CN105763505A - Operation method and device based on user account - Google Patents

Operation method and device based on user account Download PDF

Info

Publication number
CN105763505A
CN105763505A CN201410778622.7A CN201410778622A CN105763505A CN 105763505 A CN105763505 A CN 105763505A CN 201410778622 A CN201410778622 A CN 201410778622A CN 105763505 A CN105763505 A CN 105763505A
Authority
CN
China
Prior art keywords
risk value
account
operational risk
login position
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410778622.7A
Other languages
Chinese (zh)
Other versions
CN105763505B (en
Inventor
肖存
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410778622.7A priority Critical patent/CN105763505B/en
Publication of CN105763505A publication Critical patent/CN105763505A/en
Application granted granted Critical
Publication of CN105763505B publication Critical patent/CN105763505B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The present invention provides an operation method and device based on a user account. The method comprises a step of obtaining the current login position information and common login position information of a current user account, and calculating the first operation risk value of the current user account based on the current login position information and common login position information, a step of obtaining the second operation risk value corresponding to the current user account according to the current login position information, and a step of calculating the total risk value of a current user account according to the calculated first operation risk value and the obtained second operation risk value, and executing corresponding operations based on the total risk value. According to the operation method and device based on a user account of the embodiment of the invention, the safety problem of the account of a user can be accurately determined, the corresponding operation of protecting account safety is executed, and the safety of the user account is ensured.

