CN107798541A - A kind of monitoring method and system being used in line service - Google Patents

A kind of monitoring method and system being used in line service Download PDF

Info

Publication number
CN107798541A
CN107798541A CN201610799529.3A CN201610799529A CN107798541A CN 107798541 A CN107798541 A CN 107798541A CN 201610799529 A CN201610799529 A CN 201610799529A CN 107798541 A CN107798541 A CN 107798541A
Authority
CN
China
Prior art keywords
information
targeted customer
user
identification information
identified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610799529.3A
Other languages
Chinese (zh)
Other versions
CN107798541B (en
Inventor
张侦
李贵军
沈清娇
吴瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Xingyun Digital Technology Co Ltd
Original Assignee
Suning Commerce Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suning Commerce Group Co Ltd filed Critical Suning Commerce Group Co Ltd
Priority to CN201610799529.3A priority Critical patent/CN107798541B/en
Publication of CN107798541A publication Critical patent/CN107798541A/en
Application granted granted Critical
Publication of CN107798541B publication Critical patent/CN107798541B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The embodiment of the invention discloses a kind of monitoring method and system being used in line service, it is related to big data technical field, it is possible to increase detecting efficiency, reduce the risk of network trading.The present invention includes:Data source is inquired about according to the identification information of targeted customer, and the business information associated with the identification information of the targeted customer is read from the data source;The user of incidence relation with the targeted customer by feature templates inquiry be present, feature templates correspond to the operation system where the targeted customer;For sending alarm with user that the targeted customer has incidence relation.The present invention is applied to the account that real-time Auto-Sensing is likely to be used for network fraud case.

Description

A kind of monitoring method and system being used in line service
Technical field
The present invention relates to big data technical field, more particularly to a kind of monitoring method and system being used in line service.
Background technology
With the fast development of Internet technology, the business such as ecommerce, internet financial service, online transaction/payment Arise at the historic moment, and the situation of rapid growth is presented.But while fast development, based on internet crime fraud also frequency Numerous generation, consumer and enterprise is set to suffer huge economic losses, or even the further personal social reputation with company of infringement, than Such as:According to relevant statistics, end 2015, the bad credit 50%-70% of internet finance comes from network fraud event.
Also, because network fraud has the characteristics of cost is relatively low, interests are huge, promote network fraud industrial chain to be formed, And there is a large amount of well organized, the division of labor clearly fraud clique.(protected according to hunting net platform by Beijing Municipal Bureau of Public Security's network security Army unit and 360 internet security center complex are defended to initiate to set up) analysis show that why is the underground industry size that network is swindled It is rapid to expand, mainly due to network swindle crime has the characteristics that strange land crime, small amount is multiple, evidence obtaining is difficult, hit difficulty Greatly.
Although financial regulation agencies puts into effect regulator file successively, the anti-fraud work to financial institution proposes It is required that such as:Banking Supervision Commission's issue《Business bank's Information technology risk Monitoring Indexes》, stock supervisory committee's issue《Security are public Internet securities information systems technology is taken charge of to guide》.But it is currently used mainly for it is single swindle case analysis mode and Analysis tool, it is difficult to timely and effectively complete analysis work to magnanimity case, it is difficult to establish early warning, the detecting system of precise and high efficiency System.Especially for the behavior that group's fraud is carried out currently with online payment tool, it is in particular by more accounts, trans-sectoral business The complex fraud of system, more set camouflage (user's) information, current detecting means are difficult to timely and accurately lock Suspected target, result in that current detecting efficiency is low, and the risk of network trading remains high always.
The content of the invention
Embodiments of the invention provide a kind of monitoring method and system being used in line service, it is possible to increase detecting efficiency, Reduce the risk of network trading.
To reach above-mentioned purpose, embodiments of the invention adopt the following technical scheme that:
In a first aspect, the method that embodiments of the invention provide, including:Data are inquired about according to the identification information of targeted customer Source, and the business information associated with the identification information of the targeted customer is read from the data source, the identification information is at least Including:Account information and/or the account coding of the targeted customer, the data source comprise at least:Online transaction platform and meeting Member's management system, the business information comprise at least:Sequence information, payment information and logistics information, and/or the business information Comprise at least:Device-fingerprint information, member registration information and member's attribute information;
The user of incidence relation with the targeted customer by feature templates inquiry be present, feature templates correspond to the target Operation system where user;
For sending alarm with user that the targeted customer has incidence relation.
With reference in a first aspect, in the first possible implementation of first aspect, in addition to:
The case mark that the monitor supervision platform is sent is received, and reads the case mark from the online transaction platform and refers to To data;
The identification information of targeted customer described in the extracting data pointed to from case mark.
With reference to the possible implementation of the first of first aspect or first aspect, in second of possible implementation In, it is described that data source is inquired about according to the identification information of targeted customer, and read the knowledge with the targeted customer from the data source The business information of other information association, including:
According to the identification information of the targeted customer, the identification that the targeted customer is read from the online transaction platform is believed Sequence information, payment information and logistics information under account pointed by breath;
And/or the identification information according to the targeted customer, read the targeted customer's from the membership management system Device-fingerprint information, member registration information and member's attribute information under account pointed by identification information.
With reference to the possible implementation of the first of first aspect or first aspect, in the third possible implementation In, the user that incidence relation with the targeted customer by feature templates inquiry be present, including:
It is determined that the operation system of the business information of the identification information association of the targeted customer is generated, and from feature templates Feature templates corresponding to the operation system are inquired about in storehouse;
According to the feature templates, from the identification information and business information of user to be identified, the use to be identified is extracted The characteristic at family;
According to the characteristic and the matching degree of the feature templates, detect whether the user to be identified is described The user of incidence relation with the targeted customer be present.
With reference to the third possible implementation of first aspect, in the 4th kind of possible implementation, the foundation The feature templates, from the identification information and business information of user to be identified, the characteristic of the user to be identified is extracted, Including:
The information type pointed by the feature templates is read, the pointed information type comprises at least:Contact letter Breath, registered address information and hour of log-on information;
From the identification information and business information of user to be identified, extraction meets the information of the pointed information type Characteristic as the user to be identified.
With reference to the third possible implementation of first aspect, in the 5th kind of possible implementation, the basis The characteristic and the matching degree of the feature templates, detect whether the user to be identified is that the described and target is used The user of incidence relation be present in family, including:
Detect and the data division specified whether is deposited in the characteristic of the user to be identified with the targeted customer's Characteristic is identical, if being then determined as the user that incidence relation with the targeted customer be present.
With reference to the 5th kind of possible implementation of first aspect, in the 6th kind of possible implementation, the detection Whether the data division specified is deposited in the characteristic of the user to be identified identical with the characteristic of the targeted customer, Including:
Whether the reserved name for detecting the user to be identified is identical with the targeted customer;
And/or whether the reserved communication number of the detection user to be identified is identical with the targeted customer;
And/or whether the reserved address of the detection user to be identified is identical with the targeted customer;
And/or the detection user to be identified registration when IP address information it is whether identical with the targeted customer;
And/or the detection user to be identified registration when period it is whether identical with the targeted customer.
With reference to the third possible implementation of first aspect, in the 7th kind of possible implementation, in addition to:
In the data for reading that the case mark is pointed to from the online transaction platform, the transaction layer of each operation system is extracted Data and account layer data, the transaction layer data include:Exchange hour information, transaction attribution ground distributed intelligence, payment terminal Type information and channel of disbursement information, the account layer data include:Registered address information, hour of log-on information, registration channel Information, user type information, registration terminal distributed intelligence and member's characteristic information;
To each information type in the transaction layer data and the account layer data, counted according to case-involving frequency, And determine the information type corresponding to each operation system pointed by feature templates.
With reference in a first aspect, in the 8th kind of possible implementation of first aspect, in addition to:
According to the identification information of the user that incidence relation with the targeted customer be present, obtain in each operation system In, for the business information that the user of incidence relation with the targeted customer be present and generated, and to the monitor supervision platform Send;
And/or the identification information of the user that incidence relation be present with the targeted customer is added to blacklist.
With reference to the 8th kind of possible implementation of first aspect, in the 9th kind of possible implementation, in addition to:
When detecting that at least one operation system receives the friendship transmitted by the user of the identification information in the blacklist When easily asking, the transaction request is intercepted;
The user feedback prompting message of identification information into the blacklist, the prompting message include for prompting Re-execute the information of account verification process;
And state new information is sent to the membership management system, the state new information is used to trigger the member The account state of the user of identification information in the blacklist is updated to " not verifying " by management system.
Second aspect, the system that embodiments of the invention provide, at least match somebody with somebody on the case analysis server in the system It is equipped with:Data extraction module, data analysis module and management and control module;
The data extraction module, for inquiring about data source according to the identification information of targeted customer, and from the data source The business information associated with the identification information of the targeted customer is read, the identification information comprises at least:The targeted customer Account information and/or account coding, the data source comprises at least:Online transaction platform and membership management system, the industry Business information comprises at least:Sequence information, payment information and logistics information, and/or the business information comprise at least:Device-fingerprint Information, member registration information and member's attribute information;
The data analysis module, for the use of incidence relation with the targeted customer by feature templates inquiry be present Family, feature templates correspond to the operation system where the targeted customer;
The management and control module, for for sending alarm with user that the targeted customer has incidence relation.
With reference to second aspect, in the first possible implementation of second aspect, the data extraction module, also use In the case mark for receiving the monitor supervision platform transmission, and the number pointed to from the online transaction platform reading case mark According to;And the identification information of targeted customer described in the extracting data from case mark sensing;
The data extraction module, and be specifically used for:According to the identification information of the targeted customer, from the online transaction Platform reads sequence information, payment information and the logistics information under account pointed by the identification information of the targeted customer;With/ Or, the identification information according to the targeted customer, from the identification information institute of the membership management system reading targeted customer Point to device-fingerprint information, member registration information and the member's attribute information under account;
The data analysis module, specifically for determining that the business that the identification information for generating the targeted customer associates is believed The operation system of breath, and feature templates corresponding to the operation system are inquired about from feature templates storehouse;And according to the character modules Plate, from the identification information and business information of user to be identified, extract the characteristic of the user to be identified;Detect again described Whether the data division specified is deposited in the characteristic of user to be identified identical with the characteristic of the targeted customer, if Then it is determined as the user that incidence relation with the targeted customer be present;
Wherein, whether deposited in the characteristic of the detection user to be identified the data division specified with the mesh It is identical to mark the characteristic of user, including:The reserved name of the user to be identified is detected whether with the targeted customer's It is identical;And/or whether the reserved communication number of the detection user to be identified is identical with the targeted customer;And/or Whether the reserved address for detecting the user to be identified is identical with the targeted customer;And/or wait to know described in detection Whether the IP address information during registration of other user is identical with the targeted customer;And/or the detection user to be identified Whether period during registration is identical with the targeted customer.
With reference to the possible implementation of the first of second aspect or second aspect, in second of possible implementation In, the management and control module, the identification information according to the user that incidence relation with the targeted customer be present is additionally operable to, is obtained In each operation system, for the business information that the user of incidence relation with the targeted customer be present and generated, and Sent to the monitor supervision platform;And/or the identification information of the user that incidence relation with the targeted customer be present is added To blacklist.
The monitoring method and system provided in an embodiment of the present invention being used in line service, the class built using multiple data sources The networks such as social activity/IP address/phone number/geography information, exist by feature templates inquiry with the targeted customer and associate The user of system, so as to the association between fast positioning fraud account, it is achieved thereby that by the IP during transaction of targeted customer The business information such as location, machinery equipment fingerprint, phone number, ship-to, reverse-locate other the suspicious height that association therewith be present Endanger user.Suspected target can be timely and accurately locked, and corresponding alarm information is sent to monitor supervision platform, and can be taken Freezing or clearing up for further batch, realizes real-time Auto-Sensing and limits the account for being likely to be used for network fraud case Number, so as to improve detecting efficiency, reduce the risk of network trading.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it will use below required in embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is the overall architecture schematic diagram of the monitoring system provided in an embodiment of the present invention in line service;
Fig. 2 is the schematic flow sheet provided in an embodiment of the present invention being used in the monitoring method of line service;
Fig. 3 is the structural representation provided in an embodiment of the present invention being used in the monitoring system of line service;
Fig. 4 a, Fig. 4 b, Fig. 4 c, the schematic diagram that Fig. 4 d is instantiation provided in an embodiment of the present invention.
Embodiment
To make those skilled in the art more fully understand technical scheme, below in conjunction with the accompanying drawings and specific embodiment party Formula is described in further detail to the present invention.Embodiments of the present invention are described in more detail below, the embodiment is shown Example is shown in the drawings, wherein same or similar label represents same or similar element or has identical or class from beginning to end Like the element of function.Embodiment below with reference to accompanying drawing description is exemplary, is only used for explaining the present invention, and can not It is construed to limitation of the present invention.Those skilled in the art of the present technique are appreciated that unless expressly stated, odd number shape used herein Formula " one ", "one", " described " and "the" may also comprise plural form.It is to be further understood that the specification of the present invention The middle wording " comprising " used refers to the feature, integer, step, operation, element and/or component be present, but it is not excluded that In the presence of or other one or more features of addition, integer, step, operation, element, component and/or their groups.It should be understood that When we claim element to be " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or There may also be intermediary element.In addition, " connection " used herein or " coupling " can include wireless connection or coupling.Here make Wording "and/or" includes any cell of one or more associated list items and all combined.The art Technical staff is appreciated that unless otherwise defined all terms (including technical term and scientific terminology) used herein have With the general understanding identical meaning of the those of ordinary skill in art of the present invention.It is it should also be understood that such as general Those terms defined in dictionary, which should be understood that, has the meaning consistent with the meaning in the context of prior art, and Unless being defined as here, will not be explained with the implication of idealization or overly formal.
Method flow in the present embodiment, specifically can it is a kind of it is as shown in Figure 1 be used for be in the monitoring of line service Performed on system, the system includes:Case analysis server, monitor supervision platform and data source.
Wherein, case analysis service implement body can be the equipment such as server, work station, supercomputer, or by Multiple server groups into a kind of server cluster system for data processing.Such as:Case analysis server is with master- The form of sl aver clusters is disposed, and each slaver server is responsible for believing according to the identification of targeted customer for a part Cease to data source requesting query, and the business information associated with the identification information of the targeted customer is read from data source. Master servers are responsible for collecting the business information that cluster is obtained by each slaver servers from different data sources.By case Business information of the Analysis server based on collected cluster, incidence relation be present with the targeted customer by feature templates inquiry User.It is directed to again and sends alarm with user that the targeted customer has incidence relation.Specifically, case analysis server A single server apparatus of the online transaction platform either in membership management system can be integrated in or by multiple clothes The device clusters of business device composition.
In the present embodiment, for sending the concrete mode of alarm with user that the targeted customer has incidence relation, It can include:For the user of incidence relation with the targeted customer be present, alarm information is sent to monitor supervision platform, in order to supervise Control platform knows the user that incidence relation be present with the targeted customer in time, and is associated for existing with the targeted customer The user of system takes further monitoring means, such as:Freeze the processing such as account, title;Or for the targeted customer The user of incidence relation be present, labeled as high-risk user, businessman, attendant to online transaction platform send alarm information, And these credit grades of the user in online transaction platform that incidence relation with the targeted customer be present can be reduced, or Take other to limit these and activity journey of the user of incidence relation on online transaction platform be present with the targeted customer The measure of degree, in order to prevent the network fraud case that a part is triggered by high-risk user;Monitor supervision platform can be used for The Surveillance center of monitoring online transaction platform in real time, is undertaken mainly by the server apparatus for case analysis or server cluster Hardware implementation procedure, such as:The risk monitoring and control system of currently used online transaction platform;Again for example:Supervised for counting The supervising platform of network fraud case, than as known today and more ripe " hunting net platform " monitoring system.
Specifically, case analysis server carries out case storage from monitor supervision platform, such as:By air control, business personnel is defined as The case mark of case is pointed, and online transaction platform or data acquisition in on-line payment platform are simultaneously entered into case point Analyse server.Wherein, case analysis server can receive the case mark that the monitor supervision platform is sent, and be handed over online from described Easy platform reads the data that the case mark is pointed to, then targeted customer described in the extracting data pointed to is identified from the case Identification information.In the present embodiment, a case mark can be specifically a kind of identification information for marker transactions process, For example marked the Transaction Identification Number of online transaction operated by user, marked the order number of online shopping operated by user, or Be marked operated by user handle on-line finance business handle numbering.
Data source can be specifically:It is used to store sequence information, payment information and logistics information etc. in online transaction platform The server apparatus of business information;And it is used for storage device finger print information, member registration information and meeting in membership management system The server apparatus of the business information such as member's attribute information.Can also be other equipment for being used for storage service information, system or Platform.
It should be noted that " user " described in the present embodiment, it can be understood as by user equipment in online transaction The personnel of account registration operation are completed in the system such as platform or membership management system, and subsequently online is carried out by user equipment The operation behaviors such as transaction, online shopping and account management.User equipment can specifically make an independent table apparatus in fact, or be integrated in In a variety of media data playing devices, such as set top box, mobile phone, tablet personal computer (Tablet Personal Computer), laptop computer (Laptop Computer), multimedia player, digital camera, personal digital assistant (personal digital assistant, abbreviation PDA), guider, mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
The embodiment of the present invention provides a kind of monitoring method being used in line service, as shown in Fig. 2 including:
S1, data source is inquired about according to the identification information of targeted customer, and read and the targeted customer from the data source Identification information association business information.
Wherein, the identification information comprises at least:Account information and/or the account coding of the targeted customer.Target is used Family can be understood as:In the various transactions of each user, the account of corresponding each user is produced by online transaction platform What information and/or account encoded, for recording the daily record data of transaction.These daily record datas are used to record ordering for user The information of single, payment, logistics etc..If monitor supervision platform identifies the daily record number pointed to the case that case analysis server provides According to including the daily record data of some or the corresponding transaction of multiple users, then the one or more user can be used as institute The targeted customer stated, such as:The case mark that monitor supervision platform provides points to a daily record for having determined as network swindle case Data, then user corresponding to the daily record data is as targeted customer, and the records such as its account information, account encode are into blacklist; Again for example:The case mark that monitor supervision platform provides points to the daily record data in specified time section, then is used corresponding to the daily record data Family is as targeted customer, after suspicion investigation is completed by artificial or using the present embodiment flow, then judge its account information, Whether account coding etc. is recorded into blacklist.Case analysis server can be by presetting specific character modules in the present embodiment Plate carries out suspicion investigation.
It should be noted that the account information described in the present embodiment is specifically including but not limited to:User is carrying out account The account that is inputted during registration, mailbox, telephone number etc. possess the information for distinguishing different user function.Family described in the present embodiment Header encoder is specifically including but not limited to:Bank's card number, on-line payment account, the online transaction platform of user's offer are registered for completion User distribution numbering, wait possess distinguish different user function and with uniqueness information.
In the present embodiment, the business information comprises at least:Sequence information, payment information and logistics information, and/or institute Business information is stated to comprise at least:Device-fingerprint information, member registration information and member's attribute information.Such as:As shown in Figure 1, The data source comprises at least:Online transaction platform and membership management system, the business information comprise at least:Sequence information, The information that payment information and logistics information etc. are provided by online transaction platform, and the business information comprise at least:Equipment refers to The information that line information, member registration information and member's attribute information etc. are provided by membership management system.And these business information show It is so corresponding with the identification information of some or multiple users, if this " some or multiple users " uses for described target Family, then these business information can be understood as the business information associated with the identification information of the targeted customer.
S2, by feature templates inquiry the user of incidence relation be present with the targeted customer.
Wherein, feature templates correspond to the operation system where the targeted customer, and different operation systems can correspond to each From one or a set of (including multiple) feature templates.Operation system described in the present embodiment, it can include but is not limited to:By The online sales system (such as all kinds of online shopping sites) of online transaction platform operation, on-line finance system (for example all kinds of carry App and corresponding service end system for finance and money management server), online inventive system (such as:Handed over available on line or under line The online granting website of easy reward voucher, app) and logistics system (such as:Logistics progress chasing system) etc., and managed by member Member's activity system (such as community of forum) of system operation, system (such as the Dropbox provided as user of data, services class are provided System, data backup service system etc.).It should be noted that the data source in the present embodiment specifically included server apparatus, The equipment or device clusters of the hardware views such as server cluster;And the operation system in the present embodiment includes for being carried to user For all kinds of business, the system of service, equipment or device clusters as data source can undertake one or more of business systems simultaneously The operation of system.
S3, for sending alarm with user that the targeted customer has incidence relation.
Wherein, the alarm information comprises at least:The identification of the user that incidence relation with the targeted customer be present Information, in order to which monitor supervision platform identifies the user that incidence relation be present with the targeted customer;The alarm information also includes: The system banner of operation system where the user of incidence relation being present with the targeted customer, in order to monitor supervision platform identify with The operation system involved by the user of incidence relation be present in the targeted customer.Wherein, user can in involved operation system To be interpreted as:User has carried out by operating user terminal in involved operation system registering at least once, has logged in, browses Deng operation.
The monitoring method in line service that the present embodiment provides, the class social activity/IP address/hand built using multiple data sources The networks such as machine number/geography information, the user of incidence relation with the targeted customer by feature templates inquiry be present, so as to fast Association between speed positioning fraud account, it is achieved thereby that by the IP address during transaction of targeted customer, machinery equipment fingerprint, The business information such as phone number, ship-to, reverse-locate other the suspicious high-risk users that association therewith be present.Can be accurate in time Suspected target really is locked, and corresponding alarm information is sent to monitor supervision platform, so as to improve detecting efficiency, reduces network The risk of transaction.
In the present embodiment, there is provided a kind of possible realization rate that a kind of above-mentioned steps S1 is used, i.e.,:Case analysis takes Device be engaged according to the identification information of targeted customer inquiry data source, and the identification read from the data source with the targeted customer is believed The business information of association is ceased, a kind of possible realization rate of use includes:
Case analysis server reads the mesh according to the identification information of the targeted customer from the online transaction platform Mark sequence information, payment information and the logistics information under account pointed by the identification information of user;And/or according to the target The identification information of user, the equipment under account pointed by the identification information of the targeted customer is read from the membership management system Finger print information, member registration information and member's attribute information.
Wherein, the information read according to the identification information of the targeted customer from online transaction platform and membership management system Including but not limited to:Sequence information (such as:Order number, lower single time etc.), payment information (such as:Payment Amount, payment account Family, payment time etc.), logistics information (such as:Delivery availability, packing time, logistics progress msg etc.), device-fingerprint information (such as current network anti-the device-fingerprint employed in fraud technology), member registration information (such as the hour of log-on of member, The information such as the pet name, mailbox, telephone number) and member's attribute information (such as:The authority of member, class information).Such as:Case point Server is analysed to read business information according to the identification information of the targeted customer from multiple data sources and enter business information Row is integrated.In actual applications, can according to transaction agent (such as:User represented by the identification information of targeted customer) association The data of separate sources, as shown in Figure 3, case analysis server can read case from the risk case storehouse of monitor supervision platform Mark, or directly read the business information prestored;Device-fingerprint is read from the machine fingerprint table of membership management system Information;Member registration information is read from the membership information table of membership management system;From member's attribute list of membership management system Middle reading member's attribute information;Can also be that sequence information is read from the payment transaction order table of online transaction platform, is paid Information and logistics information etc..
Further, in addition to:Case analysis server reads the case mark from the online transaction platform and pointed to Data in, extract the transaction layer data and account layer data of each operation system.To the transaction layer data and the account layer Each information type in data, is counted according to case-involving frequency, and is determined pointed by feature templates corresponding to each operation system Information type.
So as to by the IP address of case-involving transaction agent, phone number, geography information such as ship-to, channel of disbursement, payment The dimension such as terminal and hour of log-on, the centrality of time of payment, cheated as the relevance of analysis and summary case and clique Feature, and import feature templates.In order to feature templates corresponding to each operation system of real-time update, or in new business system When system is reached the standard grade, feature templates corresponding to in-time generatin.
In the present embodiment, the transaction layer data include:Exchange hour information, transaction attribution distributed intelligence, pay Terminal type information and channel of disbursement information, the account layer data include:Registered address information, hour of log-on information, registration Channel information, user type information, registration terminal distributed intelligence and member's characteristic information.Wherein, member's feature can be further Comprising:Sex distribution, age distribution, account ownership city, member's state, if interior employee, if tie up card etc..
It should be noted that the industry that case analysis server obtains according to the identification information of targeted customer from data source query The species for information of being engaged in, can be above-mentioned at least one of cited or multinomial or except above-mentioned cited business The type of other kinds of business information outside information, specifically wanted specific business information, can according to inquiry with it is described Used feature templates during the user of incidence relation be present and determine in targeted customer.
In the present embodiment, there is provided a kind of possible realization rate that a kind of above-mentioned steps S2 is used, i.e.,:Pass through character modules Plate inquires about the user that incidence relation be present with the targeted customer, and a kind of possible realization rate of use includes S21-S23:
S21, it is determined that the operation system of the business information of the identification information association of the targeted customer is generated, and from feature Feature templates corresponding to the operation system are inquired about in ATL.
S22, according to the feature templates, wait to know from the identification information and business information of user to be identified, described in extraction The characteristic of other user.
Specifically, it is described according to the feature templates, from the identification information and business information of user to be identified, extract institute The characteristic of user to be identified is stated, including:First read the information type pointed by the feature templates;Again from user to be identified Identification information and business information in, extraction meets the information of the pointed information type as the user's to be identified Characteristic.Wherein, the pointed information type comprises at least:Contact information, registered address information and hour of log-on letter Breath.And the feature templates of corresponding different business systems, incomplete same information type can be pointed to, case analysis server can Meet the information of the information type pointed by feature templates using extraction as the characteristic of the user to be identified.Such as:It is right In the system for undertaking logistics business, feature templates include:1:Count the contact person that receives of the account of specified quantity, cell-phone number of receiving Code distribution situation;2:Count the situation that registration IP is shared between different account;3:Hour of log-on point is counted to concentrate at the appointed time Situation in section.Then the information type pointed by feature templates includes:Registering IP address information and hour of log-on information, contact letter Cease member registration information such as (contact name, cell-phone numbers of receiving).Case analysis server can extract from membership management system These member registration information, and count and obtain characteristic, such as:Counting obtained characteristic includes:Feature 1:Multiple accounts The related contact person that receives in family, phone number distribution situation of receiving, the receive mobile phone more related than multiple accounts as shown in fig. 4 a The distribution situation of number, and it is Nanjing to obtain mainly being distributed city;Feature 2:Registration IP situation is shared between different accounts, than The distribution situation of the registering IP address of multiple accounts as shown in Figure 4 b, and main street can be determined according to the IP address that statistics obtains Road;Feature 3:Hour of log-on point is concentrated mainly on the account between 1,2 March in 2016, than multiple accounts as illustrated in fig. 4 c The distribution situation of the hour of log-on at family, and situation about can be registered according to statistical decision with the presence or absence of concentration, wherein, Fig. 4 a, 4b, 4c In a line represent an account.
S23, according to the matching degree of the characteristic and the feature templates, detect the user to be identified whether be The user that incidence relation with the targeted customer be present.
Specifically, it is described according to the characteristic and the matching degree of the feature templates, detect the use to be identified Whether family is the user that incidence relation with the targeted customer be present, including:Detect the characteristic of the user to be identified The data division specified whether is deposited in identical with the characteristic of the targeted customer, if be then determined as it is described with it is described The user of incidence relation be present in targeted customer.
Such as:System for undertaking financial credit business, feature templates include:The situation of checking information uniformity is right Related information verified, and it will be consistent to be based on some information, the inconsistent situation user of other information as with the target The user of incidence relation be present in user.System for undertaking financial credit business, the information type bag pointed by feature templates Member registration information is included, such as:Borrower Zhang San is targeted customer, is noted if borrower Zhang San and borrower Li Si are filled in member The telephone number of volume information is identical, but Business Name is completely different, then can determine that as a risk point, case analysis server It is the user for existing with Zhang San incidence relation to judge Li Si;For another example:Borrower king five is targeted customer, and the account of king five is The borrower of lost contact is judged as, if the member registration information of Zhang San and Li Si and king five have identical part and (for example contacted The information such as phone, Business Name, address), then judge that Zhang San and Li Si are the user for existing with king five incidence relation.
Again for example:A kind of feature templates can be preset as common template, and correspond to multiple business system, quickly to identify Clique is cheated.Such as:Feature templates include:The situation of checking information uniformity, is verified to related information, and will be based on certain Individual information is consistent, and the inconsistent situation user of other information is as the user that incidence relation with the targeted customer be present.Below A kind of possible template-setup situation is enumerated, including:Number information, address information, surname or device-fingerprint information are consistent, and name When word and inconsistent other member registration information, then judge that corresponded to each account of consistent information has association pass each other The user of system, for example as shown in figure 4d, accounts that corresponded to identical telephone number and that name is different, then association each other be present The user of relation.
Except above-mentioned detection means, several possible feature templates are also listed in the present embodiment, detect the use to be identified Whether the data division specified is deposited in the characteristic at family identical with the characteristic of the targeted customer, so that it is determined that described Whether user to be identified is the user that incidence relation with the targeted customer be present.Such as:Detect the user to be identified Reserved name it is whether identical with the targeted customer, such as:Detect the surname of the related consignee's name of multiple accounts Family name is identical but name is irregular, and phone number of receiving shares several portions;And/or the detection user's to be identified is reserved Communication number it is whether identical with the targeted customer, such as:Several portions are only shared to receive mobile phone;And/or described in detection Whether the reserved address of user to be identified is identical with the targeted customer, such as:Pass through the hand shown in S22 Section, determines ship-to in the same area;And/or the detection user to be identified registration when IP address information whether with The targeted customer's is identical, such as:There is a situation where to share registration IP between different accounts;And/or detection is described to be identified Whether the period during registration of user is identical with the targeted customer, such as:All it is the account continuously registered in the short time.
In the present embodiment, except for there is the user of incidence relation hair with the targeted customer in case analysis server Go out outside alarm, can also carry out following flow, including:
According to the identification information of the user that incidence relation with the targeted customer be present, obtain in each operation system In, for the business information that the user of incidence relation with the targeted customer be present and generated, and to the monitor supervision platform Send, trace back data detail export function is looked into so as to which support case is counter, in order to which the monitor supervision platform passes through existing automation Case analysis system receives or transferred manually by monitoring personnel case inquiry detailed data, and carries out case analysis;
And/or the identification information of the user that incidence relation be present with the targeted customer is added to blacklist.Example Such as:After described other members being determined as with the targeted customer has incidence relation user in crime club, by these The user of incidence relation be present and to this batch of user's typing blacklist (to intercept the transaction for entering the user of blacklist and being sent Request) or carry out account and the processing such as freeze.
Further, for the user of typing blacklist, following flow is can also carry out, including:
When detecting that at least one operation system receives the friendship transmitted by the user of the identification information in the blacklist When easily asking, the transaction request is intercepted;And the user feedback prompting message of the identification information into the blacklist;And can be with Simultaneously state new information is sent to the membership management system.
Wherein, the prompting message includes the information that account verification process is re-executed for prompting;The state is more The account state of the user of identification information in the blacklist is updated to by new information for triggering the membership management system " not verifying ", in order to it is misjudged or by the user of steal-number by re-executing verification process, recover the function of account.
The monitoring method in line service that the present embodiment provides, the class social activity/IP address/hand built using multiple data sources The networks such as machine number/geography information, the user of incidence relation with the targeted customer by feature templates inquiry be present, so as to fast Association between speed positioning fraud account, it is achieved thereby that by the IP address during transaction of targeted customer, machinery equipment fingerprint, The business information such as phone number, ship-to, reverse-locate other the suspicious high-risk users that association therewith be present.Can be accurate in time Suspected target really is locked, and corresponding alarm information is sent to monitor supervision platform, and the jelly of further batch can be taken Knot or cleaning, realize real-time Auto-Sensing and limit the account for being likely to be used for network fraud case, detectd so as to improve Efficiency is surveyed, reduces the risk of network trading.
The embodiment of the present invention also provides a kind of monitoring system being used in line service, as shown in Figure 3, in the system At least it is configured with case analysis server:Data extraction module, data analysis module and management and control module;
The data extraction module, for inquiring about data source according to the identification information of targeted customer, and from the data source The business information associated with the identification information of the targeted customer is read, the identification information comprises at least:The targeted customer Account information and/or account coding, the data source comprises at least:Online transaction platform and membership management system, the industry Business information comprises at least:Sequence information, payment information and logistics information, and/or the business information comprise at least:Device-fingerprint Information, member registration information and member's attribute information;
The data analysis module, for the use of incidence relation with the targeted customer by feature templates inquiry be present Family, feature templates correspond to the operation system where the targeted customer;
The management and control module, for for sending alarm with user that the targeted customer has incidence relation.
In the present embodiment, the data extraction module, it is additionally operable to receive the case mark that the monitor supervision platform is sent, and The data of the case mark sensing are read from the online transaction platform;And the extracting data pointed to from case mark The identification information of the targeted customer;
The data extraction module, and be specifically used for:According to the identification information of the targeted customer, from the online transaction Platform reads sequence information, payment information and the logistics information under account pointed by the identification information of the targeted customer;With/ Or, the identification information according to the targeted customer, from the identification information institute of the membership management system reading targeted customer Point to device-fingerprint information, member registration information and the member's attribute information under account;
The data analysis module, specifically for determining that the business that the identification information for generating the targeted customer associates is believed The operation system of breath, and feature templates corresponding to the operation system are inquired about from feature templates storehouse;And according to the character modules Plate, from the identification information and business information of user to be identified, extract the characteristic of the user to be identified;Detect again described Whether the data division specified is deposited in the characteristic of user to be identified identical with the characteristic of the targeted customer, if Then it is determined as the user that incidence relation with the targeted customer be present;
Wherein, whether deposited in the characteristic of the detection user to be identified the data division specified with the mesh It is identical to mark the characteristic of user, including:The reserved name of the user to be identified is detected whether with the targeted customer's It is identical;And/or whether the reserved communication number of the detection user to be identified is identical with the targeted customer;And/or Whether the reserved address for detecting the user to be identified is identical with the targeted customer;And/or wait to know described in detection Whether the IP address information during registration of other user is identical with the targeted customer;And/or the detection user to be identified Whether period during registration is identical with the targeted customer.
In the present embodiment, the management and control module, it is additionally operable to incidence relation be present with the targeted customer according to described The identification information of user, obtain in each operation system, for the user that incidence relation with the targeted customer be present The business information generated, and sent to the monitor supervision platform;And/or incidence relation be present with the targeted customer by described The identification information of user be added to blacklist.
The monitoring system in line service that the present embodiment provides, the class social activity/IP built by using multiple data sources The networks such as location/phone number/geography information, the user of incidence relation with the targeted customer by feature templates inquiry be present, So as to the association between fast positioning fraud account, it is achieved thereby that being set by the IP address during transaction of targeted customer, machine The business information such as standby fingerprint, phone number, ship-to, reverse-locate other the suspicious high-risk users that association therewith be present.Energy It is enough timely and accurately to lock suspected target, and corresponding alarm information is sent to monitor supervision platform, and can take further Batch freezes or cleared up, and realizes real-time Auto-Sensing and limits the account for being likely to be used for network fraud case, so as to Detecting efficiency is improved, reduces the risk of network trading.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for equipment For applying example, because it is substantially similar to embodiment of the method, so describing fairly simple, related part is referring to embodiment of the method Part explanation.The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited to This, any one skilled in the art the invention discloses technical scope in, the change that can readily occur in or replace Change, should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claim Enclose and be defined.

Claims (13)

  1. A kind of 1. monitoring method being used in line service, it is characterised in that including:
    Data source is inquired about according to the identification information of targeted customer, and the identification read from the data source with the targeted customer is believed The business information of association is ceased, the identification information comprises at least:Account information and/or the account coding of the targeted customer, institute Business information is stated to comprise at least:Sequence information, payment information and logistics information, and/or the business information comprise at least:Equipment Finger print information, member registration information and member's attribute information;
    The user of incidence relation with the targeted customer by feature templates inquiry be present, feature templates correspond to the targeted customer The operation system at place;
    For sending alarm with user that the targeted customer has incidence relation.
  2. 2. according to the method for claim 1, it is characterised in that also include:
    The case mark that the monitor supervision platform is sent is received, and reads what the case mark was pointed to from the online transaction platform Data;
    The identification information of targeted customer described in the extracting data pointed to from case mark.
  3. 3. method according to claim 1 or 2, it is characterised in that described that number is inquired about according to the identification information of targeted customer According to source, and the business information associated with the identification information of the targeted customer is read from the data source, including:
    According to the identification information of the targeted customer, from the identification information institute of the online transaction platform reading targeted customer Point to sequence information, payment information and the logistics information under account;
    And/or the identification information according to the targeted customer, from the identification of the membership management system reading targeted customer Device-fingerprint information, member registration information and member's attribute information under account pointed by information.
  4. 4. method according to claim 1 or 2, it is characterised in that described to be used by feature templates inquiry with the target The user of incidence relation be present in family, including:
    It is determined that the operation system of the business information of the identification information association of the targeted customer is generated, and from feature templates storehouse Inquire about feature templates corresponding to the operation system;
    According to the feature templates, from the identification information and business information of user to be identified, extract the user's to be identified Characteristic;
    According to the characteristic and the matching degree of the feature templates, detect whether the user to be identified is described and institute State the user that targeted customer has incidence relation.
  5. 5. according to the method for claim 4, it is characterised in that it is described according to the feature templates, from user's to be identified In identification information and business information, the characteristic of the user to be identified is extracted, including:
    The information type pointed by the feature templates is read, the pointed information type comprises at least:Contact information, note Volume address information and hour of log-on information;
    From the identification information and business information of user to be identified, extraction meets the information conduct of the pointed information type The characteristic of the user to be identified.
  6. 6. according to the method for claim 4, it is characterised in that described according to the characteristic and the feature templates Matching degree, detect whether the user to be identified is the user that incidence relation with the targeted customer be present, including:
    Detect and the data division specified whether is deposited in the characteristic of the user to be identified in the feature with the targeted customer Data are identical, if being then determined as the user that incidence relation with the targeted customer be present.
  7. 7. according to the method for claim 6, it is characterised in that be in the characteristic of the detection user to be identified The no data division specified deposited identical with the characteristic of the targeted customer, including:
    Whether the reserved name for detecting the user to be identified is identical with the targeted customer;
    And/or whether the reserved communication number of the detection user to be identified is identical with the targeted customer;
    And/or whether the reserved address of the detection user to be identified is identical with the targeted customer;
    And/or the detection user to be identified registration when I P addresses information it is whether identical with the targeted customer;
    And/or the detection user to be identified registration when period it is whether identical with the targeted customer.
  8. 8. according to the method for claim 4, it is characterised in that also include:
    In the data for reading that the case mark is pointed to from the online transaction platform, the transaction layer data of each operation system is extracted With account layer data, the transaction layer data include:Exchange hour information, transaction attribution ground distributed intelligence, payment terminal type Information and channel of disbursement information, the account layer data include:Registered address information, hour of log-on information, registration channel information, User type information, registration terminal distributed intelligence and member's characteristic information;
    To each information type in the transaction layer data and the account layer data, counted according to case-involving frequency, and really Information type corresponding to fixed each operation system pointed by feature templates.
  9. 9. according to the method for claim 1, it is characterised in that also include:
    According to the identification information of the user that incidence relation with the targeted customer be present, obtain in each operation system, For the business information that the user of incidence relation with the targeted customer be present and generated, and sent out to the monitor supervision platform Send;
    And/or the identification information of the user that incidence relation be present with the targeted customer is added to blacklist.
  10. 10. according to the method for claim 9, it is characterised in that also include:
    Please when detecting that at least one operation system receives transaction transmitted by the user of the identification information in the blacklist When asking, the transaction request is intercepted;
    The user feedback prompting message of identification information into the blacklist, the prompting message include for prompting again Perform the information of account verification process;
    And state new information is sent to the membership management system, the state new information is used to trigger the member management The account state of the user of identification information in the blacklist is updated to " not verifying " by system.
  11. 11. a kind of monitoring system being used in line service, it is characterised in that on the case analysis server in the system at least It is configured with:Data extraction module, data analysis module and management and control module;
    The data extraction module, for inquiring about data source according to the identification information of targeted customer, and read from the data source The business information associated with the identification information of the targeted customer, the identification information comprise at least:The account of the targeted customer Number information and/or account coding, the business information comprise at least:Sequence information, payment information and logistics information, and/or institute Business information is stated to comprise at least:Device-fingerprint information, member registration information and member's attribute information;
    The data analysis module, it is special for the user of incidence relation with the targeted customer by feature templates inquiry be present Sign template corresponds to the operation system where the targeted customer;
    The management and control module, for for sending alarm with user that the targeted customer has incidence relation.
  12. 12. system according to claim 11, it is characterised in that the data extraction module, be additionally operable to receive the prison Control the case mark that platform is sent, and the data pointed to from the online transaction platform reading case mark;And from described The identification information of targeted customer described in the extracting data that case mark is pointed to;
    The data extraction module, and be specifically used for:According to the identification information of the targeted customer, from the online transaction platform Read sequence information, payment information and the logistics information under account pointed by the identification information of the targeted customer;And/or root According to the identification information of the targeted customer, account pointed by the identification information of the targeted customer is read from the membership management system Device-fingerprint information, member registration information and member's attribute information under number;
    The data analysis module, the business information associated specifically for determining the identification information for generating the targeted customer Operation system, and feature templates corresponding to the operation system are inquired about from feature templates storehouse;And according to the feature templates, from In the identification information and business information of user to be identified, the characteristic of the user to be identified is extracted;Wait to know described in detecting again Whether the data division specified is deposited in the characteristic of other user identical with the characteristic of the targeted customer, if then sentencing It is set to the user that incidence relation with the targeted customer be present;
    Wherein, the data division specified whether is deposited in the characteristic of the detection user to be identified to use with the target The characteristic at family is identical, including:Whether the reserved name for detecting the user to be identified is identical with the targeted customer; And/or whether the reserved communication number of the detection user to be identified is identical with the targeted customer;And/or detection institute Whether the reserved address for stating user to be identified is identical with the targeted customer;And/or the detection user to be identified Registration when I P addresses information it is whether identical with the targeted customer;And/or the registration of the detection user to be identified When period it is whether identical with the targeted customer.
  13. 13. the system according to claim 11 or 12, it is characterised in that the management and control module, be additionally operable to according to it is described with Be present the identification information of the user of incidence relation in the targeted customer, obtain in each operation system, for it is described with it is described Be present the business information that the user of incidence relation is generated in targeted customer, and sent to the monitor supervision platform;And/or by described in Blacklist is added to identification information that the targeted customer has the user of incidence relation.
CN201610799529.3A 2016-08-31 2016-08-31 Monitoring method and system for online service Active CN107798541B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610799529.3A CN107798541B (en) 2016-08-31 2016-08-31 Monitoring method and system for online service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610799529.3A CN107798541B (en) 2016-08-31 2016-08-31 Monitoring method and system for online service

Publications (2)

Publication Number Publication Date
CN107798541A true CN107798541A (en) 2018-03-13
CN107798541B CN107798541B (en) 2021-12-07

Family

ID=61529665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610799529.3A Active CN107798541B (en) 2016-08-31 2016-08-31 Monitoring method and system for online service

Country Status (1)

Country Link
CN (1) CN107798541B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108494796A (en) * 2018-04-11 2018-09-04 广州虎牙信息科技有限公司 Method for managing black list, device, equipment and storage medium
CN109377233A (en) * 2018-09-10 2019-02-22 阿里巴巴集团控股有限公司 A kind of risk monitoring method and device
CN109600250A (en) * 2018-09-29 2019-04-09 中国平安人寿保险股份有限公司 Operation system failure notification method, device, electronic device and storage medium
CN110322573A (en) * 2018-03-30 2019-10-11 北京红马传媒文化发展有限公司 User authentication method, user authentication device and electronic equipment
CN110378707A (en) * 2019-07-24 2019-10-25 北京慧眼智行科技有限公司 A kind of information processing method and device
CN111666346A (en) * 2019-03-06 2020-09-15 京东数字科技控股有限公司 Information merging method, transaction query method, device, computer and storage medium
CN111931048A (en) * 2020-07-31 2020-11-13 平安科技(深圳)有限公司 Artificial intelligence-based black product account detection method and related device
CN112070225A (en) * 2020-09-01 2020-12-11 多点(深圳)数字科技有限公司 Entity card abnormal binding alarm method based on unsupervised learning
CN112711623A (en) * 2020-12-22 2021-04-27 青岛海尔科技有限公司 Data pull-through method and device, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835014A (en) * 2006-03-28 2006-09-20 阿里巴巴公司 Method and system of monitoring on-line service risk
CN102194177A (en) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 System for risk control over online payment
US20110231305A1 (en) * 2010-03-19 2011-09-22 Visa U.S.A. Inc. Systems and Methods to Identify Spending Patterns
WO2015120420A2 (en) * 2014-02-07 2015-08-13 Steelman Walter Financial transaction system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835014A (en) * 2006-03-28 2006-09-20 阿里巴巴公司 Method and system of monitoring on-line service risk
US20110231305A1 (en) * 2010-03-19 2011-09-22 Visa U.S.A. Inc. Systems and Methods to Identify Spending Patterns
CN102194177A (en) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 System for risk control over online payment
WO2015120420A2 (en) * 2014-02-07 2015-08-13 Steelman Walter Financial transaction system and method

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110322573A (en) * 2018-03-30 2019-10-11 北京红马传媒文化发展有限公司 User authentication method, user authentication device and electronic equipment
CN108494796A (en) * 2018-04-11 2018-09-04 广州虎牙信息科技有限公司 Method for managing black list, device, equipment and storage medium
CN109377233A (en) * 2018-09-10 2019-02-22 阿里巴巴集团控股有限公司 A kind of risk monitoring method and device
CN109377233B (en) * 2018-09-10 2021-06-04 创新先进技术有限公司 Risk monitoring method and device
CN109600250A (en) * 2018-09-29 2019-04-09 中国平安人寿保险股份有限公司 Operation system failure notification method, device, electronic device and storage medium
CN109600250B (en) * 2018-09-29 2023-07-18 中国平安人寿保险股份有限公司 Service system fault notification method, device, electronic device and storage medium
CN111666346A (en) * 2019-03-06 2020-09-15 京东数字科技控股有限公司 Information merging method, transaction query method, device, computer and storage medium
CN110378707A (en) * 2019-07-24 2019-10-25 北京慧眼智行科技有限公司 A kind of information processing method and device
CN111931048A (en) * 2020-07-31 2020-11-13 平安科技(深圳)有限公司 Artificial intelligence-based black product account detection method and related device
CN112070225A (en) * 2020-09-01 2020-12-11 多点(深圳)数字科技有限公司 Entity card abnormal binding alarm method based on unsupervised learning
CN112070225B (en) * 2020-09-01 2023-10-10 多点(深圳)数字科技有限公司 Entity card abnormal binding alarm method based on unsupervised learning
CN112711623A (en) * 2020-12-22 2021-04-27 青岛海尔科技有限公司 Data pull-through method and device, storage medium and electronic device

Also Published As

Publication number Publication date
CN107798541B (en) 2021-12-07

Similar Documents

Publication Publication Date Title
CN107798541A (en) A kind of monitoring method and system being used in line service
CN103875015B (en) Gathered using the multiple-factor identity fingerprint of user behavior
CN107563754B (en) Block chain-based crown word number information storage and verification method
CN106530078A (en) Loan risk early warning method and system based on multi-industry data
US7958032B2 (en) Generating event messages corresponding to event indicators
CN107636662A (en) Web content certification
CN107103087A (en) Block chain big data analysis of market conditions system
CN109214617A (en) A kind of internet financial risks qualitative assessment auditing system
US20140067656A1 (en) Method and system for fraud risk estimation based on social media information
CN104717073A (en) Personal information sharing, personal information sharing method and identity authentication method
CN104573995A (en) Crowdsourcing task release and execution methods and devices
CN101470887A (en) Credit early-warning system and method
CN106779278A (en) The evaluation system of assets information and its treating method and apparatus of information
CN110766384A (en) Method for tracking digital currency flow direction in block chain
CN112200660B (en) Bank counter business supervision method, device and equipment
CN111915468A (en) Novel anti-fraud active inspection and early warning system for network
CN103871155A (en) Method for building currency number information database to improve currency circulation security
CN109598425A (en) The method, device and equipment that a kind of pair of risk subjects are managed
CN108346088A (en) Brand official store malice panic buying preventing control method and system
CN107944963A (en) A kind of shared e-commerce system based on technology of Internet of things
CN108629543A (en) Logistic information systems based on block chain and Internet of Things
KR102259838B1 (en) Apparatus and method for building a blacklist of cryptocurrencies
CN112330412B (en) Product recommendation method and device, computer equipment and storage medium
CN109146452A (en) A kind of Internet of Things cost management method and system based on block chain
CN113327161A (en) Intelligent wind control decision system for credit business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 210000, 1-5 story, Jinshan building, 8 Shanxi Road, Nanjing, Jiangsu.

Applicant after: SUNING.COM Co.,Ltd.

Address before: 210042 Suning Headquarters, No. 1 Suning Avenue, Xuanwu District, Nanjing City, Jiangsu Province

Applicant before: SUNING COMMERCE GROUP Co.,Ltd.

CB02 Change of applicant information
TA01 Transfer of patent application right

Effective date of registration: 20210802

Address after: Room 834, Yingying building, 99 Tuanjie Road, yanchuangyuan, Jiangbei new district, Nanjing, Jiangsu 210000

Applicant after: Nanjing Xingyun Digital Technology Co.,Ltd.

Address before: 210000, 1-5 story, Jinshan building, 8 Shanxi Road, Nanjing, Jiangsu.

Applicant before: SUNING.COM Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant