CN113723759A - Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree - Google Patents

Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree Download PDF

Info

Publication number
CN113723759A
CN113723759A CN202110875634.1A CN202110875634A CN113723759A CN 113723759 A CN113723759 A CN 113723759A CN 202110875634 A CN202110875634 A CN 202110875634A CN 113723759 A CN113723759 A CN 113723759A
Authority
CN
China
Prior art keywords
equipment
risk
intention
target
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110875634.1A
Other languages
Chinese (zh)
Other versions
CN113723759B (en
Inventor
赵志远
徐颖颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qilu Information Technology Co Ltd
Original Assignee
Beijing Qilu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qilu Information Technology Co Ltd filed Critical Beijing Qilu Information Technology Co Ltd
Priority to CN202110875634.1A priority Critical patent/CN113723759B/en
Publication of CN113723759A publication Critical patent/CN113723759A/en
Application granted granted Critical
Publication of CN113723759B publication Critical patent/CN113723759B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a device for providing internet service for equipment based on equipment intention and equipment risk, wherein the method comprises the following steps: determining a target equipment risk level according to the equipment risk information and the trained risk model; determining the intention level of the target equipment according to equipment intention information and the trained intention model; providing the authentication condition of the internet service for the target equipment according to the risk level and the intention level of the target equipment; and when the target device accepts the authentication condition, providing the internet service to the target device. The authentication condition of the invention considers the risk of the equipment to the internet service and the willingness level of the equipment to acquire the internet service at the same time, can control the risk and promote the equipment to acquire the internet service to the maximum extent, achieves the aim of finely operating various equipment users and improves the operation efficiency.

