Risk control method and device
A risk control and risk technology, applied in the computer field, can solve problems such as poor experience, waste of computer resources, lack of real-time performance, etc., and achieve the effect of effective risk control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] Embodiments of the present invention will be described below in conjunction with the accompanying drawings.
[0021] The risk control method and device provided in the embodiments of the present application are applicable to the scenario of risk control on the user's account or network behavior, where the network behavior may include login behavior, payment behavior and transaction behavior.
[0022] For example, apply if figure 1 In the application scenario shown, figure 1 Among them, the client can refer to the terminal device that has logged in the user's registered account, or it can refer to the application program that has logged in the user's registered account, and the application program is located in the terminal device; The event information of the risk event perceived by the end user, that is, the user in this application refers to the user who can perceive the risk event, and the above event information may include the event name and / or event content.
[...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com