METHOD AND DEVICE FOR CONTROLLING SERVICE OPERATION RISK
First Claim
1. A computer-implemented method, comprising:
- monitoring, by an application program on an end-user device, a service operation initiated by a user for invoking offline service information;
determining, after the service operation is monitored, whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model;
in response to determining that the service operation is a risky operation, refusing to invoke the offline service information; and
in response to determining that the service operation is not a risky operation, invoking the offline service information.
1 Assignment
0 Petitions
Accused Products
Abstract
The present application discloses example methods, computer-readable mediums, and systems for controlling service operation risks. In one example, method, an application program on an end-user device monitors a service operation initiated by a user for invoking offline service information. After the service operation is monitored, it is determined whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model. In response to determining that the service operation is a risky operation, a refusal to invoke the offline service information is performed. In response to determining that the service operation is not a risky operation, the offline service information is invoked.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
monitoring, by an application program on an end-user device, a service operation initiated by a user for invoking offline service information; determining, after the service operation is monitored, whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model; in response to determining that the service operation is a risky operation, refusing to invoke the offline service information; and in response to determining that the service operation is not a risky operation, invoking the offline service information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
monitoring, by an application program on an end-user device, a service operation initiated by a user for invoking offline service information; determining, after the service operation is monitored, whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model; in response to determining that the service operation is a risky operation, refusing to invoke the offline service information; and in response to determining that the service operation is not a risky operation, invoking the offline service information. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; monitoring, by an application program on an end-user device, a service operation initiated by a user for invoking offline service information; determining, after the service operation is monitored, whether the service operation is a risky operation based on recorded historical operation data and at least one of a predetermined risk evaluation rule or a risk evaluation model; in response to determining that the service operation is a risky operation, refusing to invoke the offline service information; and in response to determining that the service operation is not a risky operation, invoking the offline service information.
-
Specification