Description

Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree
Technical Field
The invention relates to the technical field of computer information processing, in particular to a method and a device for providing internet service for equipment based on equipment intention and equipment risk, electronic equipment and a computer readable medium.
Background
With the development of the internet, various internet service platforms have appeared. Such as: online shopping platforms, online car booking platforms, sharing platforms, maps, music, and the like. These platforms offer great convenience to people's lives, but because of their close integration with the internet, devices may have the possibility of compromising internet service platforms when enjoying these internet services, such as: fraud, loss of credit, etc.
In order to reduce the above possible damage to the internet platform, risk assessment is usually performed on the device applying for the internet service in advance, and then corresponding authentication conditions are formulated. In the formulation of the authentication condition, different authentication conditions are given to the device based on the risk dimension, so as to achieve the purpose of controlling the risk. The method only considers the risk of the equipment and does not consider the willingness level of the equipment for acquiring the Internet service, and has the problems of single dimension and incapability of refining.
Disclosure of Invention
In view of the above, the present invention is directed to a method, an apparatus, an electronic device and a computer-readable medium for providing internet services to a device based on an intention degree and a risk degree of the device, so as to at least partially solve at least one of the above technical problems.
In order to solve the above technical problem, a first aspect of the present invention provides a method for providing an internet service for a device based on a device intention level and a device risk level, where the device intention level refers to a level of willingness of the device to acquire the internet service, and the device risk level refers to a possibility that the device may damage an internet service platform while enjoying the internet service, the method including:
determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the device damaging the internet service platform behavior; the device risk information is device information related to risk behavior of the device;
determining the intention level of the target equipment according to equipment intention information and a trained intention model, wherein the intention model is used for calculating the intention degree of the equipment for acquiring the internet service; the device intention information is device information related to the intention of the device to acquire the internet service;
providing the authentication condition of the internet service for the target equipment according to the risk level and the intention level of the target equipment;
and when the target device accepts the authentication condition, providing the internet service to the target device.
According to a preferred embodiment of the present invention, the authentication condition for providing the internet service to the target device according to the risk level and the intention level of the target device includes:
determining a first target interval from a first preset interval according to the risk level; the greater the probability corresponding to the risk level is, the greater the minimum value and the maximum value of the corresponding first target interval are;
determining a second target interval from a second preset interval according to the intention level; the larger the corresponding intention degree of the intention hierarchy is, the larger the minimum value and the maximum value of the corresponding second target interval are;
and determining a target interval as the authentication condition according to the first target interval and the second target interval.
According to a preferred embodiment of the present invention, the authentication condition for providing the internet service to the target device according to the risk level and the intention level of the target device includes:
the authentication condition is calculated by the following formula:
X=A×a+B×b;
wherein, X is the numerical value interval corresponding to the authentication condition, A is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
According to a preferred embodiment of the invention, the method further comprises: and when the probability that the target equipment damages the Internet service platform is calculated by the risk model and is greater than a threshold value, rejecting the request of the target equipment for providing the Internet service.
According to a preferred embodiment of the present invention, the device risk information includes: device-related information and device risk-related information; wherein the device-related information comprises: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: whether the equipment applies for through the Internet service or not, the resource allocation limit of the equipment, the number of days for returning the resources after overdue of the equipment, the number of times for returning the resources after overdue of the equipment and whether the equipment has fraud records or not.
In order to solve the above technical problem, a second aspect of the present invention provides an apparatus for providing an internet service to a device based on a device intention level and a device risk level, where the device intention level refers to a level of will of the device for acquiring the internet service, and the device risk level refers to a possibility that the device may damage an internet service platform while enjoying the internet service, the apparatus including:
the first determining module is used for determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the device damaging the internet service platform behavior; the device risk information is device information related to risk behavior of the device;
the second determination module is used for determining the intention level of the target equipment according to equipment intention information and a trained intention model, and the intention model is used for calculating the intention of the equipment for acquiring the internet service; the device intention information is device information related to the intention of the device to acquire the internet service;
the first providing module is used for providing the authentication condition of the internet service for the target equipment according to the risk level and the intention level of the target equipment;
and the second providing module is used for providing the internet service for the target equipment when the target equipment accepts the authentication condition.
According to a preferred embodiment of the present invention, the first providing module includes:
the first sub-determination module is used for determining a first target interval from a first preset interval according to the risk level; the greater the probability corresponding to the risk level is, the greater the minimum value and the maximum value of the corresponding first target interval are;
the second sub-determination module is used for determining a second target interval from a second preset interval according to the intention level; the larger the corresponding intention degree of the intention hierarchy is, the larger the minimum value and the maximum value of the corresponding second target interval are;
and a third sub-determining module, configured to determine a target interval according to the first target interval and the second target interval, as the authentication condition.
According to a preferred embodiment of the present invention, the first providing module calculates the authentication condition by the following formula:
X=A×a+B×b;
wherein, X is the numerical value interval corresponding to the authentication condition, A is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
According to a preferred embodiment of the invention, the device further comprises: and the rejection module is used for rejecting the request of the target equipment for providing the internet service when the risk model calculates that the probability of the target equipment damaging the internet service platform is greater than a threshold value.
According to a preferred embodiment of the present invention, the device risk information includes: device-related information and device risk-related information; wherein the device-related information comprises: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: whether the equipment applies for through the Internet service or not, the resource allocation limit of the equipment, the number of days for returning the resources after overdue of the equipment, the number of times for returning the resources after overdue of the equipment and whether the equipment has fraud records or not.
To solve the above technical problem, a third aspect of the present invention provides an electronic device, comprising:
a processor; and
a memory storing computer executable instructions that, when executed, cause the processor to perform the method described above.
To solve the above technical problems, a fourth aspect of the present invention provides a computer-readable storage medium, wherein the computer-readable storage medium stores one or more programs which, when executed by a processor, implement the above method.
