).
  • the user logs in to the application platform through the terminal device to transact business.
  • the information processing device 1 based on the blockchain can extract the terminal device’s device information and user behavior information, and analyze the user’s behavior information. Whether it is a risk user.
  • the information processing device 1 based on the blockchain is a device that can automatically perform numerical calculation and/or information processing in accordance with pre-set or stored instructions.
  • the blockchain-based information processing device 1 may be a computer, a single network server, a server group composed of multiple network servers, or a cloud composed of a large number of hosts or network servers based on cloud computing, where cloud computing is distributed A type of computing, a super virtual computer composed of a group of loosely coupled computer sets.
  • the information processing device 1 based on the blockchain may include, but is not limited to, a memory 11, a processor 12, a network interface 13, and a memory 11 that can communicate with each other through a system bus.
  • a processing system 10 that can run on a processor 12.
  • Fig. 2 only shows the block chain-based information processing device 1 with components 11-13, but it should be understood that it is not required to implement all the shown components, and more or Fewer components.
  • the memory 11 includes a memory and at least one type of readable storage medium.
  • the memory provides cache for the operation of the information processing device 1 based on the blockchain;
  • the readable storage medium can be, for example, flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), Non-volatile storage of static random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, magnetic disks, optical disks, etc. medium.
  • the readable storage medium may be the internal storage unit of the blockchain-based information processing device 1, for example, the hard disk of the blockchain-based information processing device 1.
  • the non-transitory The lossy storage medium may also be an external storage device of the information processing device 1 based on the blockchain, for example, a plug-in hard disk or a smart media card (SMC) equipped on the information processing device 1 based on the blockchain. Secure Digital (SD) card, flash card (Flash Card), etc.
  • SD Secure Digital
  • flash Card flash card
  • the readable storage medium of the memory 11 is generally used to store the operating system and various application software installed in the information processing device 1 based on the blockchain, for example, to store the program of the processing system 10 in an embodiment of the present application Code etc.
  • the memory 11 can also be used to temporarily store various types of data that have been output or will be output.
  • the processor 12 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments, and is used to run data stored in the memory 11 Program code or processing data, such as running the processing system 10, etc.
  • CPU Central Processing Unit
  • controller microcontroller
  • microprocessor or other data processing chip in some embodiments, and is used to run data stored in the memory 11 Program code or processing data, such as running the processing system 10, etc.
  • the network interface 13 may include a standard wireless network interface and a wired network interface.
  • the network interface 13 is usually used to establish a communication connection between the blockchain-based information processing apparatus 1 and other electronic devices.
  • the processing system 10 is stored in the memory 11, and includes at least one computer-readable instruction stored in the memory 11, and the at least one computer-readable instruction can be executed by the processor 12 to implement the method of each embodiment of the present application; And, the at least one computer-readable instruction can be divided into different logic modules according to the different functions implemented by its parts.
  • the above-mentioned processing system 10 implements the following steps when being executed by the processor 12:
  • the device information of the terminal device is extracted, the user information of the user, the list of risk users pre-stored in the blockchain, and the device information of the terminal device, user information, and risk user list are obtained Analyze whether the user is a risk user;
  • the corresponding predetermined risk threshold is obtained based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, the user is marked as a risk user, and the user information of the user and the device information of the terminal device are added to the area The list of risky users of the blockchain.
  • the user behavior information includes non-application operation information
  • the non-application operation information includes call records, short message records, social application records, and web browsing records
  • the step of calculating the user's risk value based on the user behavior information Specifically including:
  • the user behavior information includes non-application operation information
  • the non-application operation information includes call records, short message records, social application records, web browsing records, use frequency of contacts, use frequency of short messages, and use of social applications Frequency and web page browsing frequency
  • the step of calculating the risk value of the user based on the user behavior information specifically includes:
  • the sum of the first score, the second score, and the third score is used as the risk value.
  • the user behavior information includes non-application operation information and application operation information
  • the non-application operation information includes call records, short message records, social application records, web browsing records, use frequency of address book, use frequency of short messages, The usage frequency of social applications and the browsing frequency of web pages
  • the application operation information includes application operation speed, application operation frequency, application operation time, and application operation modification times
  • the step of calculating the user's risk value based on the user behavior information Specifically including:
  • the sum of the first score, the second score, the third score, and the fourth score is used as the risk value.
  • FIG. 3 it is a program module diagram of the processing system 10 in FIGS. 1 and 2.
  • the processing system 10 is divided into multiple modules, and the multiple modules are stored in the memory 12 and executed by the processor 13 to complete the application.
  • the module referred to in this application refers to a series of computer program instruction segments that can complete specific functions.
  • the processing system 10 can be divided into: a first sending module 101, a first analysis module 102, a second sending module 103, a second analysis module 104, and a marking module 105.
  • the first sending module 101 is configured to send a first authorization agreement application after the user uses a terminal device to log in to the application platform for business processing, for the user to confirm whether to open the authority to extract device information of the terminal device;
  • the first analysis module 102 is configured to extract the device information of the terminal device if the instruction to confirm the activation of the permission is received, obtain the user information of the user, and the risk user list pre-stored in the blockchain, based on the device of the terminal device Information, user information and risk user list to analyze whether the user is a risk user;
  • the second analysis module 104 is configured to extract the user behavior information recorded in the terminal device every predetermined time if an instruction to confirm the activation of the authority is received, and calculate the risk value of the user based on the user behavior information;
  • the marking module 105 is configured to obtain a corresponding predetermined risk threshold based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, mark the user as a risk user, and combine the user information of the user and the terminal device The device information of is added to the list of risky users of the blockchain.
  • FIG. 4 is a schematic flowchart of an embodiment of a blockchain-based information processing method of this application, which is implemented when the processor 13 of the blockchain-based information processing device 1 executes the processing system 10 stored in the memory 12
  • the steps of the method are as follows:
  • Step S1 After the user logs in to the application platform for business processing using a terminal device, send a first authorization agreement application for the user to confirm whether to open the authority to extract the device information of the terminal device;
  • the terminal device may be a device held by an individual such as a mobile phone, a notebook, or a tablet computer.
  • the business can be a loan application, a credit card application, an insurance application, etc., of course, it can also be other business, for example, a business related to the user's credit risk.
  • the device information of the terminal device includes two aspects of information, one is hardware information, and the other is network information.
  • the hardware information includes the model/serial number of the terminal device, the serial number of the processor and the main board, the system version, IMEI, the physical hardware number of Wi-Fi, and the hardware number of Bluetooth. It is the only information of the terminal device; network information includes operation Business information, communication process, network location information, routing address, IP for public network, intranet distribution, and DNS resolution strategy, etc.
  • the first authorization agreement application sent is for the user to confirm whether to enable the permission to extract the device information of the terminal device. If the user agrees to enable the permission, click OK to authorize the organization corresponding to the application platform to extract the terminal device’s permission Device information; if the user does not agree to open the permission, you can click Cancel. In the case of cancellation, the business processing can be ended, or the first authorization agreement application can be sent to the user again for reconfirmation.
  • the application can call a predetermined programming interface of the terminal device to extract the device information.
  • Step S2 If the instruction to confirm the activation of the authority is received, the device information of the terminal device is extracted, the user information of the user, and the risk user list pre-stored in the blockchain are obtained, based on the device information, user information, and user information of the terminal device.
  • the risk user list analyzes whether the user is a risk user;
  • a list of risk users is pre-stored in the blockchain, and the user information of each risk user and the equipment information of the associated terminal equipment are recorded in the risk user list.
  • User information includes name, ID number, address, contact information, etc. Compare the user information of the user and the equipment information of the terminal equipment with the information of each user in the risk user list. If the user information of the user and the equipment information of the terminal equipment in the risk user list are the same as that of the user, confirm If the user is the same user, the user is at risk; if the user steals the identity information of others and uses the same terminal device to log in to the application platform for business transactions, since the terminal device has the same device information, it can also be identified as the same user, and the user is at risk user.