Description

Operational approach and device based on user account
Technical field
The application relates to field of computer technology, particularly relates to a kind of operational approach based on user account and device.
Background technology
Along with the high speed development of mobile Internet with popularize on a large scale, user is likely to not carry out account login in fixing geographical position, due to the safety issue that the Internet presently, there are, user is on another geographical position after Successful login, and the operational risk value corresponding to user account is different.
But; existing risk monitoring and control system not taking into full account, the situation of different case occurs zones of different; only it is based on the conventional login geographical position of user and judges the account whether different-place login of user; specifically; obtain the conventional login geographical position of user; and whether the current distance logged between ground and the conventional login geographical position of user monitoring user exceedes predetermined threshold value; if exceeding; the account that then prompting user is current is different-place login; but; only pointing out different-place login, the safety of the user account that can not adequately protect, user account yet suffers from safety problem.
Summary of the invention
One of technical problem that the application is intended to solve in correlation technique at least to a certain extent.
For this, first purpose of the application is in that to propose a kind of operational approach based on user account, and the method can accurately determine the safety problem that the account of user exists, and performs the operation of corresponding protection account number safety, it is ensured that the safety of user account.
Second purpose of the application is in that to propose a kind of operation device based on user account.
For reaching above-mentioned purpose, the application first aspect embodiment proposes a kind of operational approach based on user account, including: obtain current login position information and the conventional login position information of active user's account, and calculate the first operational risk value of described active user's account based on current login position information and conventional login position information;The second operational risk value that active user's account according to the acquisition of information of described current login position is corresponding;And calculate described active user's account overall risk value according to the described first operational risk value calculated and the described second operational risk value got, and perform corresponding operation based on described overall risk value.
The operational approach based on user account of the embodiment of the present application, obtain current login position information and the conventional login position information of active user's account, and the first operational risk value of active user's account is calculated based on current login position information and conventional login position information, and the second operational risk value according to current login position acquisition of information active user's account, and calculate active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value, thus, can accurately determine the safety problem that the account of user exists, and the operation of protection account number safety is performed based on overall risk value, ensure that the safety of user account.
For reaching above-mentioned purpose, the application second aspect embodiment proposes a kind of operation device based on user account, including: the first processing module, for obtaining current login position information and the conventional login position information of active user's account, and calculate the first operational risk value of described active user's account based on current login position information and conventional login position information;Acquisition module, for the second operational risk value that active user's account according to the acquisition of information of described current login position is corresponding;And second processing module, for calculating described active user's account overall risk value according to the described first operational risk value calculated and the described second operational risk value got, and perform corresponding operation based on described overall risk value.
The operation device based on user account of the embodiment of the present application, first processing module obtains current login position information and the conventional login position information of active user's account, the first operational risk value of active user's account is calculated based on current login position information and conventional login position information, then the acquisition module the second operational risk value according to current login position acquisition of information active user's account, and second processing module calculate active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value, thus, can accurately determine the safety problem that the account of user exists, and the operation of protection account number safety is performed based on overall risk value, ensure that the safety of user account.
Accompanying drawing explanation
Fig. 1 is the flow chart of the operational approach based on user account of one embodiment of the application.
Fig. 2 is the structural representation of the operation device based on user account of one embodiment of the application.
Fig. 3 is the structural representation of the operation device based on user account of another embodiment of the application.
Detailed description of the invention
Being described below in detail embodiments herein, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of same or like function from start to finish.The embodiment described below with reference to accompanying drawing is illustrative of, it is intended to be used for explaining the application, and it is not intended that restriction to the application.
Below with reference to the accompanying drawings operational approach based on user account and the device of the embodiment of the present application are described.
Fig. 1 is the flow chart of the operational approach based on user account of one embodiment of the application, as it is shown in figure 1, should include based on the operational approach of user account:
S101, obtains current login position information and the conventional login position information of active user's account, and calculates the first operational risk value of active user's account based on current login position information and conventional login position information.
In this embodiment, the current login position information of active user's account can be obtained in several ways, such as, after monitoring active user's login account, IP address (the InternetProtocolAddress of the terminal of active user can be obtained, internet protocol address), and from IP geographic position data storehouse, the geographical location information of correspondence is obtained according to the IP address of terminal, the geographical location information obtained is the current login position information of active user's account;Additionally, the current login position information of active user's account can also be obtained in other way, such as, can also passing through global positioning satellite (GlobalPositioningSystem) equipment in terminal and obtain the geographical location information of the terminal that active user's account uses, namely this geographical location information is the current login position information of active user's account.
Conventional login position information for active user, after active user logs in the user account of correspondence, server can obtain the conventional login position information of active user's account according to user account from data base, wherein, above-mentioned conventional login position information is that server obtains the login position information of active user's account in preset time period, and acquired login position information is added up, determine according to statistical result.Wherein, above-mentioned preset time period can pre-set, for instance, preset time period is 6 months.
The conventional login position information of above-mentioned active user's account can be one or more, if the conventional login position information of active user's account is multiple, when calculating the first operational risk value of active user's account based on current login position information and conventional login position information, a conventional login position information can be selected from the information of conventional login position, and calculate the distance between current login position and selected conventional login position, it is then based on distance and calculates the first operational risk value of active user's account.
It addition, when the conventional login position information of active user's account is multiple, it is also possible to calculate the first operational risk value of active user's account based on other mode.Such as, assuming that the conventional login position of active user is two, the distance between the conventional login position of the two and current login position can be calculated respectively, and calculate corresponding operational risk value based on corresponding distance, then corresponding operational risk value is weighted average to obtain the first operational risk value of active user's account.