According to the method and the system, the risk level of the target equipment is determined according to the risk model, the intention level of the target equipment is determined according to the intention model, and the authentication condition of the internet service is provided for the target equipment by integrating the risk level and the intention level of the target equipment, so that the requirements of multi-dimensional and refined operation are met.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects obtained more clear, the following will describe in detail the embodiments of the present invention with reference to the accompanying drawings. It should be noted, however, that the drawings described below are only illustrations of exemplary embodiments of the invention, from which other embodiments can be derived by those skilled in the art without inventive step.
FIG. 1 is a flowchart illustrating a method for providing Internet services to a device based on the device intention and the device risk according to an embodiment of the invention;
FIG. 2 is a schematic diagram of determining a target device risk level and intent level according to an embodiment of the invention;
FIG. 3 is a schematic structural framework diagram of an apparatus for providing Internet services to a device based on the device intention and the device risk according to an embodiment of the present invention;
FIG. 4 is a block diagram of an exemplary embodiment of an electronic device in accordance with the present invention;
FIG. 5 is a schematic diagram of one embodiment of a computer-readable medium of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention may be embodied in many specific forms, and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, properties, effects or other characteristics described in a certain embodiment may be combined in any suitable manner in one or more other embodiments, while still complying with the technical idea of the invention.
In describing particular embodiments, specific details of structures, properties, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by one skilled in the art. However, it is not excluded that a person skilled in the art may implement the invention in a specific case without the above-described structures, performances, effects or other features.
The flow chart in the drawings is only an exemplary flow demonstration, and does not represent that all the contents, operations and steps in the flow chart are necessarily included in the scheme of the invention, nor does it represent that the execution is necessarily performed in the order shown in the drawings. For example, some operations/steps in the flowcharts may be divided, some operations/steps may be combined or partially combined, and the like, and the execution order shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The same reference numerals denote the same or similar elements, components, or parts throughout the drawings, and thus, a repetitive description thereof may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components, or sections, these elements, components, or sections should not be limited by these terms. That is, these phrases are used only to distinguish one from another. For example, a first device may also be referred to as a second device without departing from the spirit of the present invention. Furthermore, the term "and/or", "and/or" is intended to include all combinations of any one or more of the listed items.
In the invention, the equipment intention degree refers to the willingness level of the equipment for acquiring the Internet service; for example, the device intention may be obtained through a trained intention model. The equipment risk degree refers to the possibility that the equipment damages an internet service platform when enjoying the internet service; illustratively, the device risk level may be obtained by a trained risk model. The internet service may be any service provided based on internet technology, such as: member service for shopping, traveling, payment, navigation, group purchase, sharing of goods, social contact, online education, translation, payment and the like provided based on internet technology
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for providing internet services for equipment based on equipment intention and equipment risk according to the present invention, as shown in fig. 1, the method includes:
s1, determining a target equipment risk level according to the equipment risk information and the trained risk model;
the risk model is used for calculating the probability of damaging the internet service platform behavior of the equipment, and the probability calculated by the risk model can reflect the equipment risk degree.
The device risk information is device information related to risk behavior of the device; the device information may be any information related to a device, such as: device attribute information such as a device ID, a device model, etc., user information using the device, communication information of the device, shopping information of the device, location information of the device, etc., and the present invention is not particularly limited. The risky behavior may be fraudulent behavior, loss of trust behavior, etc.
In one example, the device risk information may include: device-related information and device risk-related information; wherein the device-related information comprises: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device user information may include: device user gender, device user age, device user scholastic, device location, and the like; the location of the device may be determined based on the longitude and latitude of the device. The device risk related information is related to an internet service, such as: in an internet-based resource exchange service, the device risk-related information includes: whether the equipment applies for through the Internet service or not, the resource allocation limit of the equipment, the number of days for returning the resources after overdue of the equipment, the number of times for returning the resources after overdue of the equipment and whether the equipment has fraud records or not. The internet-based resource exchange service is a service for providing resource exchange to user equipment on the basis of the internet. The resources refer to any materials, information, money, time, etc. that can be utilized. Information resources include computing resources and various types of data resources. The data resources include various private data in various domains.
The risk model may be established by a machine learning algorithm based on historical equipment risk information. Among them, algorithms used in machine learning are roughly classified into 3 types: supervised learning, unsupervised learning, and reinforcement learning. Supervised learning provides feedback to indicate whether the prediction is correct or not, while unsupervised learning does not respond: the algorithm only attempts to classify the data according to its underlying structure. Reinforcement learning is similar to supervised learning in that it receives feedback, but feedback is not necessary for every input or state.
As shown in fig. 2, the probability value output by the risk model may be divided into a plurality of intervals in advance according to M configured first thresholds Si, an interval formed by two adjacent first thresholds is a risk level, the probability value output by the intention model is divided into a plurality of intervals according to N configured second thresholds Ri, an interval formed by two adjacent second thresholds is an intention level, and the M risk levels and the N configured second thresholds Ri are combined into one intention levelThe N intention levels are combined into M × N preset categories in a crossed manner. As shown in FIG. 2, SM-1And SMRisk hierarchy and R of intervalsN-1And RNThe shadow areas formed by the intersection of the intention levels of the intervals are in the same category.
The risk level divides the equipment from the risk dimension, the equipment risk information is input into the risk model to obtain the probability that the target equipment damages the internet service platform behavior, and the probability that the target equipment damages the internet service platform behavior is compared with the first threshold values, so that the risk level of the target equipment can be found.
S2, determining the intention level of the target equipment according to the equipment intention information and the trained intention model,
wherein the intention model is used for calculating the intention degree of the equipment for acquiring the Internet service; the device intention information is device information related to intention of the device to acquire the internet service. The device information may be any information related to a device, such as: device attribute information such as a device ID, a device model, etc., user information using the device, communication information of the device, shopping information of the device, location information of the device, etc., and the present invention is not particularly limited.
In one example, the device intent information may include: device-related information and device intention-related information; wherein the device-related information comprises: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device intention-related information includes: whether the device registers the internet service platform, whether the device applies for the internet service, whether the device successfully obtains the internet service, and the like.