  • Step S3 If the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to open the authority to extract the user behavior information recorded in the terminal device;
  • the second authorization agreement application sent is for the user to confirm whether to open the permission to extract the user behavior information recorded in the terminal device. If the user agrees to open the permission, you can click OK to authorize the organization corresponding to the application platform to extract the User behavior information recorded in the terminal device; if the user does not agree to enable the permission, you can click Cancel. In the case of cancellation, the business processing can be ended, or the second authorization agreement application can be sent to the user again for reconfirmation.
  • the underlying method of the terminal device can be called by the application to extract the user behavior information recorded in the terminal device.
  • Step S4 if an instruction confirming the activation of the authority is received, extract the user behavior information recorded in the terminal device every predetermined time, and calculate the user's risk value based on the user behavior information;
  • the user behavior information recorded in the terminal device is directly extracted and the risk value of the user is calculated.
  • the information recorded in the terminal device is extracted every predetermined time (for example, one week) User behavior information and calculate the user’s risk value.
  • the user behavior information includes non-application operation information.
  • the application refers to the application for the user to handle business.
  • the non-application operation information includes call records, short message records, social application records, and web browsing records.
  • the steps of calculating the user’s risk value with user behavior information specifically include:
  • Obtain a preset first score relationship table analyze whether there is a risk user in the call record, record the first score based on the first score relationship table and the result of this analysis; obtain a preset second score
  • the relationship table extract keywords from the short message records, social application records, and web browsing records, and analyze whether the keywords have the same semantics as predetermined risk keywords, based on the second score relationship table and this analysis result Record the second score; use the first score or the second score or the sum of the first score and the second score as the risk value.
  • the frequency and time of contact with risky users in the call record can also be analyzed. If the frequency and time of contact with risky users are higher, the corresponding score is higher, and the risk is greater. In this way, the accuracy of the analysis can be improved.
  • Keyword extraction can use existing mature technologies, such as TF-IDF (Term Frequency-Inverse Document Frequency, term frequency-reverse text). Frequency) algorithm, LSA (Latent Semantic Analysis) algorithm, or PLSA (Probabilisitic Latent Semantic Analysis) algorithm and other keyword extraction algorithms.
  • the keywords are different depending on the business. For example, for the loan business, the keywords are for example: a certain loan APP, repayment date, collection, and a certain loan APP SMS verification (more frequent loan APP verification SMS will occur when multiple loans are made )and many more.
  • the predetermined risk keywords are, for example, repayment, collection, loan, etc.
  • the user is at a certain risk.
  • the number of keywords with the same semantics as the predetermined risk keywords can be counted.
  • the corresponding score is obtained from the preset second score relationship table.
  • the number of keywords with the same semantics as the predetermined risk keywords in the SMS records, social application records, and web browsing records and the corresponding scores are recorded, as shown in Table 2 below :
  • the time when keywords with the same semantics as the predetermined risk keywords in the short message records, social application records, and web browsing records appear can also be analyzed. The closer the time, the higher the corresponding score. In this way, the accuracy of the analysis can be improved.
  • first score or second score or the sum of the first score and the second score can be used as the risk value of the user.
  • the user behavior information includes non-application operation information
  • the non-application operation information includes call history, short message history, social application history, web browsing history, address book usage frequency, short message usage frequency, and social application usage information.
  • Frequency and web page browsing frequency the step of calculating the risk value of the user based on the user behavior information specifically includes:
  • Obtain a preset first score relationship table analyze whether there is a risk user in the call record, record the first score based on the first score relationship table and the result of this analysis; obtain a preset second score
  • the relationship table extract keywords from the short message records, social application records, and web browsing records, and analyze whether the keywords have the same semantics as predetermined risk keywords, based on the second score relationship table and this analysis result Record the second score; obtain the preset third score relationship table, based on the third score relationship table and the frequency of use of the address book, the frequency of use of text messages, the frequency of use of social applications, and the frequency of web page browsing Obtain a third score; use the sum of the first score, the second score, and the third score as the risk value.
  • the use frequency of the address book, the use frequency of short messages, the use frequency of social applications, and the browsing frequency of web pages are added as factors to consider whether the user is at risk. If the use frequency of the address book, the use frequency of text messages, the use frequency of social applications, and the frequency of web page browsing are all low, it is considered that the user does not use the terminal device frequently.
  • This risk can be analyzed in depth by combining the aforementioned call records, SMS records, social application records, and web browsing records, and the sum of the first score, the second score, and the third score can be used as the user's risk value.
  • This embodiment can further improve the accuracy of the risk value through the above-mentioned in-depth analysis of user behavior.
  • the user behavior information includes non-application operation information and application operation information.
  • the non-application operation information includes call records, short message records, social application records, web browsing records, address book usage frequency, short message usage frequency, The frequency of use of social applications and the frequency of browsing web pages.
  • the application operation information includes application operation speed, application operation frequency, application operation time, and application operation modification times. The step of calculating the user’s risk value based on the user behavior information is specifically include:
  • Obtain a preset first score relationship table analyze whether there is a risk user in the call record, record the first score based on the first score relationship table and the result of this analysis; obtain a preset second score The relationship table, extract keywords from the short message records, social application records, and web browsing records, and analyze whether the keywords have the same semantics as predetermined risk keywords, based on the second score relationship table and this analysis result Record the second score; obtain the preset third score relationship table, based on the third score relationship table and the frequency of use of the address book, the frequency of use of text messages, the frequency of use of social applications, and the frequency of web page browsing Obtain a third score; acquire a preset fourth score relationship table, and obtain a fourth score based on the fourth score relationship table and the application operation speed, application operation frequency, application operation time, and modification times of application operations Value; the sum of the first score, the second score, the third score, and the fourth score is used as the risk value.
  • This embodiment adds application operation information, that is, the corresponding operation information in the application used by the user to handle business, including application operation speed, application operation frequency, application operation time, and modification times of application operations, as a further consideration of whether the user has Factors of risk.
  • application operation information that is, the corresponding operation information in the application used by the user to handle business
  • application operation speed e.g., the application operation speed
  • application operation frequency e.g., application operation frequency
  • application operation time e.g., a further consideration of whether the user has Factors of risk.
  • This embodiment combines non-application operation information and application operation information to perform an in-depth analysis of user behavior, and further improves the accuracy of the risk value.
  • Step S5 Obtain a corresponding predetermined risk threshold based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, mark the user as a risk user, and combine the user information of the user and the device information of the terminal device Added to the list of risky users of the blockchain.
  • different user behavior information corresponds to different predetermined risk thresholds.
  • the more factors in the user behavior information the higher the corresponding risk threshold; conversely, the fewer factors in the user behavior information, the lower the corresponding risk threshold.
  • the sum of the aforementioned first score and second score is used as the user’s risk value, the corresponding risk threshold is lower.
  • the aforementioned first score, second score, and third score are used The sum of the fourth score is used as the user's risk value, and the corresponding risk threshold is higher.
  • the risk value of the user is less than the risk threshold, but a risk event occurs to the user after the business is processed, such as a loan fraud event, the user is also marked as a risk user, and the user information of the user and The device information of the terminal device is added to the list of risky users of the blockchain.
  • the user confirms to enable the above-mentioned permission to extract the device information of the terminal device and the permission to extract the user behavior information recorded in the terminal device, information that is beneficial to business processing can be pushed to the user. For example, for loan business, it can improve Loan limits, etc.
  • the embodiment of the present application also proposes a computer-readable storage medium.
  • the computer-readable storage medium may be non-volatile or volatile.
  • the computer-readable storage medium may be a hard disk, a multimedia card, an SD card, a flash memory card, an SMC, a read only memory (ROM), an erasable programmable read only memory (EPROM), a portable compact disk read only memory (CD -ROM), USB memory, etc. any one or any combination of several.
  • the computer-readable storage medium includes a processing system. For the functions implemented by the processing system when executed by the processor, please refer to the above description of FIG.
  • the method of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. ⁇
  • the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to enable a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the method described in each embodiment of the present application.

Abstract

The present application relates to blockchains. Disclosed is a blockchain-based information processing method, comprising: after a user logs in to an application platform using a terminal device, sending a first authorization protocol application for the user to determine whether to enable a permission for extracting device information of the terminal device; if it is determined to enable the permission, extracting device information, obtaining user information of the user and a list of risky users prestored in a blockchain, and analyzing whether the user is a risky user; if the user is a non-risky user, sending a second authorization protocol application for the user to determine whether to enable a permission for extracting user behavior information recorded in the terminal device; if it is determined to enable the permission, extracting the user behavior information and computing a risk value of the user; and if the risk value is greater than a risk threshold, marking the user as a risky user and adding the user to the list of risky users of the blockchain. The present application can improve the accuracy of analysis and effectively recognize a risky user.

Description

基于区块链的信息处理装置、方法及存储介质Information processing device, method and storage medium based on blockchain
本申请要求于2019年7月5日提交中国专利局,申请号为201910607938.2、发明名称为“基于区块链的信息处理装置、方法及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on July 5, 2019. The application number is 201910607938.2 and the invention title is "Blockchain-based information processing devices, methods and storage media." The reference is incorporated in this application.
技术领域Technical field
本申请涉及信息分析技术领域,尤其涉及一种基于区块链的信息处理装置、方法及存储介质。This application relates to the field of information analysis technology, and in particular to a blockchain-based information processing device, method, and storage medium.
背景技术Background technique
风控反欺诈系统可以分析用户的风险,传统的风控反欺诈系统中会存储用户黑名单,用户在办理业务时,通过黑名单可以确定用户是否有风险。然而,发明人发现对于一些利用假的身份信息的用户而言,无法进一步确定该用户是否有风险,使得风控反欺诈系统分析的准确率降低,不能有效识别出风险用户。有鉴于此,一种能够提高分析的准确率,有效识别出风险用户的方法成为有待解决的问题。The risk control and anti-fraud system can analyze the user's risk. The traditional risk control and anti-fraud system stores a user blacklist. When the user handles the business, the blacklist can determine whether the user is at risk. However, the inventor found that for some users who use fake identity information, it is impossible to further determine whether the user is at risk, which reduces the accuracy of risk control and anti-fraud system analysis and cannot effectively identify risky users. In view of this, a method that can improve the accuracy of analysis and effectively identify risk users has become a problem to be solved.
发明内容Summary of the invention
本申请提供一种基于区块链的信息处理装置、方法及存储介质,旨在提高分析的准确率,有效识别出风险用户。This application provides a block chain-based information processing device, method, and storage medium, aiming to improve the accuracy of analysis and effectively identify risky users.
为实现上述目的,本申请提供一种基于区块链的信息处理装置,所述基于区块链的信息处理装置包括存储器及与所述存储器连接的处理器,所述存储器中存储有可在所述处理器上运行的处理系统,所述处理系统被所述处理器执行时实现如下步骤:在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。In order to achieve the above objective, the present application provides a blockchain-based information processing device. The blockchain-based information processing device includes a memory and a processor connected to the memory. The processing system running on the processor, when the processing system is executed by the processor, the following steps are implemented: after the user logs in to the application platform for business processing using a terminal device, the first authorization agreement application is sent for the user to confirm whether to enable extraction The authority of the terminal device’s device information; if the instruction to confirm the activation of the authority is received, the device information of the terminal device is extracted, the user information of the user, and the list of risky users pre-stored in the blockchain are obtained based on the terminal device’s Device information, user information, and risk user list analyze whether the user is a risk user; if the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to enable the permission to extract user behavior information recorded in the terminal device ; If an instruction to confirm the permission is received, the user behavior information recorded in the terminal device is extracted every predetermined time, and the user's risk value is calculated based on the user behavior information; the corresponding predetermined risk is obtained based on the user behavior information Threshold, if the risk value of the user is greater than or equal to the risk threshold, the user is marked as a risk user, and the user information of the user and the device information of the terminal device are added to the risk user list of the blockchain.
为实现上述目的,本申请还提供一种基于区块链的信息处理方法,所述 基于区块链的信息处理方法包括:S1,在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;S2,若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;S3,若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;S4,若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;S5,基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。In order to achieve the above objective, this application also provides a blockchain-based information processing method. The blockchain-based information processing method includes: S1. After the user logs in to the application platform for business processing using a terminal device, the first Authorization agreement application for the user to confirm whether to open the permission to extract the device information of the terminal device; S2, if an instruction to confirm the permission is received, extract the device information of the terminal device, and obtain the user information and blockchain of the user Based on the device information, user information and risk user list of the terminal device, analyze whether the user is a risk user; S3, if the user is a non-risk user, send a second authorization agreement application for the user to confirm Whether to enable the permission to extract the user behavior information recorded in the terminal device; S4, if an instruction to confirm enabling the permission is received, extract the user behavior information recorded in the terminal device at predetermined intervals, and calculate the user behavior information based on the user behavior information. The risk value of the user; S5, obtain the corresponding predetermined risk threshold based on the user behavior information, if the risk value of the user is greater than or equal to the risk threshold, mark the user as a risk user, and combine the user information of the user and the terminal The device information of the device is added to the list of risky users of the blockchain.
本申请还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有处理系统,所述处理系统被处理器执行时实现上述的基于区块链的信息处理方法的步骤。The present application also provides a computer-readable storage medium having a processing system stored on the computer-readable storage medium, and when the processing system is executed by a processor, the steps of the above-mentioned blockchain-based information processing method are realized.
本申请通过进一步分析用户使用的终端设备中记录的用户行为信息,能够提高分析的准确率,有效识别出风险用户。By further analyzing the user behavior information recorded in the terminal device used by the user, this application can improve the accuracy of the analysis and effectively identify at-risk users.
附图说明Description of the drawings
图1为本申请各个实施例一可选的应用环境示意图;FIG. 1 is a schematic diagram of an optional application environment of each embodiment of this application;
图2是图1中基于区块链的信息处理装置一实施例的硬件架构示意图;2 is a schematic diagram of the hardware architecture of an embodiment of the information processing device based on blockchain in FIG. 1;
图3为图1、图2中处理系统一实施例的程序模块图;Fig. 3 is a program module diagram of an embodiment of the processing system in Fig. 1 and Fig. 2;
图4为本申请基于区块链的信息处理方法一实施例的流程示意图。FIG. 4 is a schematic flowchart of an embodiment of a blockchain-based information processing method of this application.
具体实施方式Detailed ways
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the purpose, technical solutions, and advantages of this application clearer, the following further describes this application in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the application, and not used to limit the application. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.
需要说明的是,在本申请中涉及“第一”、“第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本申请要求的保护范围之内。It should be noted that the descriptions related to "first", "second", etc. in this application are only for descriptive purposes, and cannot be understood as indicating or implying their relative importance or implicitly indicating the number of technical features indicated. . Therefore, the features defined with "first" and "second" may explicitly or implicitly include at least one of the features. In addition, the technical solutions between the various embodiments can be combined with each other, but it must be based on what can be achieved by a person of ordinary skill in the art. When the combination of technical solutions is contradictory or cannot be achieved, it should be considered that such a combination of technical solutions does not exist. , Not within the scope of protection required by this application.
参阅图1所示,是本申请的较佳实施例的应用环境示意图。在该实施例中,该基于区块链的信息处理装置1与用户所使用的终端设备(例如,平板 电脑、笔记本或智能手机等)连接。用户通过终端设备登录应用平台,办理业务,在用户授权后,基于区块链的信息处理装置1可以提取终端设备的设备信息及用户行为信息,通过对用户行为信息的分析,可以分析出该用户是否为风险用户。Refer to FIG. 1, which is a schematic diagram of the application environment of the preferred embodiment of the present application. In this embodiment, the blockchain-based information processing device 1 is connected to a terminal device used by the user (for example, a tablet computer, a notebook, or a smart phone). The user logs in to the application platform through the terminal device to transact business. After the user is authorized, the information processing device 1 based on the blockchain can extract the terminal device’s device information and user behavior information, and analyze the user’s behavior information. Whether it is a risk user.
基于区块链的信息处理装置1是一种能够按照事先设定或者存储的指令,自动进行数值计算和/或信息处理的设备。所述基于区块链的信息处理装置1可以是计算机、也可以是单个网络服务器、多个网络服务器组成的服务器组或者基于云计算的由大量主机或者网络服务器构成的云,其中云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个超级虚拟计算机。The information processing device 1 based on the blockchain is a device that can automatically perform numerical calculation and/or information processing in accordance with pre-set or stored instructions. The blockchain-based information processing device 1 may be a computer, a single network server, a server group composed of multiple network servers, or a cloud composed of a large number of hosts or network servers based on cloud computing, where cloud computing is distributed A type of computing, a super virtual computer composed of a group of loosely coupled computer sets.
参照图2所示,在本实施例中,基于区块链的信息处理装置1可包括,但不仅限于,可通过系统总线相互通信连接的存储器11、处理器12、网络接口13,存储器11存储有可在处理器12上运行的处理系统10。需要指出的是,图2仅示出了具有组件11-13的基于区块链的信息处理装置1,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。As shown in FIG. 2, in this embodiment, the information processing device 1 based on the blockchain may include, but is not limited to, a memory 11, a processor 12, a network interface 13, and a memory 11 that can communicate with each other through a system bus. There is a processing system 10 that can run on a processor 12. It should be pointed out that Fig. 2 only shows the block chain-based information processing device 1 with components 11-13, but it should be understood that it is not required to implement all the shown components, and more or Fewer components.
