Detailed description of the invention
Being described below in detail embodiments herein, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of same or like function from start to finish.The embodiment described below with reference to accompanying drawing is illustrative of, it is intended to be used for explaining the application, and it is not intended that restriction to the application.
Below with reference to the accompanying drawings operational approach based on user account and the device of the embodiment of the present application are described.
Fig. 1 is the flow chart of the operational approach based on user account of one embodiment of the application, as it is shown in figure 1, should include based on the operational approach of user account:
S101, obtains current login position information and the conventional login position information of active user's account, and calculates the first operational risk value of active user's account based on current login position information and conventional login position information.
In this embodiment, the current login position information of active user's account can be obtained in several ways, such as, after monitoring active user's login account, IP address (the InternetProtocolAddress of the terminal of active user can be obtained, internet protocol address), and from IP geographic position data storehouse, the geographical location information of correspondence is obtained according to the IP address of terminal, the geographical location information obtained is the current login position information of active user's account;Additionally, the current login position information of active user's account can also be obtained in other way, such as, can also passing through global positioning satellite (GlobalPositioningSystem) equipment in terminal and obtain the geographical location information of the terminal that active user's account uses, namely this geographical location information is the current login position information of active user's account.
Conventional login position information for active user, after active user logs in the user account of correspondence, server can obtain the conventional login position information of active user's account according to user account from data base, wherein, above-mentioned conventional login position information is that server obtains the login position information of active user's account in preset time period, and acquired login position information is added up, determine according to statistical result.Wherein, above-mentioned preset time period can pre-set, for instance, preset time period is 6 months.
The conventional login position information of above-mentioned active user's account can be one or more, if the conventional login position information of active user's account is multiple, when calculating the first operational risk value of active user's account based on current login position information and conventional login position information, a conventional login position information can be selected from the information of conventional login position, and calculate the distance between current login position and selected conventional login position, it is then based on distance and calculates the first operational risk value of active user's account.
It addition, when the conventional login position information of active user's account is multiple, it is also possible to calculate the first operational risk value of active user's account based on other mode.Such as, assuming that the conventional login position of active user is two, the distance between the conventional login position of the two and current login position can be calculated respectively, and calculate corresponding operational risk value based on corresponding distance, then corresponding operational risk value is weighted average to obtain the first operational risk value of active user's account.
Under normal circumstances, the distance between conventional login position and the current login position of active user's account is more big, and the first operational risk value of active user's login account is more big.
S102, according to the second operational risk value that current login position acquisition of information active user's account is corresponding.
In this embodiment, before the second operational risk value according to current login position acquisition of information active user's account, can also include: obtain the different types of operational risk value of zones of different based on historical statistical data by machine learning algorithm, and the operational risk value of corresponding region is calculated according to the different types of operational risk value of zones of different, and using the operational risk value of corresponding region as the second operational risk value, and preserve the different types of operational risk value of zones of different and the second operational risk value.
For example it is assumed that only preserve steal-number and the swindle data that four areas (area A, B, C and D) occur in historical data, historical data is as shown in table 1.
Table 1 historical data
Wherein, with A1, B1, C1 and D1, table 1 represents that the caseload of steal-number occurs in four areas respectively, represent four areas respectively with A2, B2, C2 and D2 and the caseload of swindle occurs.
After obtaining the historical data of four area generation steal-number and swindle, four areas can be calculated based on historical data and the operational risk value of steal-number or swindle occurs, wherein, the process of the operational risk value calculating the generation steal-number of each area or swindle is similar, for the operational risk value calculating area A generation steal-number, calculating process is described below: first calculate area A and the proportion of steal-number occurs, assuming that represent, with X, the proportion that steal-number occurs, X=A1/ (A1+B1+C1+D1), calculate the proportion that steal-number occurs in all cases, assuming that represent, with Y, the proportion that steal-number occurs in all cases, thenThe obtained result that is finally multiplied by two proportions calculated is the operational risk value of steal-number.
After calculating the area different types of operational risk value of A, by the area different types of operational risk value of A is weighted on average can calculating the operational risk value of area A, this operational risk value is account and is positioned at the operational risk value of area A, i.e. the second operational risk value of account.It should be noted that, the mode of the operational risk value of above-mentioned calculating zones of different different types of operational risk value and calculating corresponding region is only a kind of example of this embodiment, it is also possible to calculate the operational risk value of the different types of operational risk value of zones of different and corresponding region in other manners.
After calculating different types of operational risk value corresponding to each region and the second corresponding operational risk value, different types of operational risk value corresponding to each region and the second operational risk value are preserved by server.
Again for example it is assumed that preserving the operational risk value that Guangzhou occurs operational risk value corresponding to steal-number to be 0.6, swindle is corresponding in server is 0.8, the account the second operational risk value in Guangzhou is 0.7.When the current login position information of active user's account is Guangzhou, current account can be obtained from server according to current login position information and the operational risk value of steal-number and swindle and the second operational risk value of correspondence occur in Guangzhou.
S103, calculates active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and performs corresponding operation based on overall risk value.
Such as, first operational risk value of active user's account is 0.8, second operational risk value is 0.7, it is assumed that the first operational risk value weight coefficient corresponding with the second operational risk value is 0.5, is 0.75 by calculating the overall risk value that can obtain active user's account.It should be noted that the mode of above-mentioned calculating active user's account overall risk value is only a kind of example of this embodiment.
In this embodiment, after calculating active user's account overall risk value, indicating risk information can be sent to client based on overall risk value, client receives the indicating risk information that server sends, and shows corresponding indicating risk information on the interface of client, shows active user's account overall risk value in indicating risk information, user can stop performing corresponding operation according to indicating risk information, such as, after indicating risk information displayed on the terminals, user can stop execution and transfer accounts operation.
Additionally, in this embodiment, after the indicating risk information of correspondence displayed on the terminals, if monitoring user to trigger detailed inquiry button, terminal to server sends detailed inquiry request, server receives the detailed inquiry request that terminal sends, and return the first operational risk value, the different types of operational risk value of the second operational risk value and/or active user's account region according to detailed inquiry request to client, to generate the operational risk list inquiring about risk details for active user, facilitate the detailed inauguration situation that user checks that active user's account is corresponding.
After sending indicating risk information to client, if server receives Client-initiated operation requests, then return input prompt information according to operation requests to client, receive the information of user's input, and information is verified, if by verifying, then perform Client-initiated operation, otherwise, Client-initiated operation is interrupted.
Such as, after sending indicating risk information to client, if client control performs to transfer accounts operation to user, then user end to server sends operation requests, server receives Client-initiated operation requests, and return input prompt information to client, and send checking information to the mobile phone of binding active user's account, if after user completes input according to checking information, server receives the information of user's input, and verifies that whether the information that user inputs is correct, if it is correct, then perform Client-initiated to transfer accounts operation, if incorrect, then interrupt Client-initiated and operate.Thereby it is ensured that the property safety in user account, it is to avoid the property of user incurs loss.
Whether this embodiment is when analyzing active user's account and being safe; in conjunction with the first operational risk value of the on-site second operational risk value of active user's account and active user's account to whether active user's account is comprehensively analyzed safely; the analysis result of the account obtained whether safety is accurate; and after obtaining analysis result; the account of user is performed corresponding operation; to protect the safety of the account of user, it is ensured that the property safety in account.
The operational approach based on user account of the embodiment of the present application, obtain current login position information and the conventional login position information of active user's account, the first operational risk value of active user's account is calculated based on current login position information and conventional login position information, and the second operational risk value according to current login position acquisition of information active user's account, and calculate active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value, thus, can accurately determine the safety problem that the account of user exists, and the operation of protection account number safety is performed based on overall risk value, ensure that the safety of user account.
In order to realize above-described embodiment, the application also proposes a kind of operation device based on user account.
Fig. 2 is the structural representation of the operation device based on user account of one embodiment of the application, as in figure 2 it is shown, this device includes: the first processing module 100, acquisition module 200 and the second processing module 300, wherein:
First processing module 100 is for obtaining current login position information and the conventional login position information of active user's account, and calculates the first operational risk value of active user's account based on current login position information and conventional login position information;Acquisition module 200 is for the second operational risk value corresponding according to current login position acquisition of information active user's account;And second processing module 300 for calculating active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value.
First processing module 100 specifically for: obtain the login position information of active user's account in preset time period, acquired login position information added up, and determines conventional login position information according to statistical result.Wherein, above-mentioned preset time period can pre-set, for instance, preset time period can be 6 months.
The conventional login position information of above-mentioned active user's account can be one or more, when conventional login position information is multiple, first processing module 100 specifically for: from the information of conventional login position, select a conventional login position information, and calculate the distance between current login position and selected conventional login position, it is then based on distance and calculates the first operational risk value of active user's account.
Additionally, as shown in Figure 3, said apparatus can also include preserving module 400, this preservation module 400 is for before acquisition module 200 is according to the second operational risk value that current login position acquisition of information active user's account is corresponding, the different types of operational risk value of zones of different is obtained by machine learning algorithm based on historical statistical data, and calculate the operational risk value of corresponding region according to the different types of operational risk value of zones of different, and using the operational risk value of corresponding region as the second operational risk value;And preserve the different types of operational risk value of zones of different and the second operational risk value.
For example it is assumed that only preserve steal-number and the swindle data that four areas (area A, B, C and D) occur in historical data, historical data is as shown in table 1.
Table 1 historical data
Wherein, with A1, B1, C1 and D1, table 1 represents that the caseload of steal-number occurs in four areas respectively, represent four areas respectively with A2, B2, C2 and D2 and the caseload of swindle occurs.
After obtaining the historical data of four area generation steal-number and swindle, four areas can be calculated based on historical data and the operational risk value of steal-number or swindle occurs, wherein, the process of the operational risk value calculating the generation steal-number of each area or swindle is similar, for the operational risk value calculating area A generation steal-number, calculating process is described below: first calculate area A and the proportion of steal-number occurs, assuming that represent, with X, the proportion that steal-number occurs, X=A1/ (A1+B1+C1+D1), then the proportion that steal-number occurs in all cases is calculated, assuming that represent, with Y, the proportion that steal-number occurs in all cases, thenThe obtained result that is finally multiplied by two proportions calculated is the operational risk value of steal-number.
After calculating the area different types of operational risk value of A, by the area different types of operational risk value of A is weighted on average can calculating the operational risk value of area A, this operational risk value is account and is positioned at the operational risk value of area A, i.e. the second operational risk value of account.
After calculating different types of operational risk value corresponding to each region and the second operational risk value, preserve module 400 and different types of operational risk value corresponding to each region and the second operational risk value are preserved.
Additionally, said apparatus can also include the 3rd processing module 300,3rd processing module 300 is for receiving the detailed inquiry request that user triggers, and return the first operational risk value, the different types of operational risk value of the second operational risk value and/or active user's account region according to detailed inquiry request to client, to generate the operational risk list inquiring about risk details for active user.
The operating process of user account can be described by the operation device based on user account comprising the first processing module 100, acquisition module the 200, second processing module 300, preservation module 400 and the 3rd processing module 500 referring to the word of Fig. 1 and correspondence thereof, does not repeat herein.
The operation device based on user account of the embodiment of the present application, first processing module obtains current login position information and the conventional login position information of active user's account, the first operational risk value of active user's account is calculated based on current login position information and conventional login position information, then the acquisition module the second operational risk value according to current login position acquisition of information active user's account, and second processing module calculate active user's account overall risk value according to the first operational risk value calculated and the second operational risk value got, and perform corresponding operation based on overall risk value, thus, can accurately determine the safety problem that the account of user exists, and the operation of protection account number safety is performed based on overall risk value, ensure that the safety of user account.
In the description of this specification, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means in conjunction with this embodiment or example describe are contained at least one embodiment or the example of the application.In this manual, the schematic representation of above-mentioned term is necessarily directed to identical embodiment or example.And, the specific features of description, structure, material or feature can combine in one or more embodiments in office or example in an appropriate manner.Additionally, when not conflicting, the feature of the different embodiments described in this specification or example and different embodiment or example can be carried out combining and combining by those skilled in the art.
Additionally, term " first ", " second " are only for descriptive purposes, and it is not intended that indicate or imply relative importance or the implicit quantity indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express or implicitly include at least one this feature.In the description of the present application, " multiple " are meant that at least two, for instance two, three etc., unless otherwise expressly limited specifically.
Describe in flow chart or in this any process described otherwise above or method and be construed as, represent and include the module of code of executable instruction of one or more step for realizing specific logical function or process, fragment or part, and the scope of the preferred implementation of the application includes other realization, wherein can not press order that is shown or that discuss, including according to involved function by basic mode simultaneously or in the opposite order, performing function, this should be understood by embodiments herein person of ordinary skill in the field.
Represent in flow charts or in this logic described otherwise above and/or step, such as, it is considered the sequencing list of executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (such as computer based system, including the system of processor or other can from instruction execution system, device or equipment instruction fetch the system performing instruction), or use in conjunction with these instruction execution systems, device or equipment.For the purpose of this specification, " computer-readable medium " can be any can comprise, store, communicate, propagate or transmission procedure is for instruction execution system, device or equipment or the device that uses in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium includes following: have the electrical connection section (electronic installation) of one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), read only memory (ROM), erasable edit read only memory (EPROM or flash memory), fiber device, and portable optic disk read only memory (CDROM).Additionally, computer-readable medium can even is that the paper that can print described program thereon or other suitable media, because can such as by paper or other media be carried out optical scanning, then carry out editing, interpreting or be processed to electronically obtain described program with other suitable methods if desired, be then stored in computer storage.
Should be appreciated that each several part of the application can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with the storage software or firmware in memory and by suitable instruction execution system execution.Such as, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic of logic gates for data signal realizes logic function, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries can be by the hardware that program carrys out instruction relevant and complete, described program can be stored in a kind of computer-readable recording medium, this program upon execution, including the step one or a combination set of of embodiment of the method.
Additionally, each functional unit in each embodiment of the application can be integrated in a processing module, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module both can adopt the form of hardware to realize, it would however also be possible to employ the form of software function module realizes.If described integrated module is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..Although above it has been shown and described that embodiments herein, it is understandable that, above-described embodiment is illustrative of, it is impossible to be interpreted as the restriction to the application, and above-described embodiment can be changed in scope of the present application, revises, replace and modification by those of ordinary skill in the art.