The intention hierarchy divides the equipment according to the dimension of the equipment for acquiring the internet service intention. Illustratively, after the equipment intention information is input into the trained intention model, the probability that the target equipment acquires the internet service is obtained, and the intention level where the target equipment is located can be found by comparing the probability that the target equipment acquires the internet service with each second threshold value.
S3, providing the authentication condition of the Internet service for the target equipment according to the risk level and the intention level of the target equipment;
the authentication condition is the amount of resources that the device needs to provide when providing the internet service to the device, and the resources refer to any available material, information, money, time, and the like. Information resources include computing resources and various types of data resources. The data resources include various private data in various domains. In one example, the authentication condition is a fee for obtaining internet services. Such as: the internet service is a paid member service, and the authentication condition may be: total price, unit price, point, virtual currency.
In one example, the category of the target device may be determined from M × N predetermined categories according to the risk level and the intention level of the target device. As shown in fig. 2, a region formed by intersecting the risk level where the target device is located and the second hierarchy is taken as a category where the target device is located. Before the step, the authentication conditions of each category can be configured according to the intention level and the risk level of each category, so that the step can directly find the authentication conditions of the target equipment according to the category of the target equipment and provide the authentication conditions of the internet service for the target equipment.
In one configuration of the authentication condition, the authentication condition is a cost interval for providing internet service, and when the risk level and the intention level are both relatively high intervals, the authentication condition is set as a highest interval (i.e., a highest cost interval); when the risk level and the intention level are both relatively low, the authentication condition is set to a lowest interval (i.e., a highest-cost interval). In one example, the relatively high interval only contains the highest interval, the relatively low interval only contains the lowest interval, and when both the risk level and the intention level are the highest intervals, the authentication condition is set as the highest interval; and when the risk level and the intention level are the lowest intervals, setting the authentication condition as the lowest interval. In another example, the relatively high interval may include all intervals in which the minimum value is greater than the first threshold, such as: first high interval, second high interval, etc., the relatively low interval may include all intervals having a maximum value less than the second threshold, such as: setting an authentication condition as a highest interval when the risk level and the intention level are both first high intervals, or both second high intervals, or one is the first high interval and the other is the second high interval; and when the risk level and the intention level are both the first low interval, or both the first low interval and the second low interval, or one of the first low interval and the second low interval is the first low interval, setting the authentication condition as the lowest interval. The first threshold and the second threshold are configured according to actual needs.
In another configuration mode of the authentication condition, the authentication condition is the unit price for providing internet service, and when the risk level and the intention level are both in the highest interval, namely the equipment with high risk and high intention, the highest unit price is provided, so that higher profit is obtained while the purchase rate is ensured; when the risk level is relatively higher, the interval of the intention level is relatively lower, namely the equipment with high risk and low intention is given corresponding low unit price, so that the purchase intention is promoted by price reduction; the risk level includes first to fifth high intervals with sequentially reduced intervals, five higher intervals, the intention level includes first to fifth low intervals with sequentially reduced intervals, and five lower intervals, and the five higher intervals may be configured with low unit prices corresponding to the five lower intervals respectively in a crossing manner; for equipment with low risk and high intention when the risk level is relatively low and the intention level is relatively high, corresponding high unit price is given, and higher income is obtained while purchasing is guaranteed; the risk level includes first to fifth low intervals of which the intervals are sequentially reduced, and five lower intervals, the intention level includes first to fifth high intervals of which the intervals are sequentially reduced, and five higher intervals, and high unit prices of the five higher intervals respectively corresponding to the five low intervals in a crossed manner can be configured; the lowest unit price is given to the equipment with the lowest risk level and the lowest intention level, namely, the equipment with low risk and low intention so as to attract equipment to purchase.
In another example, providing the authentication condition of the internet service for the target device according to the risk level and the intention level of the target device includes:
s31, determining a first target interval from the first preset intervals according to the risk level of the target equipment;
the greater the probability corresponding to the risk level is, the greater the minimum value and the maximum value of the corresponding first target interval are; for example, the first preset interval may be an interval of authentication conditions corresponding to different preconfigured risk levels. The probability corresponding to the risk level is used to represent an average risk probability of the devices in the risk level, which may be an average value of the risk probabilities of the devices in the risk level.
S32, determining a second target interval from a second preset interval according to the intention level;
the larger the corresponding intention degree of the intention hierarchy is, the larger the minimum value and the maximum value of the corresponding second target interval are; for example, the second preset section may be a section of the authentication condition corresponding to different intention levels configured in advance. The intention degree corresponding to the intention level is used for representing the average intention degree of the equipment in the intention level for obtaining the internet service, and the intention degree can be the average value of the intention degrees of all the equipment in the risk level for obtaining the internet service.
And S33, determining a target interval according to the first target interval and the second target interval as the authentication condition.
For example, the authentication condition is a fee interval for providing internet service, and the target interval may be an authentication condition if an overlapping interval of the first target interval and the second target interval is directly used as the target interval. Further, if the first target section and the second target section do not have an overlapping section, the smaller section of the first target section and the second target section may be set as the target section. For example, if the first target interval and the second target interval do not have an overlapping interval, the maximum value of the first target interval and the minimum value of the second target interval may be compared, and if the maximum value of the first target interval is smaller than the minimum value of the second target interval, the first target interval is regarded as the target interval, otherwise, the second target interval is regarded as the target interval.
In another example, the authentication condition is a unit price for providing the internet service, and an average value of a maximum value and a minimum value of the first target interval and the second target interval may be used as the authentication condition.
In yet another example, the authentication condition for providing the internet service to the target device according to the risk level and the intention level of the target device includes:
the authentication condition is calculated by the following formula:
X=A×a+B×b;
wherein, X is the numerical value interval corresponding to the authentication condition, A is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval. The preset risk interval is a numerical interval of the authentication condition corresponding to the preset lowest risk level, and the preset intention interval is a numerical interval of the authentication condition corresponding to the preset lowest intention level.
And S4, when the target device accepts the authentication condition, providing the Internet service to the target device.
Further, the present invention may also adjust the device policy according to the device feedback, and then the method further includes:
s5, receiving feedback of the target equipment;
wherein the feedback of the target device comprises: accepting the authentication condition and rejecting the authentication condition.
And S6, adjusting the authentication condition according to the feedback of the target equipment.
For example, a ratio Q1 of devices rejecting the authentication condition to all devices providing the authentication condition, a ratio Q2 of devices accepting the authentication condition to devices rejecting the authentication condition, and the like may be calculated according to feedback from the target device, and when Q1 is greater than a preset ratio and/or Q2 is greater than a preset ratio, the authentication condition is adjusted, such as: the cost for providing the internet service is reduced according to a preset ratio, and the like.
In addition, in order to avoid the loss of the internet service platform, when the risk model calculates that the probability of the target device damaging the internet service platform is larger than a threshold value, the risk that the device is cheated or overdue is large, and the request for providing the internet service is rejected from the target device. Further, the device may be stored in a blacklist to deny any application for internet services by the device.
Fig. 3 is an apparatus for providing internet services to a device based on intention level of the device and risk level of the device, where the intention level of the device is to acquire the internet services, and the risk level of the device is a possibility that the device damages an internet service platform when enjoying the internet services, as shown in fig. 3, the apparatus includes:
the first determining module 31 is configured to determine a target device risk level according to the device risk information and the trained risk model; the risk model is used for calculating the probability of the device damaging the internet service platform behavior; the device risk information is device information related to risk behavior of the device;
a second determination module 32, configured to determine the intention level of the target device according to device intention information and a trained intention model, where the intention model is used for calculating an intention degree of the device for obtaining the internet service; the device intention information is device information related to the intention of the device to acquire the internet service;
a first providing module 33, configured to provide an authentication condition of the internet service for the target device according to the risk level and the intention level of the target device;
a second providing module 34, configured to provide the internet service to the target device when the target device accepts the authentication condition.
Optionally, the internet service is any one of the following: shopping, traveling, payment, navigation, group buying, sharing of items, social contact, online education, translation.
Optionally, the internet service is a paid membership service, and the authentication condition includes any one of: total price, unit price, point, virtual currency.
In one embodiment, the first providing module 33 includes:
the first sub-determination module is used for determining a first target interval from a first preset interval according to the risk level; the greater the probability corresponding to the risk level is, the greater the minimum value and the maximum value of the corresponding first target interval are;
the second sub-determination module is used for determining a second target interval from a second preset interval according to the intention level; the larger the corresponding intention degree of the intention hierarchy is, the larger the minimum value and the maximum value of the corresponding second target interval are;
and a third sub-determining module, configured to determine a target interval according to the first target interval and the second target interval, as the authentication condition.
In another embodiment, the first providing module 33 calculates the authentication condition by the following formula:
X=A×a+B×b;
wherein, X is the numerical value interval corresponding to the authentication condition, A is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
Further, the apparatus further comprises: and the rejection module is used for rejecting the request of the target equipment for providing the internet service when the risk model calculates that the probability of the target equipment damaging the internet service platform is greater than a threshold value.
Preferably, the device risk information includes: device-related information and device risk-related information; wherein the device-related information comprises: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: whether the equipment applies for through the Internet service or not, the resource allocation limit of the equipment, the number of days for returning the resources after overdue of the equipment, the number of times for returning the resources after overdue of the equipment and whether the equipment has fraud records or not.
Those skilled in the art will appreciate that the modules in the above-described embodiments of the apparatus may be distributed as described in the apparatus, and may be correspondingly modified and distributed in one or more apparatuses other than the above-described embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as an implementation in physical form for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 4, the electronic device 400 of the exemplary embodiment is represented in the form of a general-purpose data processing device. The components of electronic device 400 may include, but are not limited to: at least one processing unit 410, at least one memory unit 420, a bus 430 connecting different electronic device components (including the memory unit 420 and the processing unit 410), a display unit 440, and the like.
The storage unit 420 stores a computer-readable program, which may be a code of a source program or a read-only program. The program may be executed by the processing unit 410 such that the processing unit 410 performs the steps of various embodiments of the present invention. For example, the processing unit 410 may perform the steps as shown in fig. 1.
The storage unit 420 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)4201 and/or a cache memory unit 4202, and may further include a read only memory unit (ROM) 4203. The storage unit 420 may also include a program/utility 4204 having a set (at least one) of program modules 4205, such program modules 4205 including, but not limited to: operating the electronic device, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 430 may be any bus representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 400 may also communicate with one or more external devices 100 (e.g., keyboards, displays, networking devices, bluetooth devices, etc.), enable a user to interact with the electronic device 400 via the external devices 100, and/or enable the electronic device 400 to communicate with one or more other data processing devices (e.g., routers, modems, etc.). Such communication may occur via input/output (I/O) interfaces 450, and may also occur via a network adapter 460 with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network such as the Internet). The network adapter 460 may communicate with other modules of the electronic device 400 via the bus 430. It should be appreciated that although not shown in FIG. 4, other hardware and/or software modules may be used in the electronic device 400, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID electronics, tape drives, and data backup storage electronics, among others.
FIG. 5 is a schematic diagram of one computer-readable medium embodiment of the present invention. As shown in fig. 5, the computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electronic device, apparatus, or device that is electronic, magnetic, optical, electromagnetic, infrared, or semiconductor, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. The computer program, when executed by one or more data processing devices, enables the computer-readable medium to implement the above-described method of the invention, namely: determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the device damaging the internet service platform behavior; the device risk information is device information related to risk behavior of the device; determining the intention level of the target equipment according to equipment intention information and a trained intention model, wherein the intention model is used for calculating the intention degree of the equipment for acquiring the internet service; the device intention information is device information related to the intention of the device to acquire the internet service; providing the authentication condition of the internet service for the target equipment according to the risk level and the intention level of the target equipment; and when the target device accepts the authentication condition, providing the internet service to the target device.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a data processing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution electronic device, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including object oriented programming languages such as Java, C + + or the like and conventional procedural programming languages, such as "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the present invention can be implemented as a method, an apparatus, an electronic device, or a computer-readable medium executing a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP).
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.

Claims (12)

1. A method for providing internet services for a device based on device intent level and device risk level, wherein the device intent level is a level of willingness of the device to obtain the internet services, and the device risk level is a possibility that the device will damage an internet service platform while enjoying the internet services, the method comprising:
determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the device damaging the internet service platform behavior; the device risk information is device information related to risk behavior of the device;
determining the intention level of the target equipment according to equipment intention information and a trained intention model, wherein the intention model is used for calculating the intention degree of the equipment for acquiring the internet service; the device intention information is device information related to the intention of the device to acquire the internet service;
providing the authentication condition of the internet service for the target equipment according to the risk level and the intention level of the target equipment;
and when the target device accepts the authentication condition, providing the internet service to the target device.
2. The method of claim 1, wherein the authentication condition for providing the internet service to the target device according to the risk level and the intention level of the target device comprises:
determining a first target interval from a first preset interval according to the risk level; the greater the probability corresponding to the risk level is, the greater the minimum value and the maximum value of the corresponding first target interval are;
determining a second target interval from a second preset interval according to the intention level; the larger the corresponding intention degree of the intention hierarchy is, the larger the minimum value and the maximum value of the corresponding second target interval are;
and determining a target interval as the authentication condition according to the first target interval and the second target interval.
3. The method of claim 1, wherein the authentication condition for providing the internet service to the target device according to the risk level and the intention level of the target device comprises:
the authentication condition is calculated by the following formula:
X=A×a+B×b;
wherein, X is the numerical value interval corresponding to the authentication condition, A is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
4. The method according to any one of claims 1-3, further comprising: and when the probability that the target equipment damages the Internet service platform is calculated by the risk model and is greater than a threshold value, rejecting the request of the target equipment for providing the Internet service.
5. The method according to any of claims 1-4, wherein the device risk information comprises: device-related information and device risk-related information; wherein the device-related information comprises: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: whether the equipment applies for through the Internet service or not, the resource allocation limit of the equipment, the number of days for returning the resources after overdue of the equipment, the number of times for returning the resources after overdue of the equipment and whether the equipment has fraud records or not.
6. An apparatus for providing internet services for a device based on device intent level and device risk level, wherein the device intent level is a level of willingness of the device to obtain the internet services, and the device risk level is a possibility that the device will damage an internet service platform while enjoying the internet services, the apparatus comprising:
the first determining module is used for determining a target equipment risk level according to the equipment risk information and the trained risk model; the risk model is used for calculating the probability of the device damaging the internet service platform behavior; the device risk information is device information related to risk behavior of the device;
the second determination module is used for determining the intention level of the target equipment according to equipment intention information and a trained intention model, and the intention model is used for calculating the intention of the equipment for acquiring the internet service; the device intention information is device information related to the intention of the device to acquire the internet service;
the first providing module is used for providing the authentication condition of the internet service for the target equipment according to the risk level and the intention level of the target equipment;
and the second providing module is used for providing the internet service for the target equipment when the target equipment accepts the authentication condition.
7. The apparatus of claim 6, wherein the first providing module comprises:
the first sub-determination module is used for determining a first target interval from a first preset interval according to the risk level; the greater the probability corresponding to the risk level is, the greater the minimum value and the maximum value of the corresponding first target interval are;
the second sub-determination module is used for determining a second target interval from a second preset interval according to the intention level; the larger the corresponding intention degree of the intention hierarchy is, the larger the minimum value and the maximum value of the corresponding second target interval are;
and a third sub-determining module, configured to determine a target interval according to the first target interval and the second target interval, as the authentication condition.
8. The apparatus of claim 6, wherein the first providing module calculates the authentication condition by:
X=A×a+B×b;
wherein, X is the numerical value interval corresponding to the authentication condition, A is the risk level, a is a preset risk interval, B is the intention level, and B is a preset intention interval.
9. The apparatus according to any one of claims 6-8, further comprising: and the rejection module is used for rejecting the request of the target equipment for providing the internet service when the risk model calculates that the probability of the target equipment damaging the internet service platform is greater than a threshold value.
10. The apparatus according to any one of claims 6-8, wherein the equipment risk information includes: device-related information and device risk-related information; wherein the device-related information comprises: at least one of equipment ID, equipment model, equipment communication information and equipment user information; the device risk related information includes: whether the equipment applies for through the Internet service or not, the resource allocation limit of the equipment, the number of days for returning the resources after overdue of the equipment, the number of times for returning the resources after overdue of the equipment and whether the equipment has fraud records or not.
11. An electronic device, comprising:
a processor; and
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-5.
12. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-5.
CN202110875634.1A 2021-07-30 2021-07-30 Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree Active CN113723759B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110875634.1A CN113723759B (en) 2021-07-30 2021-07-30 Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110875634.1A CN113723759B (en) 2021-07-30 2021-07-30 Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree

Publications (2)

Publication Number Publication Date
CN113723759A true CN113723759A (en) 2021-11-30
CN113723759B CN113723759B (en) 2024-06-04

Family

ID=78674510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110875634.1A Active CN113723759B (en) 2021-07-30 2021-07-30 Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree

Country Status (1)

Country Link
CN (1) CN113723759B (en)

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8280805B1 (en) * 2006-01-10 2012-10-02 Sas Institute Inc. Computer-implemented risk evaluation systems and methods
JP2016099702A (en) * 2014-11-19 2016-05-30 キヤノン株式会社 Authentication management method by means of device cooperation, information processing apparatus, wearable device, and computer program
US9661011B1 (en) * 2014-12-17 2017-05-23 Amazon Technologies, Inc. Techniques for data routing and management using risk classification and data sampling
CN107491862A (en) * 2017-07-26 2017-12-19 广州供电局有限公司 The method and device of power grid risk evaluation and test
CN107888574A (en) * 2017-10-27 2018-04-06 深信服科技股份有限公司 Method, server and the storage medium of Test database risk
CN109614997A (en) * 2018-11-29 2019-04-12 武汉大学 A kind of stealing Risk Forecast Method and device based on deep learning
CN110009359A (en) * 2019-01-22 2019-07-12 阿里巴巴集团控股有限公司 Training method, update method and the device of unsupervised risk prevention system model
CN110033153A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 A kind of pair of information recommendation carries out resource bonusing method, device and equipment
CN110348727A (en) * 2019-07-02 2019-10-18 北京淇瑀信息科技有限公司 A kind of marketing strategy formulating method, device and electronic equipment moving branch wish based on consumer's risk grade and user
CN110443617A (en) * 2019-07-10 2019-11-12 阿里巴巴集团控股有限公司 Information processing method, device and computer equipment
US20200042723A1 (en) * 2018-08-03 2020-02-06 Verizon Patent And Licensing Inc. Identity fraud risk engine platform
WO2020037942A1 (en) * 2018-08-20 2020-02-27 平安科技(深圳)有限公司 Risk prediction processing method and apparatus, computer device and medium
CN110992169A (en) * 2019-11-29 2020-04-10 深圳乐信软件技术有限公司 Risk assessment method, device, server and storage medium
WO2020077895A1 (en) * 2018-10-16 2020-04-23 深圳壹账通智能科技有限公司 Signing intention determining method and apparatus, computer device, and storage medium
CN111210109A (en) * 2019-12-20 2020-05-29 上海淇玥信息技术有限公司 Method and device for predicting user risk based on associated user and electronic equipment
CN111478890A (en) * 2020-03-30 2020-07-31 中国科学院计算技术研究所 Network service access control method and system based on intelligent contract
WO2020211388A1 (en) * 2019-04-16 2020-10-22 深圳壹账通智能科技有限公司 Behavior prediction method and device employing prediction model, apparatus, and storage medium
CN112308387A (en) * 2020-10-20 2021-02-02 深圳思为科技有限公司 Client intention degree evaluation method and device and cloud server
CN112330373A (en) * 2020-11-30 2021-02-05 ***股份有限公司 User behavior analysis method and device and computer readable storage medium
CN112418653A (en) * 2020-11-19 2021-02-26 重庆邮电大学 Number portability and network diver identification system and method based on machine learning algorithm
CN112668832A (en) * 2020-11-25 2021-04-16 广东电网有限责任公司 Risk quantitative evaluation method and device based on index management system and electronic equipment