Under normal circumstances, the distance between conventional login position and the current login position of active user's account is more big, and the first operational risk value of active user's login account is more big.
S102, according to the second operational risk value that current login position acquisition of information active user's account is corresponding.
In this embodiment, before the second operational risk value according to current login position acquisition of information active user's account, can also include: obtain the different types of operational risk value of zones of different based on historical statistical data by machine learning algorithm, and the operational risk value of corresponding region is calculated according to the different types of operational risk value of zones of different, and using the operational risk value of corresponding region as the second operational risk value, and preserve the different types of operational risk value of zones of different and the second operational risk value.
For example it is assumed that only preserve steal-number and the swindle data that four areas (area A, B, C and D) occur in historical data, historical data is as shown in table 1.
Table 1 historical data
Wherein, with A1, B1, C1 and D1, table 1 represents that the caseload of steal-number occurs in four areas respectively, represent four areas respectively with A2, B2, C2 and D2 and the caseload of swindle occurs.
After obtaining the historical data of four area generation steal-number and swindle, four areas can be calculated based on historical data and the operational risk value of steal-number or swindle occurs, wherein, the process of the operational risk value calculating the generation steal-number of each area or swindle is similar, for the operational risk value calculating area A generation steal-number, calculating process is described below: first calculate area A and the proportion of steal-number occurs, assuming that represent, with X, the proportion that steal-number occurs, X=A1/ (A1+B1+C1+D1), calculate the proportion that steal-number occurs in all cases, assuming that represent, with Y, the proportion that steal-number occurs in all cases, thenThe obtained result that is finally multiplied by two proportions calculated is the operational risk value of steal-number.
After calculating the area different types of operational risk value of A, by the area different types of operational risk value of A is weighted on average can calculating the operational risk value of area A, this operational risk value is account and is positioned at the operational risk value of area A, i.e. the second operational risk value of account.It should be noted that, the mode of the operational risk value of above-mentioned calculating zones of different different types of operational risk value and calculating corresponding region is only a kind of example of this embodiment, it is also possible to calculate the operational risk value of the different types of operational risk value of zones of different and corresponding region in other manners.
After calculating different types of operational risk value corresponding to each region and the second corresponding operational risk value, different types of operational risk value corresponding to each region and the second operational risk value are preserved by server.
Again for example it is assumed that preserving the operational risk value that Guangzhou occurs operational risk value corresponding to steal-number to be 0.6, swindle is corresponding in server is 0.8, the account the second operational risk value in Guangzhou is 0.7.When the current login position information of active user's account is Guangzhou, current account can be obtained from server according to current login position information and the operational risk value of steal-number and swindle and the second operational risk value of correspondence occur in Guangzhou.
S103, calculates active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and performs corresponding operation based on overall risk value.
Such as, first operational risk value of active user's account is 0.8, second operational risk value is 0.7, it is assumed that the first operational risk value weight coefficient corresponding with the second operational risk value is 0.5, is 0.75 by calculating the overall risk value that can obtain active user's account.It should be noted that the mode of above-mentioned calculating active user's account overall risk value is only a kind of example of this embodiment.
In this embodiment, after calculating active user's account overall risk value, indicating risk information can be sent to client based on overall risk value, client receives the indicating risk information that server sends, and shows corresponding indicating risk information on the interface of client, shows active user's account overall risk value in indicating risk information, user can stop performing corresponding operation according to indicating risk information, such as, after indicating risk information displayed on the terminals, user can stop execution and transfer accounts operation.
Additionally, in this embodiment, after the indicating risk information of correspondence displayed on the terminals, if monitoring user to trigger detailed inquiry button, terminal to server sends detailed inquiry request, server receives the detailed inquiry request that terminal sends, and return the first operational risk value, the different types of operational risk value of the second operational risk value and/or active user's account region according to detailed inquiry request to client, to generate the operational risk list inquiring about risk details for active user, facilitate the detailed inauguration situation that user checks that active user's account is corresponding.
After sending indicating risk information to client, if server receives Client-initiated operation requests, then return input prompt information according to operation requests to client, receive the information of user's input, and information is verified, if by verifying, then perform Client-initiated operation, otherwise, Client-initiated operation is interrupted.
Such as, after sending indicating risk information to client, if client control performs to transfer accounts operation to user, then user end to server sends operation requests, server receives Client-initiated operation requests, and return input prompt information to client, and send checking information to the mobile phone of binding active user's account, if after user completes input according to checking information, server receives the information of user's input, and verifies that whether the information that user inputs is correct, if it is correct, then perform Client-initiated to transfer accounts operation, if incorrect, then interrupt Client-initiated and operate.Thereby it is ensured that the property safety in user account, it is to avoid the property of user incurs loss.
Whether this embodiment is when analyzing active user's account and being safe; in conjunction with the first operational risk value of the on-site second operational risk value of active user's account and active user's account to whether active user's account is comprehensively analyzed safely; the analysis result of the account obtained whether safety is accurate; and after obtaining analysis result; the account of user is performed corresponding operation; to protect the safety of the account of user, it is ensured that the property safety in account.
The operational approach based on user account of the embodiment of the present application, obtain current login position information and the conventional login position information of active user's account, the first operational risk value of active user's account is calculated based on current login position information and conventional login position information, and the second operational risk value according to current login position acquisition of information active user's account, and calculate active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value, thus, can accurately determine the safety problem that the account of user exists, and the operation of protection account number safety is performed based on overall risk value, ensure that the safety of user account.
In order to realize above-described embodiment, the application also proposes a kind of operation device based on user account.
Fig. 2 is the structural representation of the operation device based on user account of one embodiment of the application, as in figure 2 it is shown, this device includes: the first processing module 100, acquisition module 200 and the second processing module 300, wherein:
First processing module 100 is for obtaining current login position information and the conventional login position information of active user's account, and calculates the first operational risk value of active user's account based on current login position information and conventional login position information;Acquisition module 200 is for the second operational risk value corresponding according to current login position acquisition of information active user's account;And second processing module 300 for calculating active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value.
First processing module 100 specifically for: obtain the login position information of active user's account in preset time period, acquired login position information added up, and determines conventional login position information according to statistical result.Wherein, above-mentioned preset time period can pre-set, for instance, preset time period can be 6 months.