其中,存储器11包括内存及至少一种类型的可读存储介质。内存为基于区块链的信息处理装置1的运行提供缓存;可读存储介质可为如闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、随机访问存储器(RAM)、静态随机访问存储器(SRAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、可编程只读存储器(PROM)、磁性存储器、磁盘、光盘等的非易失性存储介质。在一些实施例中,可读存储介质可以是基于区块链的信息处理装置1的内部存储单元,例如该基于区块链的信息处理装置1的硬盘;在另一些实施例中,该非易失性存储介质也可以是基于区块链的信息处理装置1的外部存储设备,例如基于区块链的信息处理装置1上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。本实施例中,存储器11的可读存储介质通常用于存储安装于基于区块链的信息处理装置1的操作系统和各类应用软件,例如存储本申请一实施例中的处理系统10的程序代码等。此外,存储器11还可以用于暂时地存储已经输出或者将要输出的各类数据。Among them, the memory 11 includes a memory and at least one type of readable storage medium. The memory provides cache for the operation of the information processing device 1 based on the blockchain; the readable storage medium can be, for example, flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), Non-volatile storage of static random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, magnetic disks, optical disks, etc. medium. In some embodiments, the readable storage medium may be the internal storage unit of the blockchain-based information processing device 1, for example, the hard disk of the blockchain-based information processing device 1. In other embodiments, the non-transitory The lossy storage medium may also be an external storage device of the information processing device 1 based on the blockchain, for example, a plug-in hard disk or a smart media card (SMC) equipped on the information processing device 1 based on the blockchain. Secure Digital (SD) card, flash card (Flash Card), etc. In this embodiment, the readable storage medium of the memory 11 is generally used to store the operating system and various application software installed in the information processing device 1 based on the blockchain, for example, to store the program of the processing system 10 in an embodiment of the present application Code etc. In addition, the memory 11 can also be used to temporarily store various types of data that have been output or will be output.
所述处理器12在一些实施例中可以是中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器、或其他数据处理芯片,用于运行所述存储器11中存储的程序代码或者处理数据,例如运行处理系统10等。The processor 12 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments, and is used to run data stored in the memory 11 Program code or processing data, such as running the processing system 10, etc.
所述网络接口13可包括标准的无线网络接口、有线网络接口,该网络接口13通常用于在所述基于区块链的信息处理装置1与其他电子设备之间建立通信连接。The network interface 13 may include a standard wireless network interface and a wired network interface. The network interface 13 is usually used to establish a communication connection between the blockchain-based information processing apparatus 1 and other electronic devices.
所述处理系统10存储在存储器11中,包括至少一个存储在存储器11中的计算机可读指令,该至少一个计算机可读指令可被处理器器12执行,以实现本申请各实施例的方法;以及,该至少一个计算机可读指令依据其各部分所实现的功能不同,可被划为不同的逻辑模块。The processing system 10 is stored in the memory 11, and includes at least one computer-readable instruction stored in the memory 11, and the at least one computer-readable instruction can be executed by the processor 12 to implement the method of each embodiment of the present application; And, the at least one computer-readable instruction can be divided into different logic modules according to the different functions implemented by its parts.
在一实施例中,上述处理系统10被所述处理器12执行时实现如下步骤:In an embodiment, the above-mentioned processing system 10 implements the following steps when being executed by the processor 12:
在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;After the user uses the terminal device to log in to the application platform for business processing, send the first authorization agreement application for the user to confirm whether to open the authority to extract the device information of the terminal device;
若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;If the instruction to confirm the permission is received, the device information of the terminal device is extracted, the user information of the user, the list of risk users pre-stored in the blockchain, and the device information of the terminal device, user information, and risk user list are obtained Analyze whether the user is a risk user;
若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;If the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to enable the permission to extract user behavior information recorded in the terminal device;
若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;If an instruction confirming the activation of the authority is received, extract the user behavior information recorded in the terminal device every predetermined time, and calculate the user's risk value based on the user behavior information;
基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The corresponding predetermined risk threshold is obtained based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, the user is marked as a risk user, and the user information of the user and the device information of the terminal device are added to the area The list of risky users of the blockchain.
进一步地,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录及网页浏览记录,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:Further, the user behavior information includes non-application operation information, the non-application operation information includes call records, short message records, social application records, and web browsing records, and the step of calculating the user's risk value based on the user behavior information , Specifically including:
获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
将所述第一分值或者第二分值或者第一分值与第二分值的总和作为所述风险值。Use the first score or the second score or the sum of the first score and the second score as the risk value.
进一步地,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:Further, the user behavior information includes non-application operation information, and the non-application operation information includes call records, short message records, social application records, web browsing records, use frequency of contacts, use frequency of short messages, and use of social applications Frequency and web page browsing frequency, the step of calculating the risk value of the user based on the user behavior information specifically includes:
获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
将所述第一分值、第二分值及第三分值的总和作为所述风险值。The sum of the first score, the second score, and the third score is used as the risk value.
进一步地,所述用户行为信息包括非应用操作信息及应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频 率,所述应用操作信息包括应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:Further, the user behavior information includes non-application operation information and application operation information, and the non-application operation information includes call records, short message records, social application records, web browsing records, use frequency of address book, use frequency of short messages, The usage frequency of social applications and the browsing frequency of web pages, the application operation information includes application operation speed, application operation frequency, application operation time, and application operation modification times, and the step of calculating the user's risk value based on the user behavior information , Specifically including:
获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
获取预设的第四分值关系表,基于所述第四分值关系表及所述应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数获取第四分值;Acquiring a preset fourth score relationship table, and acquiring a fourth score based on the fourth score relationship table and the application operation speed, application operation frequency, application operation time, and modification times of the application operation;
将所述第一分值、第二分值、第三分值及第四分值的总和作为所述风险值。The sum of the first score, the second score, the third score, and the fourth score is used as the risk value.
参照图3所示,为图1、图2中处理系统10的程序模块图。所述处理系统10被分割为多个模块,该多个模块被存储于存储器12中,并由处理器13执行,以完成本申请。本申请所称的模块是指能够完成特定功能的一系列计算机程序指令段。Referring to FIG. 3, it is a program module diagram of the processing system 10 in FIGS. 1 and 2. The processing system 10 is divided into multiple modules, and the multiple modules are stored in the memory 12 and executed by the processor 13 to complete the application. The module referred to in this application refers to a series of computer program instruction segments that can complete specific functions.
所述处理系统10可以被分割为:第一发送模块101、第一分析模块102、第二发送模块103、第二分析模块104及标记模块105。The processing system 10 can be divided into: a first sending module 101, a first analysis module 102, a second sending module 103, a second analysis module 104, and a marking module 105.
第一发送模块101,用于在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;The first sending module 101 is configured to send a first authorization agreement application after the user uses a terminal device to log in to the application platform for business processing, for the user to confirm whether to open the authority to extract device information of the terminal device;
第一分析模块102,用于若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;The first analysis module 102 is configured to extract the device information of the terminal device if the instruction to confirm the activation of the permission is received, obtain the user information of the user, and the risk user list pre-stored in the blockchain, based on the device of the terminal device Information, user information and risk user list to analyze whether the user is a risk user;
第二发送模块103,用于若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;The second sending module 103 is configured to, if the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to open the authority to extract the user behavior information recorded in the terminal device;
第二分析模块104,用于若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;The second analysis module 104 is configured to extract the user behavior information recorded in the terminal device every predetermined time if an instruction to confirm the activation of the authority is received, and calculate the risk value of the user based on the user behavior information;
标记模块105,用于基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The marking module 105 is configured to obtain a corresponding predetermined risk threshold based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, mark the user as a risk user, and combine the user information of the user and the terminal device The device information of is added to the list of risky users of the blockchain.
具体原理请参照下述图4关于该方法的流程图的介绍。For the specific principle, please refer to the introduction of the flow chart of the method in Figure 4 below.
如图4所示,图4为本申请基于区块链的信息处理方法一实施例的流程 示意图,基于区块链的信息处理装置1的处理器13执行存储器12中存储的处理系统10时实现该方法的如下步骤:As shown in FIG. 4, FIG. 4 is a schematic flowchart of an embodiment of a blockchain-based information processing method of this application, which is implemented when the processor 13 of the blockchain-based information processing device 1 executes the processing system 10 stored in the memory 12 The steps of the method are as follows:
步骤S1,在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;Step S1: After the user logs in to the application platform for business processing using a terminal device, send a first authorization agreement application for the user to confirm whether to open the authority to extract the device information of the terminal device;
其中,终端设备可以是手机、笔记本或平板电脑等个人所持有的设备。业务可以是贷款申请、信用卡申请、保险申请等,当然,也可以是其他的业务,例如,与用户的信用风险有关的业务。Among them, the terminal device may be a device held by an individual such as a mobile phone, a notebook, or a tablet computer. The business can be a loan application, a credit card application, an insurance application, etc., of course, it can also be other business, for example, a business related to the user's credit risk.
其中,终端设备的设备信息包括两方面的信息,一是硬件信息,另一是网络信息。硬件信息包括终端设备的型号/序列号、处理器和主版的序列号、系统版本、IMEI、Wi-Fi的物理硬件编号及蓝牙的硬件编号等,是终端设备的唯一信息;网络信息包括运营商信息、通信制程、网络定位信息、路由地址、对公网IP、内网分发的IP及DNS解析策略等。Among them, the device information of the terminal device includes two aspects of information, one is hardware information, and the other is network information. The hardware information includes the model/serial number of the terminal device, the serial number of the processor and the main board, the system version, IMEI, the physical hardware number of Wi-Fi, and the hardware number of Bluetooth. It is the only information of the terminal device; network information includes operation Business information, communication process, network location information, routing address, IP for public network, intranet distribution, and DNS resolution strategy, etc.
其中,登录业务办理的应用平台时,需要输入用户个人的用户信息。发送的第一授权协议申请为供用户确认是否开启提取该终端设备的设备信息的权限的申请,若用户同意开启该权限,则可以点击确认,以授权该应用平台对应的机构提取该终端设备的设备信息;若用户不同意开启该权限,则可以点击取消,取消的情况下,业务办理可以结束,也可以向用户再次发送第一授权协议申请供其再次确认。Among them, when logging in to the application platform for business processing, it is necessary to enter the user's personal user information. The first authorization agreement application sent is for the user to confirm whether to enable the permission to extract the device information of the terminal device. If the user agrees to enable the permission, click OK to authorize the organization corresponding to the application platform to extract the terminal device’s permission Device information; if the user does not agree to open the permission, you can click Cancel. In the case of cancellation, the business processing can be ended, or the first authorization agreement application can be sent to the user again for reconfirmation.
其中,如果该应用平台对应的机构得到授权来提取该终端设备的设备信息,则可以通过该应用调用该终端设备预定的编程接口来提取设备信息。Wherein, if the organization corresponding to the application platform is authorized to extract the device information of the terminal device, the application can call a predetermined programming interface of the terminal device to extract the device information.
步骤S2,若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;Step S2: If the instruction to confirm the activation of the authority is received, the device information of the terminal device is extracted, the user information of the user, and the risk user list pre-stored in the blockchain are obtained, based on the device information, user information, and user information of the terminal device. The risk user list analyzes whether the user is a risk user;
其中,区块链中预存有风险用户名单,在该风险用户名单中记录了各个风险用户的用户信息及关联的终端设备的设备信息。用户信息包括姓名、身份证号、住址、联系方式等等。将该用户的用户信息、终端设备的设备信息与风险用户名单中的各用户的信息进行比对,如果风险用户名单中有用户的用户信息、终端设备的设备信息与该用户的相同,则确认为同一用户,该用户为风险用户;如果该用户盗用他人的身份信息而使用相同的终端设备登录业务办理的应用平台,由于终端设备的设备信息相同,也可以确认为同一用户,该用户为风险用户。Among them, a list of risk users is pre-stored in the blockchain, and the user information of each risk user and the equipment information of the associated terminal equipment are recorded in the risk user list. User information includes name, ID number, address, contact information, etc. Compare the user information of the user and the equipment information of the terminal equipment with the information of each user in the risk user list. If the user information of the user and the equipment information of the terminal equipment in the risk user list are the same as that of the user, confirm If the user is the same user, the user is at risk; if the user steals the identity information of others and uses the same terminal device to log in to the application platform for business transactions, since the terminal device has the same device information, it can also be identified as the same user, and the user is at risk user.
步骤S3,若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;Step S3: If the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to open the authority to extract the user behavior information recorded in the terminal device;
其中,对于非风险用户,需要进一步提取一些客观的信息,进而分析该用户是否为风险用户。发送的第二授权协议申请为供用户确认是否开启提取该终端设备中记录的用户行为信息的权限的申请,若用户同意开启该权限,则可以点击确认,以授权该应用平台对应的机构提取该终端设备中记录的用户行为信息;若用户不同意开启该权限,则可以点击取消,取消的情况下,业务办理可以结束,也可以向用户再次发送第二授权协议申请供其再次确认。Among them, for non-risk users, some objective information needs to be further extracted to analyze whether the user is a risk user. The second authorization agreement application sent is for the user to confirm whether to open the permission to extract the user behavior information recorded in the terminal device. If the user agrees to open the permission, you can click OK to authorize the organization corresponding to the application platform to extract the User behavior information recorded in the terminal device; if the user does not agree to enable the permission, you can click Cancel. In the case of cancellation, the business processing can be ended, or the second authorization agreement application can be sent to the user again for reconfirmation.
其中,如果该应用平台对应的机构得到授权来提取该终端设备中记录的用户行为信息,则可以通过该应用调用该终端设备底层的方法,来提取该终端设备中记录的用户行为信息。Wherein, if the organization corresponding to the application platform is authorized to extract the user behavior information recorded in the terminal device, the underlying method of the terminal device can be called by the application to extract the user behavior information recorded in the terminal device.
其中,对于风险用户,业务办理直接结束。Among them, for risk users, business processing ends directly.
步骤S4,若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;Step S4, if an instruction confirming the activation of the authority is received, extract the user behavior information recorded in the terminal device every predetermined time, and calculate the user's risk value based on the user behavior information;
其中,在接收到确认开启该权限的指令后,直接提取该终端设备中记录的用户行为信息并计算该用户的风险值,之后,每隔预定时间(例如,一周)提取该终端设备中记录的用户行为信息并计算该用户的风险值。Wherein, after receiving the instruction to confirm the opening of the authority, the user behavior information recorded in the terminal device is directly extracted and the risk value of the user is calculated. After that, the information recorded in the terminal device is extracted every predetermined time (for example, one week) User behavior information and calculate the user’s risk value.
在一实施例中,用户行为信息包括非应用操作信息,该应用指的是用户办理业务的这个应用,非应用操作信息包括通话记录、短信记录、社交应用记录及网页浏览记录,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:In one embodiment, the user behavior information includes non-application operation information. The application refers to the application for the user to handle business. The non-application operation information includes call records, short message records, social application records, and web browsing records. The steps of calculating the user’s risk value with user behavior information specifically include:
获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;将所述第一分值或者第二分值或者第一分值与第二分值的总和作为所述风险值。Obtain a preset first score relationship table, analyze whether there is a risk user in the call record, record the first score based on the first score relationship table and the result of this analysis; obtain a preset second score The relationship table, extract keywords from the short message records, social application records, and web browsing records, and analyze whether the keywords have the same semantics as predetermined risk keywords, based on the second score relationship table and this analysis result Record the second score; use the first score or the second score or the sum of the first score and the second score as the risk value.
首先,将通话记录中的联系方式与风险用户名单中的用户的联系方式进行比对分析,如果通话记录中有联系方式与风险用户名单中的用户的联系方式相同,则认为通话记录中存在风险用户,统计通话记录中存在的风险用户的数量,以从预设的第一分值关系表中获取对应的分值。First, compare and analyze the contact information in the call record with the contact information of the user in the risk user list. If the contact information in the call record is the same as the contact information of the user in the risk user list, it is considered that there is a risk in the call record Users, count the number of risky users in the call record to obtain the corresponding score from the preset first score relationship table.
在预设的第一分值关系表中,记录了通话记录中存在风险用户的数量及对应的分值,如下表1所示:In the preset first score relationship table, the number of risky users in the call record and the corresponding score are recorded, as shown in Table 1 below:
通话记录中风险用户的数量Number of at-risk users in call logs 00 11 >1>1
分值Points 00 33 66
表1Table 1
进一步地,还可以分析通话记录中与风险用户联系的频率及时间,如果与风险用户联系的频率越高、联系的时间越近,则对应的分值越高,风险越大。通过这种方式,可以提高分析的准确率。Furthermore, the frequency and time of contact with risky users in the call record can also be analyzed. If the frequency and time of contact with risky users are higher, the corresponding score is higher, and the risk is greater. In this way, the accuracy of the analysis can be improved.
然后,可以提取短信记录、社交应用记录及网页浏览记录中的关键词,关键词的提取可以使用现有的成熟技术,例如使用TF-IDF(Term Frequency-Inverse Document Frequency,词项频率-逆向文本频率)算法、LSA(Latent Semantic Analysis,隐性语义分析)算法或者PLSA(Probabilisitic Latent Semantic Analysis,概率隐性语义分析)算法等关键词提取算法中的任意一种算法。关键词根据业务的不同有所不同,例 如,对于贷款业务,关键词例如为:某贷款APP、还款日期、催收、某贷款APP短信验证(多头借贷时会发生的较频繁的贷款APP验证短信)等等。同时,分析关键词是否与预定的风险关键词语义相同,预定的风险关键词例如为:还款、催收、贷款等等。Then, keywords in SMS records, social application records, and web browsing records can be extracted. Keyword extraction can use existing mature technologies, such as TF-IDF (Term Frequency-Inverse Document Frequency, term frequency-reverse text). Frequency) algorithm, LSA (Latent Semantic Analysis) algorithm, or PLSA (Probabilisitic Latent Semantic Analysis) algorithm and other keyword extraction algorithms. The keywords are different depending on the business. For example, for the loan business, the keywords are for example: a certain loan APP, repayment date, collection, and a certain loan APP SMS verification (more frequent loan APP verification SMS will occur when multiple loans are made )and many more. At the same time, analyze whether the keywords have the same semantics as the predetermined risk keywords. The predetermined risk keywords are, for example, repayment, collection, loan, etc.
如果短信记录、社交应用记录及网页浏览记录中有与预定的风险关键词语义相同的关键词,则该用户存在一定的风险,统计与预定的风险关键词语义相同的关键词的数量,以从预设的第二分值关系表中获取对应的分值。If there are keywords that have the same semantics as the predetermined risk keywords in the SMS records, social application records, and web browsing records, the user is at a certain risk. The number of keywords with the same semantics as the predetermined risk keywords can be counted. The corresponding score is obtained from the preset second score relationship table.
在预设的第二分值关系表中,记录了短信记录、社交应用记录及网页浏览记录中有与预定的风险关键词语义相同的关键词的数量及对应的分值,如下表2所示:In the preset second score relationship table, the number of keywords with the same semantics as the predetermined risk keywords in the SMS records, social application records, and web browsing records and the corresponding scores are recorded, as shown in Table 2 below :
Figure PCTCN2020086276-appb-000001
Figure PCTCN2020086276-appb-000001
表2Table 2
进一步地,还可以分析短信记录、社交应用记录及网页浏览记录中与预定的风险关键词语义相同的关键词出现的时间,如果时间越近,则对应的分值越高。通过这种方式,可以提高分析的准确率。Further, the time when keywords with the same semantics as the predetermined risk keywords in the short message records, social application records, and web browsing records appear can also be analyzed. The closer the time, the higher the corresponding score. In this way, the accuracy of the analysis can be improved.
最后,可以将上述的第一分值或者第二分值或者第一分值与第二分值的总和作为该用户的风险值。Finally, the above-mentioned first score or second score or the sum of the first score and the second score can be used as the risk value of the user.
在另一实施例中,用户行为信息包括非应用操作信息,非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:In another embodiment, the user behavior information includes non-application operation information, and the non-application operation information includes call history, short message history, social application history, web browsing history, address book usage frequency, short message usage frequency, and social application usage information. Frequency and web page browsing frequency, the step of calculating the risk value of the user based on the user behavior information specifically includes:
获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;将所述第一分值、第二分值及第三分值的总和作为所述风险值。Obtain a preset first score relationship table, analyze whether there is a risk user in the call record, record the first score based on the first score relationship table and the result of this analysis; obtain a preset second score The relationship table, extract keywords from the short message records, social application records, and web browsing records, and analyze whether the keywords have the same semantics as predetermined risk keywords, based on the second score relationship table and this analysis result Record the second score; obtain the preset third score relationship table, based on the third score relationship table and the frequency of use of the address book, the frequency of use of text messages, the frequency of use of social applications, and the frequency of web page browsing Obtain a third score; use the sum of the first score, the second score, and the third score as the risk value.
其中,得到该用户的第一分值及第二分值可以参考上述的实施例。本实施例增加了通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率作为考虑用户是否有风险的因素。如果通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率均很低,则认为用户 不经常使用该终端设备,考虑到用户可能使用新的终端设备办理业务,为了规避这一风险,可以结合上述的通话记录、短信记录、社交应用记录、网页浏览记录进行深度分析,将第一分值、第二分值及第三分值的总和作为该用户的风险值。Wherein, to obtain the first score and the second score of the user, reference may be made to the foregoing embodiment. In this embodiment, the use frequency of the address book, the use frequency of short messages, the use frequency of social applications, and the browsing frequency of web pages are added as factors to consider whether the user is at risk. If the use frequency of the address book, the use frequency of text messages, the use frequency of social applications, and the frequency of web page browsing are all low, it is considered that the user does not use the terminal device frequently. Considering that the user may use a new terminal device for business, in order to avoid This risk can be analyzed in depth by combining the aforementioned call records, SMS records, social application records, and web browsing records, and the sum of the first score, the second score, and the third score can be used as the user's risk value.
在预设的第三分值关系表中,记录了通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率及对应的分值,如下表3所示:In the preset third score relationship table, the usage frequency of the address book, the usage frequency of short messages, the usage frequency of social applications, the browsing frequency of web pages and the corresponding scores are recorded, as shown in Table 3 below:
通讯录的使用频率(每天/次)How often the address book is used (daily/time) <2<2 2-52-5 >5>5
分值Points 55 33 11
短信的使用频率(每天/次)Use frequency of SMS (daily/time) <2<2 2-52-5 >5>5
分值Points 55 33 11
社交应用的使用频率(每天/次)Frequency of use of social applications (daily/time) <2<2 2-52-5 >5>5
分值Points 55 33 11
网页的浏览频率(每天/次)Frequency of web page views (daily/time) <2<2 2-52-5 >5>5
分值Points 55 33 11
表3table 3
本实施例通过上述深度分析用户行为的方式,可以进一步提高风险值的准确率。This embodiment can further improve the accuracy of the risk value through the above-mentioned in-depth analysis of user behavior.
在再一实施例中,用户行为信息包括非应用操作信息及应用操作信息,非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,应用操作信息包括应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:In still another embodiment, the user behavior information includes non-application operation information and application operation information. The non-application operation information includes call records, short message records, social application records, web browsing records, address book usage frequency, short message usage frequency, The frequency of use of social applications and the frequency of browsing web pages. The application operation information includes application operation speed, application operation frequency, application operation time, and application operation modification times. The step of calculating the user’s risk value based on the user behavior information is specifically include:
获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;获取预设的第四分值关系表,基于所述第四分值关系表及所述应用操作速度、应用操作频率、应用操作时间、应用操作的修改次数获取第四分值;将所述第一分值、第二分值、第三分值及第四分值的总和作为所述风险值。Obtain a preset first score relationship table, analyze whether there is a risk user in the call record, record the first score based on the first score relationship table and the result of this analysis; obtain a preset second score The relationship table, extract keywords from the short message records, social application records, and web browsing records, and analyze whether the keywords have the same semantics as predetermined risk keywords, based on the second score relationship table and this analysis result Record the second score; obtain the preset third score relationship table, based on the third score relationship table and the frequency of use of the address book, the frequency of use of text messages, the frequency of use of social applications, and the frequency of web page browsing Obtain a third score; acquire a preset fourth score relationship table, and obtain a fourth score based on the fourth score relationship table and the application operation speed, application operation frequency, application operation time, and modification times of application operations Value; the sum of the first score, the second score, the third score, and the fourth score is used as the risk value.
其中,得到该用户的第一分值、第二分值及第三分值可以参考上述的实施例。本实施例增加了应用操作信息,即该用户办理业务所使用的该应用中对应的操作信息,包括应用操作速度、应用操作频率、应用操作时间、应用操作的修改次数,作为进一步考虑用户是否有风险的因素。一般来说办理业务需要准备材料,而且都比较复杂,对于应用操作速度、应用操作频率、应用操作时间、应用操作的修改次数,如果应用操作速度越快,应用操作频率越大,应用操作时间越短,应用操作的修改次数越少,则说明用户早有准备,风险越大。最终,将第一分值、第二分值、第三分值及第四分值的总和作为该用户的风险值。Wherein, to obtain the first score, second score, and third score of the user, reference may be made to the foregoing embodiment. This embodiment adds application operation information, that is, the corresponding operation information in the application used by the user to handle business, including application operation speed, application operation frequency, application operation time, and modification times of application operations, as a further consideration of whether the user has Factors of risk. Generally speaking, you need to prepare materials for business, and they are more complicated. For application operation speed, application operation frequency, application operation time, and modification times of application operation, if the application operation speed is faster, the application operation frequency is greater, and the application operation time is longer. Short, the less the number of modification of the application operation, the more the user is prepared and the greater the risk. Finally, the sum of the first score, the second score, the third score, and the fourth score is used as the risk value of the user.
在预设的第四分值关系表中,记录了应用操作速度、应用操作频率、应用操作时间、应用操作的修改次数及对应的分值,如下表4所示:In the preset fourth score relationship table, application operation speed, application operation frequency, application operation time, application operation modification times and corresponding scores are recorded, as shown in Table 4 below:
Figure PCTCN2020086276-appb-000002
Figure PCTCN2020086276-appb-000002
表4Table 4
本实施例结合非应用操作信息及应用操作信息进行用户行为的深度分析,进一步提高风险值的准确率。This embodiment combines non-application operation information and application operation information to perform an in-depth analysis of user behavior, and further improves the accuracy of the risk value.
步骤S5,基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。Step S5: Obtain a corresponding predetermined risk threshold based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, mark the user as a risk user, and combine the user information of the user and the device information of the terminal device Added to the list of risky users of the blockchain.
其中,用户行为信息不同所对应的预定的风险阈值不同,用户行为信息中的因素越多则对应的风险阈值越高,反之,用户行为信息中的因素越少则对应的风险阈值越低。例如,若以上述的第一分值与第二分值的总和作为该用户的风险值,则对应的风险阈值较低,若以上述的第一分值、第二分值、第三分值及第四分值的总和作为该用户的风险值,则对应的风险阈值较高。Among them, different user behavior information corresponds to different predetermined risk thresholds. The more factors in the user behavior information, the higher the corresponding risk threshold; conversely, the fewer factors in the user behavior information, the lower the corresponding risk threshold. For example, if the sum of the aforementioned first score and second score is used as the user’s risk value, the corresponding risk threshold is lower. If the aforementioned first score, second score, and third score are used The sum of the fourth score is used as the user's risk value, and the corresponding risk threshold is higher.
对于大于等于风险阈值的用户,将其标记为风险用户,然后将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中,供其他机构共享、调用。For users who are greater than or equal to the risk threshold, mark them as risk users, and then add the user information of the user and the device information of the terminal device to the list of risk users on the blockchain for other institutions to share and call.
进一步地,如果该用户的风险值小于风险阈值,但在办理了该业务后该用户发生风险事件,例如,贷款欺诈事件,则同样将该用户标记为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。Further, if the risk value of the user is less than the risk threshold, but a risk event occurs to the user after the business is processed, such as a loan fraud event, the user is also marked as a risk user, and the user information of the user and The device information of the terminal device is added to the list of risky users of the blockchain.
进一步地,如果用户确认开启上述的提取终端设备的设备信息的权限、提取该终端设备中记录的用户行为信息的权限,可以向用户推送有利于业务办理的信息,例如,对于贷款业务,可以提高贷款额度等。Further, if the user confirms to enable the above-mentioned permission to extract the device information of the terminal device and the permission to extract the user behavior information recorded in the terminal device, information that is beneficial to business processing can be pushed to the user. For example, for loan business, it can improve Loan limits, etc.
此外,本申请实施例还提出一种计算机可读存储介质,所述计算机可读存储介质可以是非易失性,也可以是易失性。所述计算机可读存储介质可以是硬盘、多媒体卡、SD卡、闪存卡、SMC、只读存储器(ROM)、可擦除可编程只读存储器(EPROM)、便携式紧致盘只读存储器(CD-ROM)、USB存储器等等中的任意一种或者几种的任意组合。所述计算机可读存储介质中包括处理系统,该处理系统被处理器执行时实现的功能,请参照上述关于图4的介绍,在此不再赘述。In addition, the embodiment of the present application also proposes a computer-readable storage medium. The computer-readable storage medium may be non-volatile or volatile. The computer-readable storage medium may be a hard disk, a multimedia card, an SD card, a flash memory card, an SMC, a read only memory (ROM), an erasable programmable read only memory (EPROM), a portable compact disk read only memory (CD -ROM), USB memory, etc. any one or any combination of several. The computer-readable storage medium includes a processing system. For the functions implemented by the processing system when executed by the processor, please refer to the above description of FIG.
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the foregoing embodiments of the present application are only for description, and do not represent the advantages and disadvantages of the embodiments.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、装置、物品或者方法不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、装置、物品或者方法所固有的要素。It should be noted that in this article, the terms "including", "including" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, device, article or method including a series of elements not only includes those elements, It also includes other elements that are not explicitly listed, or elements inherent to the process, device, article, or method.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better.的实施方式。 Based on this understanding, the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to enable a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the method described in each embodiment of the present application.
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。The above are only preferred embodiments of this application, and do not limit the scope of this application. Any equivalent structure or equivalent process transformation made using the content of the description and drawings of this application, or directly or indirectly used in other related technical fields , The same reason is included in the scope of patent protection of this application.

Claims (20)

  1. 一种基于区块链的信息处理装置,其中,所述基于区块链的信息处理装置包括存储器及与所述存储器连接的处理器,所述存储器中存储有可在所述处理器上运行的处理系统,所述处理系统被所述处理器执行时实现如下步骤:A block chain-based information processing device, wherein the block chain-based information processing device includes a memory and a processor connected to the memory, and the memory that can run on the processor A processing system, when the processing system is executed by the processor, the following steps are implemented:
    在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;After the user uses the terminal device to log in to the application platform for business processing, send the first authorization agreement application for the user to confirm whether to open the authority to extract the device information of the terminal device;
    若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;If the instruction to confirm the permission is received, the device information of the terminal device is extracted, the user information of the user, the list of risk users pre-stored in the blockchain, and the device information of the terminal device, user information, and risk user list are obtained Analyze whether the user is a risk user;
    若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;If the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to enable the permission to extract user behavior information recorded in the terminal device;
    若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;If an instruction confirming the activation of the authority is received, extract the user behavior information recorded in the terminal device every predetermined time, and calculate the user's risk value based on the user behavior information;
    基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The corresponding predetermined risk threshold is obtained based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, the user is marked as a risk user, and the user information of the user and the device information of the terminal device are added to the area The list of risky users of the blockchain.
  2. 根据权利要求1所述的基于区块链的信息处理装置,其中,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录及网页浏览记录,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The blockchain-based information processing device according to claim 1, wherein the user behavior information includes non-application operation information, and the non-application operation information includes call records, short message records, social application records, and web browsing records, The step of calculating the risk value of the user based on the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    将所述第一分值或者第二分值或者第一分值与第二分值的总和作为所述风险值。Use the first score or the second score or the sum of the first score and the second score as the risk value.
  3. 根据权利要求1所述的基于区块链的信息处理装置,其中,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The blockchain-based information processing device according to claim 1, wherein the user behavior information includes non-application operation information, and the non-application operation information includes call records, short message records, social application records, web browsing records, The use frequency of the address book, the use frequency of short messages, the use frequency of social applications and the frequency of web page browsing, the step of calculating the user's risk value based on the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同, 基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the SMS records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
    将所述第一分值、第二分值及第三分值的总和作为所述风险值。The sum of the first score, the second score, and the third score is used as the risk value.
  4. 根据权利要求1所述的基于区块链的信息处理装置,其中,所述用户行为信息包括非应用操作信息及应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述应用操作信息包括应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The blockchain-based information processing device according to claim 1, wherein the user behavior information includes non-application operation information and application operation information, and the non-application operation information includes call records, short message records, social application records, Web browsing history, address book usage frequency, SMS usage frequency, social application usage frequency, and web page browsing frequency, the application operation information includes application operation speed, application operation frequency, application operation time, and modification times of application operation, The step of calculating the risk value of the user based on the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
    获取预设的第四分值关系表,基于所述第四分值关系表及所述应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数获取第四分值;Acquiring a preset fourth score relationship table, and acquiring a fourth score based on the fourth score relationship table and the application operation speed, application operation frequency, application operation time, and modification times of the application operation;
    将所述第一分值、第二分值、第三分值及第四分值的总和作为所述风险值。The sum of the first score, the second score, the third score, and the fourth score is used as the risk value.
  5. 一种基于区块链的信息处理方法,其中,所述基于区块链的信息处理方法包括:A blockchain-based information processing method, wherein the blockchain-based information processing method includes:
    S1,在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;S1: After the user logs in to the application platform for business processing using a terminal device, send a first authorization agreement application for the user to confirm whether to open the authority to extract the device information of the terminal device;
    S2,若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;S2: If an instruction to confirm the permission is received, extract the device information of the terminal device, obtain the user information of the user, and a list of risky users pre-stored in the blockchain, based on the device information, user information and risk of the terminal device The user list analyzes whether the user is a risk user;
    S3,若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;S3: If the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to enable the permission to extract user behavior information recorded in the terminal device;
    S4,若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;S4: If an instruction confirming the activation of the authority is received, extract the user behavior information recorded in the terminal device every predetermined time, and calculate the user's risk value based on the user behavior information;
    S5,基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。S5. Obtain a corresponding predetermined risk threshold based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, mark the user as a risk user, and add the user information of the user and the device information of the terminal device To the list of risky users of the blockchain.
  6. 根据权利要求5所述的基于区块链的信息处理方法,其中,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记 录、社交应用记录及网页浏览记录,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The block chain-based information processing method according to claim 5, wherein the user behavior information includes non-application operation information, and the non-application operation information includes call records, short message records, social application records, and web browsing records, The step of calculating the risk value of the user based on the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    将所述第一分值或者第二分值或者第一分值与第二分值的总和作为所述风险值。Use the first score or the second score or the sum of the first score and the second score as the risk value.
  7. 根据权利要求5所述的基于区块链的信息处理方法,其中,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The blockchain-based information processing method of claim 5, wherein the user behavior information includes non-application operation information, and the non-application operation information includes call records, short message records, social application records, web browsing records, The use frequency of the address book, the use frequency of short messages, the use frequency of social applications and the frequency of web page browsing, the step of calculating the user's risk value based on the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
    将所述第一分值、第二分值及第三分值的总和作为所述风险值。The sum of the first score, the second score, and the third score is used as the risk value.
  8. 根据权利要求5所述的基于区块链的信息处理方法,其中,所述用户行为信息包括非应用操作信息及应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述应用操作信息包括应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The blockchain-based information processing method according to claim 5, wherein the user behavior information includes non-application operation information and application operation information, and the non-application operation information includes call records, short message records, social application records, Web browsing history, address book usage frequency, SMS usage frequency, social application usage frequency, and web page browsing frequency, the application operation information includes application operation speed, application operation frequency, application operation time, and modification times of application operation, The step of calculating the risk value of the user based on the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
    获取预设的第四分值关系表,基于所述第四分值关系表及所述应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数获取第四分值;Acquiring a preset fourth score relationship table, and acquiring a fourth score based on the fourth score relationship table and the application operation speed, application operation frequency, application operation time, and modification times of the application operation;
    将所述第一分值、第二分值、第三分值及第四分值的总和作为所述风险值。The sum of the first score, the second score, the third score, and the fourth score is used as the risk value.
  9. 根据权利要求5所述的基于区块链的信息处理方法,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The block chain-based information processing method according to claim 5, wherein after S5, it further comprises: if the user's risk value is less than the risk threshold, after completing the business, if the user has a risk event, The user is marked as a risk user, and the user information of the user and the device information of the terminal device are added to the list of risk users on the blockchain.
  10. 根据权利要求6所述的基于区块链的信息处理方法,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The blockchain-based information processing method according to claim 6, wherein after S5, it further comprises: if the user's risk value is less than the risk threshold, after completing the business, if the user has a risk event, The user is marked as a risk user, and the user information of the user and the device information of the terminal device are added to the list of risk users on the blockchain.
  11. 根据权利要求7所述的基于区块链的信息处理方法,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The block chain-based information processing method according to claim 7, wherein after S5, it further comprises: if the risk value of the user is less than the risk threshold, after completing the business, if the user has a risk event, The user is marked as a risk user, and the user information of the user and the device information of the terminal device are added to the list of risk users on the blockchain.
  12. 根据权利要求8所述的基于区块链的信息处理方法,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The block chain-based information processing method according to claim 8, wherein after S5, it further comprises: if the risk value of the user is less than the risk threshold, after completing the business, if the user has a risk event, Then mark the user as a risk user, and add the user information of the user and the device information of the terminal device to the list of risk users on the blockchain.
  13. 一种计算机可读存储介质,其中,所述计算机可读存储介质上存储有处理系统,所述处理系统被处理器执行时实现如下步骤:A computer-readable storage medium, wherein a processing system is stored on the computer-readable storage medium, and when the processing system is executed by a processor, the following steps are implemented:
    S1,在用户使用终端设备登录业务办理的应用平台后,发送第一授权协议申请,供用户确认是否开启提取该终端设备的设备信息的权限;S1: After the user logs in to the application platform for business processing using a terminal device, send a first authorization agreement application for the user to confirm whether to open the authority to extract the device information of the terminal device;
    S2,若接收到确认开启该权限的指令,则提取该终端设备的设备信息,获取该用户的用户信息、区块链中预存的风险用户名单,基于该终端设备的设备信息、用户信息及风险用户名单分析该用户是否为风险用户;S2: If an instruction to confirm the permission is received, extract the device information of the terminal device, obtain the user information of the user, and a list of risky users pre-stored in the blockchain, based on the device information, user information and risk of the terminal device The user list analyzes whether the user is a risk user;
    S3,若该用户为非风险用户,则发送第二授权协议申请,供用户确认是否开启提取该终端设备中记录的用户行为信息的权限;S3: If the user is a non-risk user, send a second authorization agreement application for the user to confirm whether to enable the permission to extract user behavior information recorded in the terminal device;
    S4,若接收到确认开启该权限的指令,则每隔预定时间提取该终端设备中记录的用户行为信息,基于该用户行为信息计算该用户的风险值;S4: If an instruction confirming the activation of the authority is received, extract the user behavior information recorded in the terminal device every predetermined time, and calculate the user's risk value based on the user behavior information;
    S5,基于该用户行为信息获取对应的预定的风险阈值,若该用户的风险值大于等于该风险阈值,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。S5. Obtain a corresponding predetermined risk threshold based on the user behavior information. If the user's risk value is greater than or equal to the risk threshold, mark the user as a risk user, and add the user information of the user and the device information of the terminal device To the list of risky users of the blockchain.
  14. 根据权利要求13所述的计算机可读存储介质,其中,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录及网页浏览记录,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The computer-readable storage medium of claim 13, wherein the user behavior information includes non-application operation information, and the non-application operation information includes call records, short message records, social application records, and web browsing records, and the The step of calculating the user's risk value with the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页 浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    将所述第一分值或者第二分值或者第一分值与第二分值的总和作为所述风险值。Use the first score or the second score or the sum of the first score and the second score as the risk value.
  15. 根据权利要求13所述的计算机可读存储介质,其中,所述用户行为信息包括非应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The computer-readable storage medium according to claim 13, wherein the user behavior information includes non-application operation information, and the non-application operation information includes call records, short message records, social application records, web browsing records, and address book information. The use frequency, the use frequency of short messages, the use frequency of social applications, and the frequency of web page browsing, the step of calculating the user's risk value based on the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
    将所述第一分值、第二分值及第三分值的总和作为所述风险值。The sum of the first score, the second score, and the third score is used as the risk value.
  16. 根据权利要求13所述的计算机可读存储介质,其中,所述用户行为信息包括非应用操作信息及应用操作信息,所述非应用操作信息包括通话记录、短信记录、社交应用记录、网页浏览记录、通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率,所述应用操作信息包括应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数,所述基于该用户行为信息计算该用户的风险值的步骤,具体包括:The computer-readable storage medium according to claim 13, wherein the user behavior information includes non-application operation information and application operation information, and the non-application operation information includes call records, short message records, social application records, and web browsing records , The use frequency of the address book, the use frequency of text messages, the use frequency of social applications, and the frequency of web page browsing, the application operation information includes application operation speed, application operation frequency, application operation time, and application operation modification times. The step of calculating the user's risk value with the user behavior information specifically includes:
    获取预设的第一分值关系表,分析所述通话记录中是否存在风险用户,基于所述第一分值关系表及本次分析结果记录第一分值;Acquiring a preset first score relationship table, analyzing whether there is a risk user in the call record, and recording the first score based on the first score relationship table and the result of this analysis;
    获取预设的第二分值关系表,提取所述短信记录、社交应用记录及网页浏览记录中的关键词,分析所述关键词是否与预定的风险关键词语义相同,基于所述第二分值关系表及本次分析结果记录第二分值;Obtain a preset second score relationship table, extract keywords in the short message records, social application records, and web browsing records, and analyze whether the keywords are semantically identical to predetermined risk keywords, based on the second score Value relationship table and record the second score of this analysis result;
    获取预设的第三分值关系表,基于所述第三分值关系表及所述通讯录的使用频率、短信的使用频率、社交应用的使用频率及网页的浏览频率获取第三分值;Obtain a preset third score relationship table, and obtain a third score based on the third score relationship table and the frequency of use of the address book, the frequency of use of short messages, the frequency of use of social applications, and the frequency of web page browsing;
    获取预设的第四分值关系表,基于所述第四分值关系表及所述应用操作速度、应用操作频率、应用操作时间及应用操作的修改次数获取第四分值;Acquiring a preset fourth score relationship table, and acquiring a fourth score based on the fourth score relationship table and the application operation speed, application operation frequency, application operation time, and modification times of the application operation;
    将所述第一分值、第二分值、第三分值及第四分值的总和作为所述风险值。The sum of the first score, the second score, the third score, and the fourth score is used as the risk value.
  17. 根据权利要求13所述的计算机可读存储介质,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端 设备的设备信息添加至区块链的风险用户名单中。The computer-readable storage medium according to claim 13, wherein after S5, it further comprises: if the risk value of the user is less than the risk threshold, after completing the business, if a risk event occurs in the user, marking the user The user is a risk user, and the user information of the user and the device information of the terminal device are added to the list of risk users on the blockchain.
  18. 根据权利要求14所述的计算机可读存储介质,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The computer-readable storage medium according to claim 14, wherein after S5, it further comprises: if the user's risk value is less than the risk threshold, after completing the business, if the user has a risk event, marking the user The user is a risk user, and the user information of the user and the device information of the terminal device are added to the list of risk users on the blockchain.
  19. 根据权利要求15所述的计算机可读存储介质,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The computer-readable storage medium according to claim 15, wherein after S5, it further comprises: if the risk value of the user is less than the risk threshold, after completing the business, if a risk event occurs to the user, marking the user The user is a risk user, and the user information of the user and the device information of the terminal device are added to the list of risk users on the blockchain.
  20. 根据权利要求16所述的计算机可读存储介质,其中,在S5之后还包括:若该用户的风险值小于该风险阈值,则在完成业务的办理后,若该用户发生风险事件,则标记该用户为风险用户,并将该用户的用户信息及该终端设备的设备信息添加至区块链的风险用户名单中。The computer-readable storage medium according to claim 16, wherein after S5, it further comprises: if the user's risk value is less than the risk threshold, after completing the business, if the user has a risk event, marking the user The user is a risk user, and the user information of the user and the device information of the terminal device are added to the list of risk users on the blockchain.
PCT/CN2020/086276 2019-07-05 2020-04-23 Blockchain-based information processing apparatus and method, and storage medium WO2021004123A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910607938.2A CN110458401A (en) 2019-07-05 2019-07-05 Information processing unit, method and storage medium based on block chain
CN201910607938.2 2019-07-05

Publications (1)

Publication Number Publication Date
WO2021004123A1 true WO2021004123A1 (en) 2021-01-14

Family

ID=68482450

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/086276 WO2021004123A1 (en) 2019-07-05 2020-04-23 Blockchain-based information processing apparatus and method, and storage medium

Country Status (2)

Country Link
CN (1) CN110458401A (en)
WO (1) WO2021004123A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458401A (en) * 2019-07-05 2019-11-15 深圳壹账通智能科技有限公司 Information processing unit, method and storage medium based on block chain
CN111131166B (en) * 2019-11-28 2022-06-21 重庆小雨点小额贷款有限公司 User behavior prejudging method and related equipment
CN111179063B (en) * 2019-12-31 2023-06-23 中国银行股份有限公司 Credit card business data processing method, system and related nodes based on block chain
CN113362137B (en) * 2021-06-11 2024-04-05 北京十一贝科技有限公司 Insurance product recommendation method and device, terminal equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100032A (en) * 2014-05-23 2015-11-25 腾讯科技(北京)有限公司 Method and apparatus for preventing resource steal
CN106470204A (en) * 2015-08-21 2017-03-01 阿里巴巴集团控股有限公司 User identification method based on request behavior characteristicss, device, equipment and system
CN107688997A (en) * 2017-08-23 2018-02-13 浙江天悦信息技术有限公司 A kind of algorithm that micro- loan consumer's risk scoring is realized based on message registration
US20190116190A1 (en) * 2017-05-15 2019-04-18 Forcepoint Llc User Behavior Profile Environment
CN109815685A (en) * 2019-01-18 2019-05-28 新华网股份有限公司 Method for managing user right, device, electronic equipment and readable storage medium storing program for executing
CN110458401A (en) * 2019-07-05 2019-11-15 深圳壹账通智能科技有限公司 Information processing unit, method and storage medium based on block chain

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844526A (en) * 2015-01-14 2016-08-10 阿里巴巴集团控股有限公司 Networked transaction risk identification method and networked transaction risk identification device based on computer system
CN106255113A (en) * 2015-06-10 2016-12-21 中兴通讯股份有限公司 The recognition methods of harassing call and device
JP2017107512A (en) * 2015-12-11 2017-06-15 富士通株式会社 Risk calculation method, risk calculation program and risk calculation device
CN107644340A (en) * 2016-07-22 2018-01-30 阿里巴巴集团控股有限公司 Risk Identification Method, client device and risk recognition system
CN108985553B (en) * 2018-06-05 2023-08-29 中国平安人寿保险股份有限公司 Abnormal user identification method and equipment
CN109933963A (en) * 2019-03-21 2019-06-25 娄奥林 One kind knowing method for distinguishing for user behavior track characteristic

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100032A (en) * 2014-05-23 2015-11-25 腾讯科技(北京)有限公司 Method and apparatus for preventing resource steal
CN106470204A (en) * 2015-08-21 2017-03-01 阿里巴巴集团控股有限公司 User identification method based on request behavior characteristicss, device, equipment and system
US20190116190A1 (en) * 2017-05-15 2019-04-18 Forcepoint Llc User Behavior Profile Environment
CN107688997A (en) * 2017-08-23 2018-02-13 浙江天悦信息技术有限公司 A kind of algorithm that micro- loan consumer's risk scoring is realized based on message registration
CN109815685A (en) * 2019-01-18 2019-05-28 新华网股份有限公司 Method for managing user right, device, electronic equipment and readable storage medium storing program for executing
CN110458401A (en) * 2019-07-05 2019-11-15 深圳壹账通智能科技有限公司 Information processing unit, method and storage medium based on block chain

Also Published As

Publication number Publication date
CN110458401A (en) 2019-11-15

Similar Documents

Publication Publication Date Title
WO2021004123A1 (en) Blockchain-based information processing apparatus and method, and storage medium
RU2670030C2 (en) Methods and systems for determining non-standard user activity
US11423131B2 (en) Systems and methods for improving KBA identity authentication questions
US9491182B2 (en) Methods and systems for secure internet access and services
WO2015043491A1 (en) Method and system for performing security verification on login of internet account
US9852309B2 (en) System and method for securing personal data elements
US10534931B2 (en) Systems, devices and methods for automatic detection and masking of private data
WO2019056721A1 (en) Information pushing method, electronic device and computer storage medium
US10114960B1 (en) Identifying sensitive data writes to data stores
US10567374B2 (en) Information processing method and server
US10133859B2 (en) Managing registration of user identity using handwriting
TWI701932B (en) Identity authentication method, server and client equipment
JP7014898B2 (en) ID authentication method, device, server and computer readable medium
WO2020056996A1 (en) Method and apparatus for managing donation information, computer device, and storage medium
CN111131221A (en) Interface checking device, method and storage medium
WO2019071968A1 (en) Salary calculation method, application server, and computer readable storage medium
US20230024594A1 (en) Systems and methods for safe social gatherings during a contagious pandemic
CN109542945B (en) Block chain data statistical analysis method, device and storage medium
CN109145621B (en) Document management method and device
US20220083507A1 (en) Trust chain for official data and documents
JP7401288B2 (en) System and method for changing account record passwords under threat of unauthorized access to user data
CN108241732B (en) Electronic device, information processing method, and storage medium
WO2023109046A1 (en) Anomaly detection method and apparatus, electronic device, and storage medium
CN111079187B (en) Smart card and file management method thereof
RU2702275C1 (en) Method and system for marking user actions for subsequent analysis and accumulation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20836361

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11.05.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20836361

Country of ref document: EP

Kind code of ref document: A1