Method for verifying safety of business operation, device, terminal and server

A business operation and business terminal technology, applied in the communication field, can solve problems such as inaccurate business operation security verification results, and achieve the effect of improving accuracy

Active Publication Date: 2016-04-20
ADVANCED NEW TECH CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a method, device, terminal, and server for verifying the security of business operations, so as to solve the problem of inaccurate business operation security verification results in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying safety of business operation, device, terminal and server
  • Method for verifying safety of business operation, device, terminal and server
  • Method for verifying safety of business operation, device, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Here, exemplary embodiments will be described in detail, and examples thereof are shown in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present application. On the contrary, they are only examples of devices and methods consistent with some aspects of the application as detailed in the appended claims.

[0043] The terms used in this application are only for the purpose of describing specific embodiments and are not intended to limit the application. The singular forms of "a", "said" and "the" used in this application and the appended claims are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and / or" used h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying safety of business operation, a device, a terminal and a server. The method comprises steps of receiving a credibility analysis instruction of the business operation sent by a business sever; calling a pre-stored risk control module according to the credibility analysis instruction and obtaining a credibility analysis result of the business operation; and sending the credibility analysis result to the business server so as to allow the business server to determine safety of the business operation according to the credibility analysis result. According to the invention, by use of the risk control module in a business terminal, the credibility analysis result of the business operation can be obtained, so precision of safety verification of the business operation can be improved.

Description

Technical field [0001] This application relates to the field of communication technology, and in particular to methods, devices, terminals and servers for verifying the security of business operations. Background technique [0002] With the development of smart terminals and the popularization of network applications, users can implement various business operations through various application clients installed on the terminal, such as social instant messaging services, shopping payment services, etc. To implement the above-mentioned services, end users often need to register a business account on the server, and implement certain business operations based on the business account. [0003] In the prior art, network behavior data of end users can be obtained based on big data mining technology. When performing business operations through a business account, the service server can verify business security based on the network behavior data of the end user to avoid business risks. How...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L67/306G06F21/316G06Q20/20G06Q20/4014G06Q20/4016H04L63/08G06Q30/0609G06F2221/034G06Q50/01G06Q20/384G06F21/577H04L63/102H04L67/30H04L67/303H04L67/535H04L9/32
Inventor 吕鲲
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products