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8280805B1 (en) * 2006-01-10 2012-10-02 Sas Institute Inc. Computer-implemented risk evaluation systems and methods
JP2016099702A (en) * 2014-11-19 2016-05-30 キヤノン株式会社 Authentication management method by means of device cooperation, information processing apparatus, wearable device, and computer program
US9661011B1 (en) * 2014-12-17 2017-05-23 Amazon Technologies, Inc. Techniques for data routing and management using risk classification and data sampling
CN107491862A (en) * 2017-07-26 2017-12-19 广州供电局有限公司 The method and device of power grid risk evaluation and test
CN107888574A (en) * 2017-10-27 2018-04-06 深信服科技股份有限公司 Method, server and the storage medium of Test database risk
US20200042723A1 (en) * 2018-08-03 2020-02-06 Verizon Patent And Licensing Inc. Identity fraud risk engine platform
WO2020037942A1 (en) * 2018-08-20 2020-02-27 平安科技(深圳)有限公司 Risk prediction processing method and apparatus, computer device and medium
WO2020077895A1 (en) * 2018-10-16 2020-04-23 深圳壹账通智能科技有限公司 Signing intention determining method and apparatus, computer device, and storage medium
CN109614997A (en) * 2018-11-29 2019-04-12 武汉大学 A kind of stealing Risk Forecast Method and device based on deep learning
CN110033153A (en) * 2018-12-05 2019-07-19 阿里巴巴集团控股有限公司 A kind of pair of information recommendation carries out resource bonusing method, device and equipment
CN110009359A (en) * 2019-01-22 2019-07-12 阿里巴巴集团控股有限公司 Training method, update method and the device of unsupervised risk prevention system model
WO2020211388A1 (en) * 2019-04-16 2020-10-22 深圳壹账通智能科技有限公司 Behavior prediction method and device employing prediction model, apparatus, and storage medium
CN110348727A (en) * 2019-07-02 2019-10-18 北京淇瑀信息科技有限公司 A kind of marketing strategy formulating method, device and electronic equipment moving branch wish based on consumer's risk grade and user
CN110443617A (en) * 2019-07-10 2019-11-12 阿里巴巴集团控股有限公司 Information processing method, device and computer equipment
CN110992169A (en) * 2019-11-29 2020-04-10 深圳乐信软件技术有限公司 Risk assessment method, device, server and storage medium
CN111210109A (en) * 2019-12-20 2020-05-29 上海淇玥信息技术有限公司 Method and device for predicting user risk based on associated user and electronic equipment
CN111478890A (en) * 2020-03-30 2020-07-31 中国科学院计算技术研究所 Network service access control method and system based on intelligent contract
CN112308387A (en) * 2020-10-20 2021-02-02 深圳思为科技有限公司 Client intention degree evaluation method and device and cloud server
CN112418653A (en) * 2020-11-19 2021-02-26 重庆邮电大学 Number portability and network diver identification system and method based on machine learning algorithm
CN112668832A (en) * 2020-11-25 2021-04-16 广东电网有限责任公司 Risk quantitative evaluation method and device based on index management system and electronic equipment
CN112330373A (en) * 2020-11-30 2021-02-05 ***股份有限公司 User behavior analysis method and device and computer readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NITIN AGGARWAL ET AL: "Risk knowledge and concern as influences of purchase intention for internet of things devices", 《TECHNOLOGY IN SOCIETY》, 31 December 2020 (2020-12-31), pages 1 - 11 *
张明明: "手机银行用户使用意向影响因素的证实研究", 《中国优秀硕士学位全文数据库 经济与管理科学辑》, no. 2015, 31 July 2015 (2015-07-31), pages 159 - 86 *

Also Published As

Publication number Publication date
CN113723759B (en) 2024-06-04

Similar Documents

Publication Publication Date Title
US8606695B1 (en) Decision making engine and business analysis tools for small business credit product offerings
CN110807649A (en) Invitation reward method and system for financial products
CN112465627B (en) Financial loan auditing method and system based on block chain and machine learning
CN110599335A (en) User financial risk assessment method and device based on multiple models
US20210019375A1 (en) Computing system including virtual agent bot providing semantic topic model-based response
CN112016796B (en) Comprehensive risk score request processing method and device and electronic equipment
US20140019295A1 (en) Automated Technique For Generating Recommendations Of Potential Supplier Candidates
CN110009365B (en) User group detection method, device and equipment for abnormally transferring electronic assets
CN112348659B (en) User identification policy distribution method and device and electronic equipment
US11348172B2 (en) User interfaces that differentiate payment instruments having a trusted beneficiary
CN111210255B (en) Advertisement pushing method and device and electronic equipment
CN111583018A (en) Credit granting strategy management method and device based on user financial performance analysis and electronic equipment
CN112017062A (en) Resource limit distribution method and device based on guest group subdivision and electronic equipment
US20210065170A1 (en) Selecting exemptions to strong authentication requirements
CN110689425A (en) Method and device for pricing quota based on income and electronic equipment
CN113987350A (en) Resource recommendation method and device
US11436596B2 (en) Eligibility determination for delegation exemption to strong authentication requirements
CN111210109A (en) Method and device for predicting user risk based on associated user and electronic equipment
CN112017063B (en) Resource allocation method and device based on comprehensive risk score and electronic equipment
CN115048561A (en) Recommendation information determination method and device, electronic equipment and readable storage medium
CN112016791B (en) Resource allocation method and device and electronic equipment
CN112016789B (en) Internet financial service processing method and device and electronic equipment
CN113723759A (en) Method and device for providing Internet service for equipment based on equipment intention degree and equipment risk degree
CN114357056A (en) Detection of associations between data sets
US20180012301A1 (en) Block-price optimisation in energy markets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant