# User security solutions

# I. Safety risk control interface

In order to improve the ecological security of WeChat open platform, aiming at the potential black production risks and security problems in Weixin Mini Program application scenarios such as malicious registration and marketing cheating,The platform open API method provides developers with a security risk control interface to help developers cope with marketing cheating risks such as swiping bills, fake transactions, malicious cheating of subsidies, and registration black production risks suchas bulk registration, falsification of identity, so that developers can maintain the order and security of Mini Program operations.

# II. Security risk control interface provides capabilities and application scenarios

  • Marketing cheating scenario: In marketing activities such as first-order offers and special discount offers, effectively identify fraudulent billing, fake transactions, malicious insurance fraud and subsidies that disrupt operational order and safety.
  • Malicious registration: Identifies and blocks malicious registration behaviors such as batch registrations, spam numbers, and identity fraud on machines.

# III. Competency application process

  • Log in Weixin Mini Program and apply for opening in [Development → Development Management → Security Center → User Risk Control → Security Risk Control Interface]. 0.png

# IV. Dxplaination of level of risk and recommendations for use

The developer can judge the level of risk according to the level of risk. The significance of the level of risk and the use of the corresponding business, please refer to the following instructions and suggestions, specific use can be adjusted dynamically according to the actual situation of the business, in order to achieve accurate intercept, protect the sound development of the business.

Level of risk Proposed disposal scheme
Level of risk 0 There's no risk, no blocking.
Level of risk 1 Low suspicious risk, and simple verification (e.g. verification code, SMS, etc.) is recommended.
Level of risk 2 Slight suspicious risks. Simple verification (e.g. verification code, SMS, etc.) is recommended.
Level of risk 3 Moderate suspicious risk, and it is recommended to take certain measures to avoid harm depending on the business scenario. For example, marketing campaigns can reduce the probability of high-level rewards; List-based campaigns reduce the weight of such votes; Login registration requires secondary verification, etc.
Level of risk 4 Highly suspicious risk, recommended direct interception based on business logic. For example, red envelopes-type activities return no winnings or a minimum amount of red envelope; No counting of votes is taken at a list-based event; The login / registration operation requires secondary verification; High-risk businesses have the option to restrict this operation.

# Develop Access Guidelines

Call API