Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Resource request monitoring method and device, computer equipment and storage medium

A resource request and computer program technology, applied in the field of data processing, can solve problems such as life safety monitoring and consumer behavior difficult to monitor, and achieve the effect of reducing the risk of fraud

Pending Publication Date: 2022-07-08
PING AN ASSET MANAGEMENT CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is difficult to monitor the consumption behavior of users, such as health care products, large-amount financial management, winning prizes and other consumption behaviors. At the same time, it is difficult to monitor the life safety of users based on the consumption behavior of users, such as whether the elderly have not paid water, electricity and gas bills for several months. Life safety issues, whether there are fraud safety issues in the elderly or minors who have small and multiple consumptions, etc. Therefore, how to monitor the consumption behavior of users has become a major problem that needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource request monitoring method and device, computer equipment and storage medium
  • Resource request monitoring method and device, computer equipment and storage medium
  • Resource request monitoring method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] like figure 1 As shown, it is a schematic flow chart of a method for monitoring resource requests in the first embodiment. It can be seen from the figure that it includes steps S100-500, and the details are as follows:

[0057] S100: Intercept the resource transfer request of the target user.

[0058] In an exemplary embodiment, the target user is used to represent a group of people who are customized according to the monitoring requirements. For example, adults can set parents or minor children as target users, and the resource transfer request is used to represent a request for resource changes. Such as payment, transfer, etc. After the target user is set, when the target user initiates a resource transfer request, the resource transfer request is intercepted, and the resource transfer request is identified to prevent the target user from generating fraudulent transactions. Preferably, in this embodiment, a monitoring platform can be optionally established to monito...

Embodiment 2

[0084] like image 3As shown, it is a functional block diagram of the apparatus for monitoring resource requests according to the second embodiment.

[0085] The resource request monitoring device 3 includes an interception module 31 , an extraction module 32 , an input module 33 , a first detection module 34 and a second detection module 35 . A module referred to in the present invention refers to a series of computer program segments that can be executed by a processor and can perform fixed functions, and are stored in a memory. In this embodiment, the functions of each module will be described in detail in subsequent embodiments.

[0086] The interception module 31 is used to intercept the resource transfer request of the target user.

[0087] In an exemplary embodiment, before intercepting the resource transfer request of the target user, obtain the historical target request of the target user; extract the generation time of the historical target request; obtain a preset...

Embodiment 3

[0096] like Figure 4 As shown, it is a schematic structural diagram of a computer device according to the third embodiment of the method for monitoring a resource request.

[0097] In an exemplary embodiment, the computer device 4 includes, but is not limited to, a memory 41, a processor 42, and a computer program stored in the memory 41 and executable on the processor, such as monitoring of resource requests program. Those skilled in the art can understand that the schematic diagram is only an example of a computer device, and does not constitute a limitation to the computer device, and may include more or less components than the one shown, or combine some components, or For example, the computer device may also include input and output devices, network access devices, buses, and the like.

[0098] The memory 41 includes at least one type of computer-readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a resource request monitoring method and device, computer equipment and a storage medium. The method comprises the following steps: intercepting a resource transfer request of a target user; extracting feature parameters of the resource transfer request, and inputting the feature parameters into a preset target detection model to obtain a detection result output by the target detection model; if the detection result represents that the resource transfer request is in a normal state, sending the resource transfer request to a corresponding receiving address; and if the detection result shows that the resource transfer request is in an abnormal state, sending an abnormal prompt to an associated user. The life safety of the target user is monitored based on the resource transfer request, and if the resource transfer request is abnormal or the corresponding resource transfer request is not received within the preset period value, an abnormal state detection result is output and an associated user corresponding to the target user is notified to check the request, so that the fraud risk is effectively reduced, and the user experience is improved. And the living safety of the target user is synchronously monitored.

Description

technical field [0001] The present invention relates to the technical field of data processing, and in particular, to a method, device, computer equipment and storage medium for monitoring resource requests. Background technique [0002] Nowadays, in order to ensure the security of online transactions and avoid losses to users, the main method is to verify the password entered by the user when the user makes a payment, or verify the user's biometric features, such as facial recognition or fingerprint payment, Thereby determining the security of the transaction. However, it is difficult to monitor the user's consumption behavior, such as health care products, large-amount wealth management, winning redemption and other consumption behaviors, and it is also difficult to monitor the user's life safety based on the user's consumption behavior, such as whether the elderly have not paid water, electricity and gas bills for several months. Life safety issues, whether there are f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06Q40/04G06K9/62
CPCG06Q20/4016G06Q40/04G06F18/23213G06F18/24G06F18/214
Inventor 戴冰波卫雨鑫
Owner PING AN ASSET MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products