The conventional login position information of above-mentioned active user's account can be one or more, when conventional login position information is multiple, first processing module 100 specifically for: from the information of conventional login position, select a conventional login position information, and calculate the distance between current login position and selected conventional login position, it is then based on distance and calculates the first operational risk value of active user's account.
Additionally, as shown in Figure 3, said apparatus can also include preserving module 400, this preservation module 400 is for before acquisition module 200 is according to the second operational risk value that current login position acquisition of information active user's account is corresponding, the different types of operational risk value of zones of different is obtained by machine learning algorithm based on historical statistical data, and calculate the operational risk value of corresponding region according to the different types of operational risk value of zones of different, and using the operational risk value of corresponding region as the second operational risk value;And preserve the different types of operational risk value of zones of different and the second operational risk value.
For example it is assumed that only preserve steal-number and the swindle data that four areas (area A, B, C and D) occur in historical data, historical data is as shown in table 1.
Table 1 historical data
Wherein, with A1, B1, C1 and D1, table 1 represents that the caseload of steal-number occurs in four areas respectively, represent four areas respectively with A2, B2, C2 and D2 and the caseload of swindle occurs.
After obtaining the historical data of four area generation steal-number and swindle, four areas can be calculated based on historical data and the operational risk value of steal-number or swindle occurs, wherein, the process of the operational risk value calculating the generation steal-number of each area or swindle is similar, for the operational risk value calculating area A generation steal-number, calculating process is described below: first calculate area A and the proportion of steal-number occurs, assuming that represent, with X, the proportion that steal-number occurs, X=A1/ (A1+B1+C1+D1), then the proportion that steal-number occurs in all cases is calculated, assuming that represent, with Y, the proportion that steal-number occurs in all cases, thenThe obtained result that is finally multiplied by two proportions calculated is the operational risk value of steal-number.
After calculating the area different types of operational risk value of A, by the area different types of operational risk value of A is weighted on average can calculating the operational risk value of area A, this operational risk value is account and is positioned at the operational risk value of area A, i.e. the second operational risk value of account.
After calculating different types of operational risk value corresponding to each region and the second operational risk value, preserve module 400 and different types of operational risk value corresponding to each region and the second operational risk value are preserved.
Additionally, said apparatus can also include the 3rd processing module 300,3rd processing module 300 is for receiving the detailed inquiry request that user triggers, and return the first operational risk value, the different types of operational risk value of the second operational risk value and/or active user's account region according to detailed inquiry request to client, to generate the operational risk list inquiring about risk details for active user.
The operating process of user account can be described by the operation device based on user account comprising the first processing module 100, acquisition module the 200, second processing module 300, preservation module 400 and the 3rd processing module 500 referring to the word of Fig. 1 and correspondence thereof, does not repeat herein.
The operation device based on user account of the embodiment of the present application, first processing module obtains current login position information and the conventional login position information of active user's account, the first operational risk value of active user's account is calculated based on current login position information and conventional login position information, then the acquisition module the second operational risk value according to current login position acquisition of information active user's account, and second processing module calculate active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value, thus, can accurately determine the safety problem that the account of user exists, and the operation of protection account number safety is performed based on overall risk value, ensure that the safety of user account.
In the description of this specification, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means in conjunction with this embodiment or example describe are contained at least one embodiment or the example of the application.In this manual, the schematic representation of above-mentioned term is necessarily directed to identical embodiment or example.And, the specific features of description, structure, material or feature can combine in one or more embodiments in office or example in an appropriate manner.Additionally, when not conflicting, the feature of the different embodiments described in this specification or example and different embodiment or example can be carried out combining and combining by those skilled in the art.
Additionally, term " first ", " second " are only for descriptive purposes, and it is not intended that indicate or imply relative importance or the implicit quantity indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express or implicitly include at least one this feature.In the description of the present application, " multiple " are meant that at least two, for instance two, three etc., unless otherwise expressly limited specifically.
Describe in flow chart or in this any process described otherwise above or method and be construed as, represent and include the module of code of executable instruction of one or more step for realizing specific logical function or process, fragment or part, and the scope of the preferred implementation of the application includes other realization, wherein can not press order that is shown or that discuss, including according to involved function by basic mode simultaneously or in the opposite order, performing function, this should be understood by embodiments herein person of ordinary skill in the field.
Represent in flow charts or in this logic described otherwise above and/or step, such as, it is considered the sequencing list of executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (such as computer based system, including the system of processor or other can from instruction execution system, device or equipment instruction fetch the system performing instruction), or use in conjunction with these instruction execution systems, device or equipment.For the purpose of this specification, " computer-readable medium " can be any can comprise, store, communicate, propagate or transmission procedure is for instruction execution system, device or equipment or the device that uses in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium includes following: have the electrical connection section (electronic installation) of one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), read only memory (ROM), erasable edit read only memory (EPROM or flash memory), fiber device, and portable optic disk read only memory (CDROM).Additionally, computer-readable medium can even is that the paper that can print described program thereon or other suitable media, because can such as by paper or other media be carried out optical scanning, then carry out editing, interpreting or be processed to electronically obtain described program with other suitable methods if desired, be then stored in computer storage.
Should be appreciated that each several part of the application can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with the storage software or firmware in memory and by suitable instruction execution system execution.Such as, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic of logic gates for data signal realizes logic function, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries can be by the hardware that program carrys out instruction relevant and complete, described program can be stored in a kind of computer-readable recording medium, this program upon execution, including the step one or a combination set of of embodiment of the method.
Additionally, each functional unit in each embodiment of the application can be integrated in a processing module, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module both can adopt the form of hardware to realize, it would however also be possible to employ the form of software function module realizes.If described integrated module is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..Although above it has been shown and described that embodiments herein, it is understandable that, above-described embodiment is illustrative of, it is impossible to be interpreted as the restriction to the application, and above-described embodiment can be changed in scope of the present application, revises, replace and modification by those of ordinary skill in the art.

Claims (12)

1. the operational approach based on user account, it is characterised in that including:
Obtain current login position information and the conventional login position information of active user's account, and calculate the first operational risk value of described active user's account based on current login position information and conventional login position information;
The second operational risk value that active user's account according to the acquisition of information of described current login position is corresponding;And
Calculate described active user's account overall risk value according to the described first operational risk value calculated and the described second operational risk value got, and perform corresponding operation based on described overall risk value.
2. method according to claim 1, it is characterised in that the described operation performing correspondence based on described overall risk value, including:
Indicating risk information is sent, so that described user stops performing corresponding operation according to described indicating risk information to client;Or
Sending indicating risk information to client, if receiving Client-initiated operation requests, then returning input prompt information to client, receive the information of described user input, and described information is verified, if by verifying, then perform Client-initiated operation, otherwise, interrupt Client-initiated operation.
3. method according to claim 1, it is characterised in that before the second operational risk value that described active user's account according to the acquisition of information of described current login position is corresponding, also include:
The different types of operational risk value of zones of different is obtained by machine learning algorithm based on historical statistical data, and calculate the operational risk value of corresponding region according to the different types of operational risk value of zones of different, and using the operational risk value of corresponding region as the second operational risk value;And
Preserve described zones of different different types of operational risk value and described second operational risk value.
4. method according to claim 1, it is characterised in that the conventional login position information of described acquisition active user's account, including:
Obtain the login position information of described active user's account in preset time period, acquired login position information is added up, and determines described conventional login position information according to statistical result.
5. method according to claim 1, it is characterised in that when described conventional login position information is multiple, described the first operational risk value calculating described active user's account based on current login position information and conventional login position information, including:
From the information of described conventional login position, select a conventional login position information, and calculate the distance between current login position and selected conventional login position, be then based on described distance and calculate the first operational risk value of described active user's account.
6. method according to claim 3, it is characterised in that also include:
Receive the detailed inquiry request that user triggers, and return described first operational risk value, the different types of operational risk value of described second operational risk value and/or described active user's account region according to described detailed inquiry request to described client, to generate the operational risk list inquiring about risk details for active user.
7. the operation device based on user account, it is characterised in that including:
First processing module, for obtaining current login position information and the conventional login position information of active user's account, and calculates the first operational risk value of described active user's account based on current login position information and conventional login position information;
Acquisition module, for the second operational risk value that active user's account according to the acquisition of information of described current login position is corresponding;And
Second processing module, for calculating described active user's account overall risk value according to the described first operational risk value calculated and the described second operational risk value got, and performs corresponding operation based on described overall risk value.
8. device according to claim 7, it is characterised in that described second processing module, specifically for:
Indicating risk information is sent, so that described user stops performing corresponding operation according to described indicating risk information to client;Or
Sending indicating risk information to client, if receiving Client-initiated operation requests, then returning input prompt information to client, receive the information of described user input, and described information is verified, if by verifying, then perform Client-initiated operation, otherwise, interrupt Client-initiated operation.
9. device according to claim 7, it is characterised in that also include:
Preserve module, before the second operational risk value corresponding in described acquisition module active user's account according to the acquisition of information of described current login position, the different types of operational risk value of zones of different is obtained by machine learning algorithm based on historical statistical data, and calculate the operational risk value of corresponding region according to the different types of operational risk value of zones of different, and using the operational risk value of corresponding region as the second operational risk value;And preserve described zones of different different types of operational risk value and described second operational risk value.
10. device according to claim 7, it is characterised in that described first processing module, specifically for:
Obtain the login position information of described active user's account in preset time period, acquired login position information is added up, and determines described conventional login position information according to statistical result.
11. device according to claim 7, it is characterised in that described first processing module, specifically for:
When described conventional login position information is multiple, a conventional login position information is selected from the information of described conventional login position, and calculate the distance between current login position and selected conventional login position, it is then based on described distance and calculates the first operational risk value of described active user's account.
12. device according to claim 9, it is characterised in that also include:
3rd processing module, for receiving the detailed inquiry request that user triggers, and return described first operational risk value, the different types of operational risk value of described second operational risk value and/or described active user's account region according to described detailed inquiry request to described client, to generate the operational risk list inquiring about risk details for active user.
CN201410778622.7A 2014-12-15 2014-12-15 Operating method and device based on user account Active CN105763505B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410778622.7A CN105763505B (en) 2014-12-15 2014-12-15 Operating method and device based on user account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410778622.7A CN105763505B (en) 2014-12-15 2014-12-15 Operating method and device based on user account

Publications (2)

Publication Number Publication Date
CN105763505A true CN105763505A (en) 2016-07-13
CN105763505B CN105763505B (en) 2019-02-26

Family

ID=56336858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410778622.7A Active CN105763505B (en) 2014-12-15 2014-12-15 Operating method and device based on user account

Country Status (1)

Country Link
CN (1) CN105763505B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239680A (en) * 2017-05-22 2017-10-10 微梦创科网络科技(中国)有限公司 A kind of method and device that risk assessment is carried out to User logs in
CN110290132A (en) * 2019-06-24 2019-09-27 北京奇艺世纪科技有限公司 A kind of IP address processing method, device, electronic equipment and storage medium
CN110335045A (en) * 2019-07-01 2019-10-15 阿里巴巴集团控股有限公司 Strange land risk determination method and device
CN110533269A (en) * 2018-05-23 2019-12-03 阿里巴巴集团控股有限公司 Business risk preventing control method and device
CN110995465A (en) * 2019-11-06 2020-04-10 国网浙江武义县供电有限公司 Communication point panoramic view information operation and maintenance method and system
CN111539737A (en) * 2020-04-27 2020-08-14 支付宝(杭州)信息技术有限公司 Account risk detection method, device and equipment
CN112165379A (en) * 2020-09-28 2021-01-01 武汉虹信技术服务有限责任公司 User secure login method and device and terminal equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023718A (en) * 2012-11-29 2013-04-03 北京奇虎科技有限公司 Device and method for monitoring user login
CN103095658A (en) * 2011-11-03 2013-05-08 北京神州泰岳软件股份有限公司 Account login method and system
US8452980B1 (en) * 2010-03-29 2013-05-28 Emc Corporation Defeating real-time trojan login attack with delayed interaction with fraudster
CN103457923A (en) * 2012-06-05 2013-12-18 阿里巴巴集团控股有限公司 Method, device and system for controlling different-place login
CN103532797A (en) * 2013-11-06 2014-01-22 网之易信息技术(北京)有限公司 Abnormity monitoring method and device for user registration

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8452980B1 (en) * 2010-03-29 2013-05-28 Emc Corporation Defeating real-time trojan login attack with delayed interaction with fraudster
CN103095658A (en) * 2011-11-03 2013-05-08 北京神州泰岳软件股份有限公司 Account login method and system
CN103457923A (en) * 2012-06-05 2013-12-18 阿里巴巴集团控股有限公司 Method, device and system for controlling different-place login
CN103023718A (en) * 2012-11-29 2013-04-03 北京奇虎科技有限公司 Device and method for monitoring user login
CN103532797A (en) * 2013-11-06 2014-01-22 网之易信息技术(北京)有限公司 Abnormity monitoring method and device for user registration

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239680A (en) * 2017-05-22 2017-10-10 微梦创科网络科技(中国)有限公司 A kind of method and device that risk assessment is carried out to User logs in
CN107239680B (en) * 2017-05-22 2019-09-06 微梦创科网络科技(中国)有限公司 A kind of couple of user logs in the method and device for carrying out risk assessment
CN110533269A (en) * 2018-05-23 2019-12-03 阿里巴巴集团控股有限公司 Business risk preventing control method and device
CN110533269B (en) * 2018-05-23 2023-05-16 阿里巴巴集团控股有限公司 Business risk prevention and control method and device
CN110290132A (en) * 2019-06-24 2019-09-27 北京奇艺世纪科技有限公司 A kind of IP address processing method, device, electronic equipment and storage medium
CN110290132B (en) * 2019-06-24 2022-02-11 北京奇艺世纪科技有限公司 IP address processing method and device, electronic equipment and storage medium
CN110335045A (en) * 2019-07-01 2019-10-15 阿里巴巴集团控股有限公司 Strange land risk determination method and device
CN110995465A (en) * 2019-11-06 2020-04-10 国网浙江武义县供电有限公司 Communication point panoramic view information operation and maintenance method and system
CN111539737A (en) * 2020-04-27 2020-08-14 支付宝(杭州)信息技术有限公司 Account risk detection method, device and equipment
CN112165379A (en) * 2020-09-28 2021-01-01 武汉虹信技术服务有限责任公司 User secure login method and device and terminal equipment

Also Published As

Publication number Publication date
CN105763505B (en) 2019-02-26

Similar Documents

Publication Publication Date Title
CN105763505A (en) Operation method and device based on user account
KR102201919B1 (en) Random forest model training method, electronic device and storage medium
CN108183924A (en) A kind of login validation method and terminal device
CN106686599B (en) Method and equipment for risk management of application information
CN110991575B (en) Asset inventory method and device, readable storage medium and robot
CN105683910B (en) System and method for updating the system-level service in read-only system image
CN105426483A (en) File reading method and device based on distributed system
CN109710695A (en) The identification of transactions requests validity and initiating method, device, equipment and medium
WO2015188604A1 (en) Phishing webpage detection method and device
CN109491733B (en) Interface display method based on visualization and related equipment
CN104363112A (en) Parameter management method and parameter management device
CN111080374A (en) Test method of advertisement delivery strategy, bidding server and advertisement delivery system
KR101508429B1 (en) System and method for providing agent service to user terminal
KR101951015B1 (en) Server detecting abnormal game activity and operating method of thereof
KR101672627B1 (en) User individual information providing method and system using verifying personal identity
CN110110236B (en) Information pushing method, device, equipment and storage medium
CN104375935A (en) Method and device for testing SQL injection attack
CN113961836A (en) Page jump method and device, electronic equipment and storage medium
CN108399128A (en) A kind of generation method of user data, device, server and storage medium
CN104239514A (en) Webpage rendering method, device and mobile terminal
CN110162982B (en) Method and device for detecting illegal rights, storage medium and electronic equipment
CN104268231B (en) A kind of file access method, device and Intelligent File System
CN111027977A (en) Data verification method and device and electronic equipment
CN112688861B (en) Method and equipment for sending session information in social application
CN110839201B (en) Pipeline data processing method, transmitting device, receiving device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1226218

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201010

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201010

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right