Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Reference herein to "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Optionally, the method for determining risk of virtual resource transfer according to the present application may be applied to a live broadcast platform scenario, for example, when a user rewards a certain anchor, the terminal determines whether a risk exists in a current virtual resource transfer behavior based on the method for determining risk of virtual resource transfer according to the present application, and finally determines whether to allow implementation of the current virtual resource transfer behavior according to a risk coefficient.
Fig. 1 is a schematic diagram of an implementation environment of a risk determination method for virtual resource transfer according to an exemplary embodiment of the present application. Referring to fig. 1, the implementation environment may include:terminal 100 andbackend server 200.
Optionally, thebackground server 200 may be an independent server, or may be integrated into any one of a server cluster, a virtual cloud storage, or a cloud computing center, for example, thebackground server 200 is a server cluster, and thebackground server 200 may include: riskfactor determination server 110 and userrepresentation generation server 120. Wherein theterminal 100 and the riskfactor determination server 110 may communicate via a wired or wireless connection, and the riskfactor determination server 110 and the userrepresentation generation server 120 may also communicate via a wired or wireless connection. Each server may be any one of a server, a server cluster composed of a plurality of servers, a virtual cloud storage, or a cloud computing center.
Optionally, thebackground server 200 may further include a shared-anchor identifier management server, where the shared-anchor identifier management server is configured to manage events such as creation of an anchor identifier and supervision of the anchor identifier in a network live broadcast process; optionally, thebackground server 200 may further include a live broadcast room identifier management server, where the live broadcast room identifier management server is configured to manage events such as creation of a live broadcast room identifier and monitoring of a live broadcast room identifier in a network live broadcast process. The servers that thebackend server 200 may include are only exemplary and do not limit the structure of thebackend server 200 in the present application.
In addition, when thebackend server 200 is an independent server, thebackend server 200 has the backend service function of each server.
In one example, as shown in fig. 1, theterminal 100 receives a virtual resource transfer instruction of a target user account, and sends the virtual resource transfer instruction to the riskfactor determination server 110; the riskfactor determination server 110 obtains a target user account, which is an object of virtual resource transfer currently performed, according to the virtual resource transfer instruction, and obtains a target user portrait corresponding to the target user account from the userportrait generation server 120; further, the riskcoefficient determination server 110 determines a risk coefficient corresponding to the virtual resource transfer instruction according to the target user portrait corresponding to the target user account, and then determines a risk degree of the current virtual resource transfer behavior; optionally, the riskcoefficient determining server 110 may determine the corresponding response mode according to the risk coefficient, or the riskcoefficient determining server 110 sends the risk coefficient to theterminal 100, and theterminal 100 determines the corresponding response mode according to the risk coefficient.
It should be noted that the above servers may be independent servers, or may be integrated into any one of a server cluster, a virtual cloud storage, or a cloud computing center, and in any one of the integrated server cluster, virtual cloud storage, or cloud computing center, the content of the embodiment of the present application may be supplemented according to the content of the embodiment of the present application, which is not limited in the embodiment of the present application.
Referring to fig. 2, a flowchart of a risk determination method for virtual resource transfer according to an exemplary embodiment of the present application is shown. The method is suitable for theterminal 100 and thebackground server 200 in the implementation environment shown in fig. 1, and includes:
step 201, receiving a virtual resource transfer instruction of a target user account.
The virtual resource transfer instruction is triggered by the virtual resource transfer behavior of the target user account in the live broadcast room, and the virtual resource transfer behavior comprises at least one of giving a virtual gift, giving a virtual item and giving virtual money.
The virtual gifts, the virtual props and the virtual currency are all virtual articles, the virtual articles refer to virtual identifications used for indicating the wealth values in a virtual scene, such as virtual identifications used for indicating the wealth values, such as flowers, balloons and rockets, displayed on a terminal interface in a live broadcast scene, and optionally, different virtual identifications refer to different wealth values, such as flowers, 10 wealth values, 20 wealth values, such as balloons and 1000 wealth values, and the like.
Optionally, the value of the wealth value can be directly equivalent to the currency of circulation, and can also have a certain exchange ratio with the currency of circulation. For example, in the case of 1: 10, the user plays a flower, namely a prize 1 yuan, a balloon, and a rocket, namely aprize 100 yuan.
The virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in the live broadcast room, and optionally, the virtual resource transfer instruction at least includes parameters related to the current virtual resource transfer behavior of the target user account, such as a resource transfer number, a live broadcast room identifier, and an anchor identifier.
Wherein the resource transfer amount is determined according to the type and the amount of the virtual article. If the user under the target user account plays three flowers as the reward anchor, and the wealth value indicated by the virtual article under the flower type is 10, the current resource transfer amount is 30 (or replaced by an equivalent currency value).
In a possible implementation manner, a terminal triggers and generates a virtual resource transfer instruction according to a virtual resource transfer behavior of a target user account in a live broadcast room, and sends the virtual resource transfer instruction to a background server; correspondingly, the background server receives a virtual resource transfer instruction of the target user account.
Step 202, determining a risk coefficient corresponding to the virtual resource transfer instruction according to the target user representation corresponding to the target user account.
The target user portrait is generated according to the historical watching behavior and the historical virtual resource transferring behavior corresponding to the target user account, and the risk coefficient is used for representing the risk degree of the virtual resource transferring behavior.
The different user accounts correspond to respective historical watching behaviors and historical virtual resource transfer behaviors, so that the different user accounts correspond to respective user figures.
Optionally, the target user representation may be used as an instruction parameter index to calculate a risk coefficient for each instruction parameter included in the virtual resource transfer instruction.
In one example, the virtual resource transfer instruction includes resource transfer time when the virtual resource transfer behavior occurs, the background server obtains a historical resource transfer period corresponding to the account of the target user through the representation of the target user, and if the current resource transfer time is not within the historical resource transfer period, it indicates that a certain risk coefficient exists in the current virtual resource transfer behavior.
In another example, a anchor list in which a historical resource transfer behavior occurs under a target user account is recorded in a target user image corresponding to the target user account, and if an anchor identifier included in a virtual resource transfer instruction does not exist in the anchor list, it indicates that a certain risk coefficient exists in a current virtual resource transfer behavior.
It should be noted that the risk coefficient corresponding to the virtual resource transfer instruction is formed by overlapping the risk coefficients corresponding to the instruction parameters.
Step 203, responding to the virtual resource transfer instruction according to the risk coefficient.
Wherein different response modes correspond to different risk coefficients. In order to prevent the current virtual resource transfer behavior of the target user account from being forcibly restrained, the background server can implement different response modes according to the level of the risk coefficient. And if the risk coefficient is in a first range, responding to the virtual resource transfer instruction through a risk prompt, and if the risk coefficient is in a second higher range, responding to the virtual resource transfer instruction through a verification mode, and the like.
In addition, the process of generating the response mode can be further refined, if the background server has already performed a risk prompt on the target user account for once, but still performs a normal response on the current virtual resource transfer behavior of the target user account, when the number of times of performing the risk prompt on the target user account by the background server is greater than a certain threshold, the current virtual resource transfer behavior of the target user account is verified, and when the verification is passed, the target user account can continue the virtual resource transfer behavior.
To sum up, in the embodiment of the application, in a live broadcast scenario, after receiving a virtual resource transfer instruction of a target user account, a background server determines a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account instead of directly transferring virtual resources, and further characterizes a risk degree of a virtual resource transfer behavior according to the risk coefficient, and makes different response modes for the virtual resource transfer instruction according to different risk coefficients; compared with the virtual resource transfer method in the related art, the risk determining method for virtual resource transfer can calculate the risk coefficient before the virtual resource transfer, and further determine different response modes according to different risk coefficients so as to improve the safety of the virtual resource transfer process and maintain the fund safety of the target user account.
Before another exemplary embodiment is illustrated, a description of how a target user representation is generated will first be set forth. And generating the target user portrait according to the historical watching behavior and the historical virtual resource transferring behavior corresponding to the target user account.
Optionally, the historical viewing behavior includes the following: the live broadcast watching time length and the watching time period of the target user account in different live broadcast rooms, and the live broadcast watching time length and the watching time period of the target user account in different anchor broadcasts.
Optionally, the historical virtual resource transfer behavior includes the following: the virtual resource transfer method comprises the steps of transferring the virtual resources of a target user account every time, transferring the virtual resources of the target user account every day, carrying out virtual resource transfer on different anchor broadcasts by the target user account in a ratio of the number of the target user account to the virtual resource transfer between different live broadcast rooms, transferring the virtual resources of the target user account to the anchor broadcasts with different live broadcast watching durations, and transferring the virtual resources of the target user every day.
It should be noted that the historical viewing behavior and the historical virtual resource transfer behavior are only exemplary, and are not limited in the present application.
Further, according to the historical watching behavior and the historical virtual resource transfer behavior corresponding to the target user account, the background server can generate a target user portrait including a target live broadcast room list, a target anchor broadcast list, a resource transfer quantity threshold and a historical resource transfer time period.
The target live broadcast room list comprises at least one target live broadcast room identifier, and the target user account has a live broadcast room with historical virtual resource transfer behavior in the target live broadcast room; the target anchor list comprises at least one target anchor mark, and the target user account has historical virtual resource transfer behavior in a direct broadcast room corresponding to the target anchor; the resource transfer quantity threshold is determined according to the historical virtual resource transfer quantity corresponding to the historical virtual resource transfer behavior, for example, the resource transfer quantity threshold is an average value of virtual resource transfer quantities of the target user account every time; in addition, the historical resource transfer time period is determined according to the time corresponding to the historical virtual resource transfer behavior, for example, the historical resource transfer time period is all the time periods when the target user performs virtual resource transfer every day.
Referring to fig. 3, a flowchart of a risk determination method for virtual resource migration according to another exemplary embodiment of the present application is shown. The method is suitable for the terminal 100 and thebackground server 200 in the implementation environment shown in fig. 1, and includes:
step 301, receiving a virtual resource transfer instruction of a target user account.
Please refer to step 201, and the embodiments of the present application are not described herein again.
Step 302, obtain the transfer parameters contained in the virtual resource transfer instruction.
In order to compare with each parameter index included in the target user representation, the background server first needs to obtain a transfer parameter included in the virtual resource transfer instruction. Optionally, the transfer parameter includes at least one of a resource transfer number, a resource transfer time, a live broadcast room identifier, a main broadcast identifier, and a live broadcast watching duration.
In addition, the transfer parameters may also include a live room type and a anchor type. For example, live-air room types include, but are not limited to, a singing live-air room, a gaming live-air room, a play fighting (PK) live-air room, an outdoor live-air room, and a dance live-air room; for example, anchor types include, but are not limited to, live platform headcasts, live platform newcasts, and anchors having a duration of play per day exceeding a specified threshold.
Correspondingly, the target user representation will also include a list of target live room types and a list of target anchor types corresponding to the live room type and the anchor type.
Step 303, obtaining parameter indexes corresponding to each transfer parameter from the target user portrait.
When the transfer parameter includes a live room identification,step 303 includes the following.
The background server acquires a target live broadcast room list from the target user portrait, the target live broadcast room list comprises at least one target live broadcast room identifier, and the target user account has a live broadcast room with historical virtual resource transfer behavior in the target live broadcast room.
In a possible implementation manner, the background server determines a live broadcast room with historical virtual resource transfer behavior as a target live broadcast room of a target user account, and arranges identifiers of the target live broadcast rooms to obtain a target live broadcast room list. The arrangement mode can be arranged according to the historical virtual resource transfer total amount of each target live broadcast room, the target live broadcast room with the highest historical virtual resource transfer total amount is arranged to the head, and the like; or the target live broadcast watching time lengths of the target live broadcast watching time lengths are arranged according to the historical live broadcast watching time lengths of the target live broadcast watching time lengths, the target live broadcast watching time length with the longest historical live broadcast watching time length is arranged to the top, and the like.
When the transfer parameter includes the anchor identification,step 303 includes the following.
The background server acquires a target anchor list from the target user portrait, the target anchor list comprises at least one target anchor identification, and historical virtual resource transfer behaviors exist in a live broadcast room corresponding to the target anchor by a target user account.
In a possible implementation manner, the background server determines the anchor with the historical virtual resource transfer behavior as a target anchor of a target user account, and arranges the identifiers of the target anchors to obtain a target anchor list, wherein the arrangement manner can be arranged according to the historical virtual resource transfer total amount of each target anchor, and the target anchor with the highest historical virtual resource transfer total amount is arranged to the head, and so on; or the target anchor with the longest historical live broadcast watching time length is arranged according to the historical live broadcast watching time length of each target anchor, and the like.
When the transfer parameter includes the resource transfer number,step 303 includes the following.
And the background server acquires a resource transfer quantity threshold value from the target user portrait, and the resource transfer quantity threshold value is determined according to the historical virtual resource transfer quantity corresponding to the historical virtual resource transfer behavior.
Optionally, if the historical virtual resource transfer quantity is measured in units of times, the resource transfer quantity threshold value obtained by the background server from the target user portrait is the maximum resource transfer quantity under a single virtual resource transfer behavior; if the historical virtual resource transfer quantity is measured according to other time units, the threshold value of the resource transfer quantity acquired by the background server from the target user portrait is the maximum resource transfer quantity in other time units, such as the maximum resource transfer quantity per day, the maximum resource transfer quantity per week and the like.
Optionally, the resource transfer quantity threshold includes a resource transfer quantity threshold of the target live broadcast room and a resource transfer quantity threshold of the target anchor.
When the transfer parameter includes a resource transfer time,step 303 includes the following.
And the background server acquires a historical resource transfer time period from the target user portrait, and the historical resource transfer time period is determined according to the time corresponding to the historical virtual resource transfer behavior.
In a possible implementation manner, the background server uses the concentrated time as the historical resource transfer period in the target user representation according to the time corresponding to the historical virtual resource transfer behavior, or determines the historical resource transfer period in the target user representation according to all the time corresponding to the historical virtual resource transfer behavior.
Optionally, the historical resource transfer period includes a historical resource transfer period of the target live broadcast room and a historical resource transfer period of the target anchor.
When the transition parameter comprises a live viewing duration,step 303 comprises the following.
And the background server acquires a live broadcast watching time length threshold value from the target user portrait, and the live broadcast watching time length threshold value is determined according to the live broadcast watching time length between the execution of the historical virtual resource transfer behaviors.
Optionally, the live viewing duration threshold includes a live viewing duration threshold of the target live broadcast room and a live viewing duration threshold of the target anchor.
In a possible implementation manner, the background server obtains historical virtual resource transfer behaviors of the target user account, and determines a live broadcast watching time length threshold of the target live broadcast room and a live broadcast watching time length threshold of the target anchor broadcast according to a live broadcast watching time length between execution of the historical virtual resource transfer behaviors. Optionally, the live viewing duration threshold may be an average viewing duration of all historical live viewing durations, or may be a maximum viewing duration of the historical live viewing durations.
And step 304, determining a risk coefficient corresponding to the virtual resource transfer instruction according to the at least one transfer parameter and the parameter index.
Correspondingly, when the transfer parameter includes a live-air identification,step 304 includes the following.
And in response to the fact that the live broadcast room identification does not belong to the target live broadcast room list, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a first risk coefficient.
In one example, the first risk factor is 1 if the live room identifier does not belong to the target live room list, and the first risk factor is 0 if the live room identifier belongs to the target live room list. And when the transfer parameter only contains the live broadcast room identifier, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a first risk coefficient 1.
Correspondingly, when the transfer parameter includes the anchor identification,step 304 includes the following.
And in response to the fact that the anchor identification does not belong to the target anchor list, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a second risk coefficient.
In one example, the second risk factor is 0.8 if the anchor identification does not belong to the target anchor list, and the first risk factor is 0 if the live room identification belongs to the target live room list. And when the transfer parameter only contains the anchor identification, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a second risk coefficient of 0.8.
Further, in the above example, when the transfer parameter includes a live broadcast room identifier in addition to the anchor broadcast identifier, the backend server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a sum of the first risk coefficient and the second risk coefficient, that is, the risk coefficient is 1.8.
Correspondingly, when the transfer parameter includes the resource transfer amount,step 304 includes the following.
And in response to the fact that the resource transfer quantity is larger than the resource transfer quantity threshold value, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a third risk coefficient.
In a possible implementation manner, the background server determines the third risk coefficient according to a ratio of the resource transfer quantity to the resource transfer quantity threshold value and the reference coefficient. Step 304 also includes the following.
The method comprises the steps that in response to the fact that the resource transfer quantity is larger than a resource transfer quantity threshold value, a background server determines the ratio of the resource transfer quantity to the resource transfer quantity threshold value.
And secondly, the background server determines a third risk coefficient according to the ratio and the reference coefficient, wherein the third risk coefficient and the ratio are in positive correlation.
And thirdly, the background server determines the third risk coefficient as a risk coefficient corresponding to the virtual resource transfer instruction.
In one example, the threshold of the resource transfer quantity is 50, the current resource transfer quantity is 200, and the reference coefficient is 0.6, then the ratio of the resource transfer quantity to the threshold of the resource transfer quantity is 4, and then the third risk coefficient is the product of the reference coefficient and the ratio, that is, the third risk coefficient is 2.4; if the resource transfer number is smaller than the resource transfer number threshold, the third risk coefficient is 0. And when the transfer parameters only contain the resource transfer quantity, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a third risk coefficient 2.4.
Further, in the above example, when the transfer parameter includes the resource transfer quantity in addition to the anchor identifier and the live broadcast room identifier, the backend server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a sum of the first risk coefficient, the second risk coefficient and the third risk coefficient, that is, the risk coefficient is 4.2.
Correspondingly, when the transfer parameter includes a resource transfer time,step 304 includes the following.
And in response to the fact that the resource transfer time does not belong to the historical resource transfer period, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a fourth risk coefficient.
In one possible embodiment, the closer the resource transfer time is to the historical resource transfer period, the smaller the fourth risk factor.
In one example, if the resource transfer time does not belong to the historical resource transfer period, then the fourth risk factor is 1.5; the resource transfer time belongs to the historical resource transfer period, and the fourth risk coefficient is 0. And when the transfer parameter only contains the resource transfer time, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a fourth risk coefficient 1.5.
Further, in the above example, when the transfer parameter includes the resource transfer time in addition to the anchor identifier, the live broadcast identifier, and the resource transfer quantity, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is the sum of the first risk coefficient, the second risk coefficient, the third risk coefficient, and the fourth risk coefficient, that is, the risk coefficient is 5.7.
Correspondingly, when the transition parameter comprises a live viewing duration,step 304 comprises the following.
And in response to the fact that the live broadcast watching time length is smaller than the live broadcast watching time length threshold value, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a fifth risk coefficient.
In a possible implementation manner, when the live viewing duration is smaller than the live viewing duration threshold, if the live viewing duration is closer to the live viewing duration threshold, the fifth risk coefficient is smaller.
In one example, the fifth risk factor is 0.8 if the live viewing duration is less than the live viewing duration threshold, and the fifth risk factor is 0 if the live viewing duration is not less than the live viewing duration threshold. And when the transfer parameter only contains the live broadcast watching duration, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is 0.8.
Further, in the above example, when the transfer parameter includes a live viewing duration in addition to the anchor identifier, the live room identifier, the resource transfer amount, and the resource transfer time, the background server determines that the risk coefficient corresponding to the virtual resource transfer instruction is a sum of the first risk coefficient, the second risk coefficient, the third risk coefficient, the fourth risk coefficient, and the fifth risk coefficient, that is, the risk coefficient is 6.5.
And step 305, responding to the fact that the risk coefficient is larger than the risk coefficient threshold value, and recording the transfer times of the risk resources.
In the actual live broadcast watching process of a user, the psychographic anchor broadcast or the live broadcast room can be rewarded for many times under most conditions, namely, the virtual resource transfer behavior is performed for many times. Therefore, the background server can also determine whether to carry out risk prompting, resource transfer verification, resource transfer freezing and the like on the virtual resource transfer behavior according to the virtual resource transfer behavior for a plurality of times.
In a possible implementation mode, the background server is provided with a risk coefficient threshold value, and when the risk coefficient is lower than the risk coefficient threshold value, response modes such as risk prompt and the like are not carried out; and when the risk coefficient is larger than the risk coefficient threshold value, the background server records the transfer times of the risk resources.
And step 306, in response to the fact that the transfer times of the risk resources are larger than the time threshold, the background server determines a target response mode corresponding to the risk coefficient threshold.
Wherein different risk coefficient thresholds correspond to different response modes. In the embodiment of the present application, the response mode including risk prompt, resource transfer verification, and resource transfer freezing is described as an example.
Optionally,step 306 includes the following one to three.
The method comprises the steps that firstly, in response to the fact that the transfer times of the risk resources are larger than a first time threshold value, and the risk coefficient threshold value is a first risk coefficient threshold value, a background server determines a risk prompt as a target response mode.
Wherein the risk prompt is used for indicating that the current virtual resource transfer behavior may have a risk to the terminal.
And secondly, in response to the fact that the transfer times of the risk resources are larger than a second risk coefficient threshold value, and the risk coefficient threshold value is the second risk coefficient threshold value, the background server determines the resource transfer verification as a target response mode, wherein the resource transfer verification comprises at least one of short message verification, biological characteristic verification or password verification.
The resource transfer verification is used for indicating that the current virtual resource transfer behavior is large and risks possibly exist to the terminal, and in order to further have opportunities for avoiding the risks, the background server avoids the risks by adopting a resource transfer verification mode, so that the virtual resource transfer can be continuously carried out through the target user account subjected to the resource transfer verification.
Taking a short message verification mode as an example, in a possible implementation mode, the background server sends a digital verification code to the terminal, and when the digital verification code is correctly filled in the current live broadcast interface by the target user account, the verification is passed.
And thirdly, in response to the fact that the transfer times of the risk resources are larger than a third risk coefficient threshold value, and the risk coefficient threshold value is the third risk coefficient threshold value, the background server determines the resource transfer freezing as a target response mode.
The resource transfer freezing is used for indicating that the current virtual resource transfer behavior risk is large and large amount of fund circulation of a target user account is involved to the terminal. Optionally, the resource transfer freezing includes blocking all resource transfers of the target user account on the same day, and continuing the resource transfers only after the target user account is defrosted by customer service, or transferring resources every other day, and the like.
It should be noted that the third risk coefficient threshold is greater than the second risk coefficient threshold, and the second risk coefficient threshold is greater than the first risk coefficient threshold.
Step 307, responding to the virtual resource transfer instruction in a target response manner.
And finally, the background server determines a target response mode according to the risk resource transfer times and the corresponding time threshold value, and responds to the virtual resource transfer instruction through the target response mode.
On the basis of the above embodiment, the process of determining the risk coefficient corresponding to the virtual resource transfer instruction is elaborated in detail in the embodiment of the application, the risk coefficient corresponding to each transfer parameter is obtained by comparing the transfer parameter included in the virtual resource transfer instruction with the parameter index corresponding to each transfer parameter in the target user portrait, and finally the risk coefficient corresponding to the virtual resource transfer instruction is determined; the transfer parameters comprise information related to virtual resource transfer behaviors, so that the background server can determine risk coefficients from the perspective of more parameters; in addition, parameter indexes corresponding to various transfer parameters in the target user portrait are generated according to historical watching behaviors and historical virtual resource transfer behaviors, so that the behavior characteristics of the user account can be well embodied, and powerful guarantee is provided for calculation of the risk coefficient.
In the embodiment of the application, the process of responding to the virtual resource transfer instruction according to the risk coefficient is further elaborated, wherein the background server determines a target response mode according to the risk resource transfer times and the corresponding time threshold value, and responds to the virtual resource transfer instruction through the target response mode; the background server can appropriately respond to the target user account logged in by the terminal by combining with the actual virtual resource transfer condition.
Referring to fig. 4, a block diagram of a risk determination apparatus for virtual resource transfer according to an exemplary embodiment of the present application is shown, where the apparatus includes:
theinstruction receiving module 401 is configured to receive a virtual resource transfer instruction of a target user account, where the virtual resource transfer instruction is triggered by a virtual resource transfer behavior of the target user account in a live broadcast room, and the virtual resource transfer behavior includes at least one of a donation of a virtual gift, a donation of a virtual item, and a donation of virtual money;
arisk determining module 402, configured to determine a risk coefficient corresponding to the virtual resource transfer instruction according to a target user portrait corresponding to the target user account, where the target user portrait is generated according to a historical viewing behavior and a historical virtual resource transfer behavior corresponding to the target user account, and the risk coefficient is used to represent a risk degree of the virtual resource transfer behavior;
theinstruction response module 403 is configured to respond to the virtual resource transfer instruction according to the risk coefficients, where different response manners correspond to different risk coefficients.
Optionally, therisk determining module 402 includes:
a parameter determining unit, configured to obtain a transfer parameter included in the virtual resource transfer instruction, where the transfer parameter includes at least one of the resource transfer number, the resource transfer time, a live broadcast room identifier, a anchor identifier, and a live broadcast viewing duration;
the index acquisition unit is used for acquiring parameter indexes corresponding to various transfer parameters from the target user portrait;
and the risk determining unit is used for determining a risk coefficient corresponding to the virtual resource transfer instruction according to at least one transfer parameter and the parameter index.
Optionally, the transfer parameter includes the live broadcast room identifier;
optionally, the index obtaining unit includes:
a first obtaining subunit, configured to obtain a target live broadcast room list from the target user representation, where the target live broadcast room list includes an identifier of at least one target live broadcast room, and a live broadcast room in which the historical virtual resource transfer behavior exists in the target live broadcast room for the target user account;
optionally, the risk determining unit includes:
and the first determining subunit is configured to determine, in response to that the live broadcast room identifier does not belong to the target live broadcast room list, that the risk coefficient corresponding to the virtual resource transfer instruction is a first risk coefficient.
Optionally, the transfer parameter includes the anchor identifier;
optionally, the index obtaining unit includes:
a second obtaining subunit, configured to obtain a target anchor list from the target user representation, where the target anchor list includes an identifier of at least one target anchor, and the target user account has the historical virtual resource transfer behavior in a live broadcast room corresponding to the target anchor;
optionally, the risk determining unit includes:
and the second determining subunit is configured to determine, in response to that the anchor identifier does not belong to the target anchor list, that the risk coefficient corresponding to the virtual resource transfer instruction is a second risk coefficient.
Optionally, the transfer parameter includes the resource transfer number;
optionally, the index obtaining unit includes:
a third obtaining subunit, configured to obtain a resource transfer quantity threshold from the target user image, where the resource transfer quantity threshold is determined according to a historical virtual resource transfer quantity corresponding to the historical virtual resource transfer behavior;
optionally, the risk determining unit includes:
a third determining subunit, configured to determine, in response to that the resource transfer number is greater than the resource transfer number threshold, that the risk coefficient corresponding to the virtual resource transfer instruction is a third risk coefficient.
Optionally, the third determining subunit is further configured to:
in response to the number of resource transfers being greater than the threshold number of resource transfers, determining a ratio of the number of resource transfers to the threshold number of resource transfers;
determining the third risk coefficient according to the ratio and a reference coefficient, wherein the third risk coefficient and the ratio have positive correlation;
and determining the third risk coefficient as the risk coefficient corresponding to the virtual resource transfer instruction.
Optionally, the transfer parameter includes the resource transfer time;
optionally, the index obtaining unit includes:
a fourth obtaining subunit, configured to obtain a historical resource transfer time period from the target user representation, where the historical resource transfer time period is determined according to a time corresponding to the historical virtual resource transfer behavior;
optionally, the risk determining unit includes:
a fourth determining subunit, configured to determine, in response to that the resource transfer time does not belong to the historical resource transfer period, that the risk coefficient corresponding to the virtual resource transfer instruction is a fourth risk coefficient.
Optionally, the transfer parameter includes the live viewing duration;
optionally, the index obtaining unit includes:
a fifth obtaining subunit, configured to obtain a live viewing duration threshold from the target user representation, where the live viewing duration threshold is determined according to a live viewing duration between execution of the historical virtual resource transfer behavior;
optionally, the risk determining unit includes:
a fifth determining subunit, configured to determine, in response to that the live viewing duration is smaller than the live viewing duration threshold, that the risk coefficient corresponding to the virtual resource transfer instruction is a fifth risk coefficient.
Optionally, theinstruction response module 403 includes:
the first response unit is used for responding to the fact that the risk coefficient is larger than a risk coefficient threshold value and recording the transfer times of the risk resources;
a second response unit, configured to determine, in response to that the number of times of transferring the risk resource is greater than a number threshold, a target response mode corresponding to the risk coefficient threshold, where different response modes corresponding to different risk coefficient thresholds are determined;
and the third response unit is used for responding to the virtual resource transfer instruction in the target response mode.
Optionally, the second response unit includes:
a first response subunit, configured to determine a risk prompt as the target response mode in response to that the number of times of transferring the risk resource is greater than a first time threshold, and that the risk coefficient threshold is a first risk coefficient threshold;
the second response subunit is configured to determine, in response to that the risk resource transfer frequency is greater than a second frequency threshold and that the risk coefficient threshold is a second risk coefficient threshold, a resource transfer verification as the target response mode, where the resource transfer verification includes at least one of short message verification, biometric verification, or password verification;
a third response subunit, configured to determine, in response to that the risk resource transfer frequency is greater than a third frequency threshold and the risk coefficient threshold is a third risk coefficient threshold, a resource transfer freeze as the target response mode;
wherein the third risk coefficient threshold is greater than the second risk coefficient threshold, which is greater than the first risk coefficient threshold.
In the embodiment of the application, in a live broadcast scene, after receiving a virtual resource transfer instruction of a target user account, a background server does not directly respond to transfer of virtual resources, but determines a risk coefficient corresponding to the virtual resource transfer instruction according to a target user figure corresponding to the target user account, further characterizes the risk degree of virtual resource transfer behavior according to the risk coefficient, and makes different response modes for the virtual resource transfer instruction according to different risk coefficients; compared with the virtual resource transfer method in the related art, the risk determining method for virtual resource transfer can calculate the risk coefficient before the virtual resource transfer, and further determine different response modes according to different risk coefficients so as to improve the safety of the virtual resource transfer process and maintain the fund safety of the target user account.
Referring to fig. 5, a schematic structural diagram of aserver 500 according to an embodiment of the present application is shown. Theserver 500 may be used to implement the risk determination method for virtual resource transfer provided in the above-described embodiments. Theserver 500 may be theserver 200 described in the embodiment of fig. 1. Specifically, the method comprises the following steps:
theserver 500 includes a Central Processing Unit (CPU)501, asystem memory 504 including a Random Access Memory (RAM)502 and a Read Only Memory (ROM)503, and asystem bus 505 connecting thesystem memory 504 and thecentral processing unit 501. Theserver 500 also includes a basic input/output system (I/O system) 506, which facilitates information transfer between devices within the computer, and amass storage device 507, which stores anoperating system 513,application programs 514, and other program modules 515.
The basic input/output system 506 comprises adisplay 508 for displaying information and aninput device 509, such as a mouse, keyboard, etc., for user input of information. Wherein thedisplay 508 and theinput device 509 are connected to thecentral processing unit 501 through an input output controller 510 connected to thesystem bus 505. The basic input/output system 506 may also include an input/output controller 510 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 510 also provides output to a display screen, a printer, or other type of output device.
Themass storage device 507 is connected to thecentral processing unit 501 through a mass storage controller (not shown) connected to thesystem bus 505. Themass storage device 507 and its associated computer-readable media provide non-volatile storage for theserver 500. That is, themass storage device 507 may include a computer-readable medium (not shown) such as a hard disk or CD-ROM drive.
Without loss of generality, the computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, DVD, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that the computer storage media is not limited to the foregoing. Thesystem memory 504 andmass storage device 507 described above may be collectively referred to as memory.
Theserver 500 may also operate as a remote computer connected to a network via a network, such as the internet, according to various embodiments of the present application. That is, theserver 500 may be connected to thenetwork 512 through thenetwork interface unit 511 connected to thesystem bus 505, or may be connected to other types of networks or remote computer systems (not shown) using thenetwork interface unit 511.
The memory also includes one or more programs stored in the memory and configured to be executed by one or more processors. The one or more programs include instructions for implementing the server-side risk determination method for virtual resource transfer.
The memory has stored therein at least one instruction configured to be executed by one or more processors to implement the functions of the various steps in the above-described method of risk determination of virtual resource transfer.
The embodiments of the present application further provide a computer-readable storage medium, where at least one instruction is stored in the storage medium, and the at least one instruction is loaded and executed by a processor to implement the risk determination method for virtual resource transfer provided in the above embodiments.
Optionally, the computer-readable storage medium may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a Solid State Drive (SSD), or an optical disc. The Random Access Memory may include a resistive Random Access Memory (ReRAM) and a Dynamic Random Access Memory (DRAM).
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.