CN110148000A - A kind of security management and control system and method applied to payment platform - Google Patents

A kind of security management and control system and method applied to payment platform Download PDF

Info

Publication number
CN110148000A
CN110148000A CN201910309707.3A CN201910309707A CN110148000A CN 110148000 A CN110148000 A CN 110148000A CN 201910309707 A CN201910309707 A CN 201910309707A CN 110148000 A CN110148000 A CN 110148000A
Authority
CN
China
Prior art keywords
risk
trade company
information
detection model
trade
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910309707.3A
Other languages
Chinese (zh)
Inventor
刘昕纯
杨路燕
李洁
冯力国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910309707.3A priority Critical patent/CN110148000A/en
Publication of CN110148000A publication Critical patent/CN110148000A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This specification provides a kind of security management and control system and method applied to payment platform, the security management and control system includes at least and enters risk supervision module, the access model of the trade company pre-established, the risk score for the material computation trade company submitted when trade company enters platform by trade company, so as to can correspond to after corresponding service provider, trade company receives the risk score and take the different pre- precautionary measures.The energize security management and control of product of safety is extended to complete period link by this programme, and possible money damage is reduced while enhancing the control to trade company's risk.

Description

A kind of security management and control system and method applied to payment platform
Technical field
This specification is related to internet area more particularly to a kind of security management and control system and side applied to payment platform Method.
Background technique
Under the whole business model of current major payment platform (such as Alipay), service provider opens up in the trade company of payment platform Main function is played during exhibition, payment platform generally includes the multiple service providers being connected directly with platform, and by servicing What quotient expanded, the multiple trade companies being indirectly connected with platform.These trade companies can be considered the subordinate trade company of service provider, by service provider Trade company is directly managed, payment platform can open or closed trade company related payment function.
In order to realize the security management and control to trade company, payment platform would generally carry safe product of energizing, and in traditional scheme In, risk management and control is only capable of covering subsequent link, i.e. current safety energizes product substantially only to service provider's push risk trade And risk trade company, and these pushed informations belong to the risk having occurred and that, have generated certain money damage to service provider or Alipay, push away Function is sent only to play the control action to supervention risk.Fail to set up perfect combining with service provider well and controls mode altogether.
Summary of the invention
In view of the above technical problems, this specification embodiment provide a kind of security control method applied to payment platform and Device, technical solution are as follows:
According to this specification embodiment in a first aspect, providing a kind of security management and control system applied to payment platform, institute Stating includes multiple service providers in payment platform, multiple subordinate trade companies with the service provider, and the security management and control system is at least wrapped It includes and enters risk supervision module,
The risk supervision module of entering is used for:
Check information is extracted in information in entering for trade company's submission, the check information is preset for examining Trade company enters the specific information of risk;
Obtain training in advance enters detection model group, and described enter includes several different entering inspection in detection model group Survey model, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of which by trade company of detection model The characteristic training of classification forms;
Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output In different classes of risk score;
The different classes of risk score is weighted, enters risk for what calculated result was determined as trade company Value.
According to the second aspect of this specification embodiment, a kind of security control method applied to payment platform, institute are provided Stating includes multiple service providers in payment platform, multiple subordinate trade companies with the service provider, and the security control method includes:
Check information is extracted in information in entering for trade company's submission, the check information is preset for examining Trade company enters the specific information of risk;
Obtain training in advance enters detection model group, and described enter includes several different entering inspection in detection model group Survey model, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of which by trade company of detection model The characteristic training of classification forms;
Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output In different classes of risk score;
The different classes of risk score is weighted, enters risk for what calculated result was determined as trade company Value.
According to the third aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit Store up the computer program that can be run on a memory and on a processor, wherein the processor is realized when executing described program A kind of security control method applied to payment platform, this method comprises:
Check information is extracted in information in entering for trade company's submission, the check information is preset for examining Trade company enters the specific information of risk;
Obtain training in advance enters detection model group, and described enter includes several different entering inspection in detection model group Survey model, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of which by trade company of detection model The characteristic training of classification forms;
Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output In different classes of risk score;
The different classes of risk score is weighted, enters risk for what calculated result was determined as trade company Value.
Technical solution provided by this specification embodiment, the access model of the trade company pre-established, is entered flat in trade company The risk score for the material computation trade company submitted when platform by trade company, so that corresponding service provider, trade company receives the risk score Afterwards, it can correspond to and take the different pre- precautionary measures.The energize security management and control of product of safety is extended to complete period link by this programme, Possible money is reduced while enhancing the control to trade company's risk to damage.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not This specification embodiment can be limited.
In addition, any embodiment in this specification embodiment does not need to reach above-mentioned whole effects.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification embodiment for those of ordinary skill in the art can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is that the trade company of the security management and control system shown in one exemplary embodiment of this specification enters one kind of risk supervision Flow chart;
Fig. 2 is that building for the security management and control system shown in one exemplary embodiment of this specification enters the one of detection model group Kind flow chart;
Fig. 3 is one kind of the real-time risk supervision of trade company of the security management and control system shown in one exemplary embodiment of this specification Flow chart;
Fig. 4 is a kind of schematic diagram of the security management and control system shown in one exemplary embodiment of this specification;
Fig. 5 is a kind of structural schematic diagram of computer equipment shown in one exemplary embodiment of this specification.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... " or " in response to determination ".
Under the whole business model of current major payment platform (such as Alipay), service provider opens up in the trade company of payment platform Main function is played during exhibition, payment platform generally includes the multiple service providers being connected directly with platform, and by servicing What quotient expanded, the multiple trade companies being indirectly connected with platform.These trade companies can be considered the subordinate trade company of service provider, by service provider Trade company is directly managed, payment platform can open or closed trade company related payment function.
In order to realize the security management and control to trade company, payment platform would generally carry safety and energize that (for example Alipay is flat for product The RiskGo of platform), and in traditional scheme, risk management and control is only capable of covering subsequent link, i.e. current safety product of energizing is basic Risk trade and risk trade company only are pushed to service provider, and these pushed informations belong to the risk having occurred and that, to service Quotient or Alipay generate certain money damage, and push function only plays the control action to supervention risk.Fail well with service provider It sets up perfect joint and controls mode altogether.
In view of the above problems, this specification embodiment provides a kind of security management and control system applied to payment platform, the peace Full managing and control system can realize the risk prevention system to trade company's Life cycle, and specifically, the risk to trade company's Life cycle is anti- Control can be divided into risk supervision of entering to trade company, trade company enter after real-time risk supervision and risk joint defence intelligence build three ranks Section.The prevention and control scheme in each stage is specifically described separately below.
For trade company when entering the prevention and control stage and betiding trade company and enter payment platform, it is flat that security is equipped on payment Platform carries out entering detection to trade company is entered, and shown in Figure 1, this is entered, and detection method includes the following steps:
S101 extracts check information in entering for trade company's submission in information, the check information is preset use In the specific information for examining trade company to enter risk;
Specifically, which may include the operation qualification information of trade company, shops's address information, industry letter Breath, door head photographic intelligence expand the information such as small two qualifications information.
Wherein, small two channels that new trade company is expanded for service provider are expanded, it is also likely to be enterprise that expansion small two, which may be individual, Small two qualifications information is expanded to refer to expanding small two identity card/business license, bank card information etc..
These message parts are usually the text information that trade company directly submits, and are partially the letters that trade company is submitted with graphic form Therefore breath when carrying out information extraction, can carry out Text Feature Extraction in the merchant information for the textual form that trade company submits, to obtain Shops's address information, trade information and the expansion channel qualification information of user;To the certificate information for the graphic form that trade company submits Image recognition is carried out, the certificate information is resolved to the operation qualification information and door head photographic intelligence of textual form.Finally will The information that the Text Feature Extraction and image recognition obtain is determined as the check information of trade company.
For example, trade company needs to upload the door head photo of itself, business license picture when entering, status of a legal person demonstrate,proves picture, Bank card picture etc. image recognition technology (such as OCR identification technology) can be used to know these pictures in this step Not, to parse picture and extract the text information to be used in picture.
Further, image recognition technology can be used to differentiate one step ahead whether there is PS trace in the picture of trade company's upload, Whether it is synthesis or forges picture etc., if picture there are problem, first termination process and can notifies trade company to upload correlation again Data.
S102, obtain training in advance enters detection model group, and described enter in detection model group includes several different Enter detection model, wherein the characteristic of trade company is divided into several classifications, each enters its corresponding by trade company of detection model A kind of characteristic training of middle classification forms;
For example, entering for training in advance includes address authenticity detection model, qualification authenticity in detection model group Detection model, industry authenticity detection model and transaction authenticity detection model are respectively used to the different above-mentioned different types of detection Merchant information really degree.
S103 will enter detection model group described in check information input, obtain different detection models of entering and export Trade company in different classes of risk score;
Specifically, the corresponding informance in the check information can be inputted respectively to address authenticity risk meter trained in advance It calculates in model, qualification authenticity risk computation model, industry authenticity risk computation model and transaction authenticity risk model, connects Receive the different classes of risk score that the different risk models export respectively.
S104, the different classes of risk score is weighted, and calculated result is determined as entering for trade company Value-at-risk.
It in practical applications, can be that different classes of risk sets weight, such as setting trade company according to practical application scene Qualification authenticity weight be 0.3, set the address authenticity weight of trade company as 0.2, the setting of weight can be by user according to not Significance level self-defining of the generic risk in current application scene.
Further, by calculated result be determined as trade company enter value-at-risk after, the value-at-risk of entering can be pushed to The affiliated service provider of the trade company, so that the service provider utilizes the calculated result to the trade company using corresponding further Audit policy.
For example: when trade company enters, the service provider for expanding the trade company, which can call, enters value-at-risk to this Preliminary audit is done by trade company, and can further be judged according to risk situation this trade company or not blacklist, whether gambler, be Lao Lai, either with or without other shops were opened, opened shop operation history how etc.. alternatively, service provider can basis This is entered value-at-risk and determines whether to give trade company some equity, such as, if it needs to provide some new persons for this new trade company Red packet, equipment are preferential etc..
It is above-mentioned enter detection method and apply one kind enter detection model group, which can With reference to Fig. 2, comprising the following steps:
S201, obtain black and white sample data, the black sample data be there are historical risk transaction merchant data, it is described White sample data is that there is no the merchant datas that historical risk is traded;
In the sample collection stage, can be judged in the historical trading generated after trade company enters payment platform.It will go through The trade company of history risk trade is determined as black sample trade company, and historical risk transaction specifically may include risk of fraud transaction, wind of gambling Danger transaction, wash sale, arbitrage risk trade etc., or determine whether trade company holder had falseness to run a shop identification record.When Trade company can be determined as black by the severity or frequent degree that above-mentioned behavior and behavior occurred for trade company more than after preset threshold Sample trade company.
Generally, payment platform can determine white sample according to user in the value of the daily behavior evaluation user of payment platform When this trade company, in addition to select there is no other than the trade company of historical risk transaction, can also consider simultaneously trade company in the value of payment platform, Further select high-value user as white sample of users.
S202, determines several characteristic data sets of trade company, and each characteristic data set is for characterizing the trade company wherein one The other trade company's feature of type;
Since the model enters detection for trade company, generally, need to use merchant identification feature, management stability Feature, the feature of address stable feature these three types remove building physical examination sub-model.In realistic model building, the specific spy that uses Sign classification generally comprises: this four major class of address feature, industrial characteristic, qualification feature, operator's feature.
For example, address feature can include: the address LBS confidence level, address commercial circle value, if produce black concentration in black The features such as address range;Industrial characteristic can include: the average daily exchange hand of industry, the features such as Industry risk concentration;Qualification feature can wrap It includes: trade company's data-integrity, industrial and commercial data authenticity, the features such as qualification risk history (whether in blacklist);Operator Feature can include: the entrepreneur aptitude authenticity of trade company, the features such as operator's historical account behavior.
S203 is built into group in detection model with the different characteristic data set using the black and white sample data respectively In difference enter detection model.
Detection model is entered by the different classes of feature construction of trade company, so that the different classes of model constructed Trade company can be detected respectively in address, industry, the different classes of risk such as qualification.
Further, in order to enable security management and control system to accomplish externally to energize, security management and control system can be directed to different clothes Business quotient is provided with the model of adaptability.
Specifically, it can receive the supplement black and white sample data that service provider uploads, which is service provider The black sample trade company and white sample trade company defined according to own service scene;
After the supplement black and white sample data for receiving service provider's upload, it is based on transfer learning algorithm, it is black using the supplement Detection model is entered described in white sample data training, so that the detection model of entering completes business where adapting to the service provider The iteration of scene.
For example: since service provider has oneself exclusive business scenario, such as trade company's access mark of different service providers Standard might have difference, and trade company's management of different service providers can also have any different.The sample that can be provided by service provider, model is done Corresponding adaptation;Such as there are 900 notable features in the model remittance of master, but can find according to the black and white label that service provider provides Wherein 200 features are inapparent, not high for the accuracy of sample.Therefore it needs to this 200 feature transfer learnings Algorithm realize adjustment, this adjustment is single needle to some service provider, be not it is general, when this service provider carries out quotient When entering detection of family, the result that product returns will export to make the model after transfer learning as a result, rather than universal model Detection point.The purpose of overall transfer learning is the business scenario in order to allow model result to be more bonded service provider.
Security management and control system is described below for having entered the real-time risk checking method of trade company, shown in Figure 3, the reality When risk checking method the following steps are included:
S301 is institute using risk trade model trained in advance for any real-time deal information for entering trade company Transaction marking is stated, calculated risk score value is recorded in the merchant data for generating the transaction;
S302 enters trade company for any, according to the risk trade stroke count that trade company described in current slot generates, calculates The current risk concentration of the trade company out;
S303 divides threshold value according to predefined level and determines the corresponding risk level of the risk concentration, according to described The corresponding predefined processing strategie of risk level, carries out at different degrees of risk the trade company and its affiliated service provider respectively Reason is pushed with information.
For example, payment platform, there are mass data, each data can be a feature of detection model, in advance First trained risk trade model may include gambling model, cheat model, and arbitrage model usurps model etc., these models It is respectively used to calculate the gambling model point of a real-time deal, fraud model point, arbitrage model point, usurps model point etc. individually Model point.For example, being directed to Transaction Identification Number 12345678, divided by the fraud 98 that different models calculate the transaction, gambled 23 points, Arbitrage 20 divides, and usurps 15 points ... and can be determined that this transaction is a gaming transactions.
Trade company, which generates each real-time deal, to carry out a risk judgment by model, later according to these transaction to this Comprehensive descision does again in a trade company.Such as trade company A had 1000 transactions in one month, in this 1000 transaction, there is 200 gamblings Rich transaction, 15 pens cap are now traded, 10 fraudulent tradings ..., then the overall risk rate that can calculate this trade company A is 22.5%, And the relative risk of deep bid is generally 0.0001%, and this trade company is exactly a high-risk trade company, such as trade company B, in one month, There are 100000 transactions, in this 100000 transaction, produces 1 gaming transactions, this trade company B relative risk is exactly 0.00001%, it is lower than deep bid average value, then cannot trades because of single risky and determine that this trade company B is risky.
It can be that trade company delimit risk layer according to the risk concentration and scheduled threshold value after determining the risk concentration of trade company Grade carries out risk push by api interface or web-page interface, and for service provider, risk information push may include under it Each trade company expands the overview of channel, such as channel A this week total expansion trade company 10 of service provider, including 7 falsenesses Trade company can expand channel to it convenient for service provider and carry out control
For Jian Lian trade company, can federated service quotient layering control is carried out to trade company.For example, by risk level point It is three layers, for the trade company of high danger, payment platform can directly close its obligation authority, and its described service by result notice The medium information for punishing trade company is back to payment platform by service provider by quotient, is intercepted for subsequent access, realizes that data are closed Ring;For high-risk trade company, risk information can be pushed to its affiliated service provider, service provider is reminded to be punished, and punishment is tied Fruit notifies payment platform;For Zhong Wei trade company, which can be added to monitoring library and notify its affiliated service provider, when subsequent trade company It can timely early warning when being abnormal.
It is worth noting that threshold value can be when being that trade company delimit risk level according to risk concentration and scheduled threshold value Dynamic value can adjust threshold value according to situations such as overall risk instantly, promoting activities in real time.
It continues with and introduces the risk joint defence intelligence of security management and control system and build and safety product method for running:
Aspect is built in risk joint defence intelligence, it is generally the case that the comparatively safe consciousness of service provider is all not comprehensive enough, technology Resource is also more weak, and the initiative that can not play itself goes to carry out safety precaution, will not actively and the data of payment platform It is shared.It needs safety combination business development.Different additional policies can be formulated for service provider.When service provider risk and When data sharing performance meets different preset conditions, then corresponding additional policy is executed.
For example, data back rate is promoted to certain threshold value, we will when service provider's relative risk drops to certain threshold value It provides flower gathering amount for it to be promoted, net quotient borrows the equity of the channel of disbursement such as small micro- loan.The same of interests is brought for service provider When, also there is facilitation to business growth under payment platform line.Introduce the concept of safety+channel equity.
In terms of safety product operation, product exposing has vital effect for safe ecology of building together, and needs for not Recommend different safety products with client intelligent, the ability of ecosystem construction could be improved.Specifically, Products Show can be established Model is different classes of client intelligent recommended products.
(1) sample collection: history accesses all clients of security management and control system, is learning sample;Full dose payment platform Affiliate is that potential customers recommend sample.
(2) variable is portrayed: by trade company's attribute of learning sample, industry attribute, and transaction attribute sum up clustering variable Feature;Again from full dose payment platform affiliate, similar client is made into classification.
Wherein, trade company's attribute: may include whether for it is direct-connected/connect, whether be big trade company, enterprise, with the presence or absence of marketing field Scape, platform product whether withdraw deposit scene, whether have system of account etc.;Industry attribute: may include whether for shared rental service, Whether it is catering industry, whether has enterprise's credit function etc.;Transaction attribute: may include average daily the transaction scale of construction/amount of money, wash sale Accounting, risk trade accounting, gambling buyer's concentration, cheating buyer's concentration, public sentiment risk trade situation etc..
(3) collaborative filtering (item-based collaborative filtering) and base model training: are used Recommend (rule-based recommentdation) to be trained sample in rule, and melts finally by two model results It closes, suggested design of surviving.Model recommendation can synchronize insertion security management and control system portal, payment platform portal etc., when client steps on After recording the page, that is, produces and recommend using with the combination product of this client.
For example: client A, no expansion merchant business, that Products Show will be managed only comprising real-time risk trade company;Client B, main business are to expand client, but have no self-service signing, are small two to expand to shop, that is entered to reject in physical examination point and demonstrate,prove According to identification, door head according to functions such as PS audits, carry out easy enters verification Products Show.Client C expands trade company and mainly passes through Self-service channel, that enters physical examination point, will identify comprising OCR license, door head is identified according to PS, trade company's authenticity verification, risk trade Deng, carry out compound version enter verification product recommendation.
With reference to Fig. 4, from being described above as can be seen that security management and control system can be divided into and enter risk supervision module, real-time wind Dangerous detection module and risk joint defence intelligence build module, respectively correspond the risk supervision of entering of trade company, trade company enter after it is real-time Risk supervision and risk joint defence intelligence build these three security management and control stages, it can be achieved that a trade company from enter payment platform to Exit the security management and control of payment platform Life cycle.
Trade company A is illustrated, when entering platform, since running a shop for trade company A has stable and big transaction of trading in history Amount, then and then entering value-at-risk judgement by detection is mono- good trade company of health of trade company A, and then service provider allows him to enter Payment platform, and because entering testing result well is its free equipment, red packet etc..As time goes by, trade company A is hacked Induction is produced, starts to be related to gambling, is pushed in the risk information of service provider by the way that security management and control system is daily, service provider finds this It is high-risk trade company of gambling that it is qualitative, which to be paid for platform, for a trade company, then this risk trade company is freezed in time, termination of contract, and When stop loss, if the processing of service provider's risk is timely, his relative risk compared with other service providers will it is low if, security management and control system meeting The equity of some payment platforms is provided, such as is insured, is provided a loan, flower gathering amount is promoted etc., further motivate service provider's product Pole handles risk trade company.
This specification embodiment also provides a kind of computer equipment, includes at least memory, processor and is stored in On reservoir and the computer program that can run on a processor, wherein processor realized when executing described program aforementioned applications in The security control method of payment platform, the method include at least:
The risk supervision module of entering is used for:
Check information is extracted in information in entering for trade company's submission, the check information is preset for examining Trade company enters the specific information of risk;
Obtain training in advance enters detection model group, and described enter includes several different entering inspection in detection model group Survey model, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of which by trade company of detection model The characteristic training of classification forms;
Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output In different classes of risk score;
The different classes of risk score is weighted, enters risk for what calculated result was determined as trade company Value.
Fig. 5 shows one kind provided by this specification embodiment and more specifically calculates device hardware structural schematic diagram, The equipment may include: processor 1010, memory 1020, input/output interface 1030, communication interface 1040 and bus 1050.Wherein processor 1010, memory 1020, input/output interface 1030 and communication interface 1040 are real by bus 1050 The now communication connection inside equipment each other.
Processor 1010 can use general CPU (Central Processing Unit, central processing unit), micro- place Reason device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one Or the modes such as multiple integrated circuits are realized, for executing relative program, to realize technical side provided by this specification embodiment Case.
Memory 1020 can use ROM (Read Only Memory, read-only memory), RAM (Random Access Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 1020 can store Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware When, relevant program code is stored in memory 1020, and execution is called by processor 1010.
Input/output interface 1030 is for connecting input/output module, to realize information input and output.Input and output/ Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display, Loudspeaker, vibrator, indicator light etc..
Communication interface 1040 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly (such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 1050 include an access, equipment various components (such as processor 1010, memory 1020, input/it is defeated Outgoing interface 1030 and communication interface 1040) between transmit information.
It should be noted that although above equipment illustrates only processor 1010, memory 1020, input/output interface 1030, communication interface 1040 and bus 1050, but in the specific implementation process, which can also include realizing normal fortune Other assemblies necessary to row.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising real in above equipment Component necessary to existing this specification example scheme, without including all components shown in figure.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey Realize that the security control method above-mentioned applied to payment platform, the method include at least when sequence is executed by processor:
The risk supervision module of entering is used for:
Check information is extracted in information in entering for trade company's submission, the check information is preset for examining Trade company enters the specific information of risk;
Obtain training in advance enters detection model group, and described enter includes several different entering inspection in detection model group Survey model, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of which by trade company of detection model The characteristic training of classification forms;
Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output In different classes of risk score;
The different classes of risk score is weighted, enters risk for what calculated result was determined as trade company Value.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not In the case where making the creative labor, it can understand and implement.
As seen through the above description of the embodiments, those skilled in the art can be understood that this specification Embodiment can be realized by means of software and necessary general hardware platform.Based on this understanding, this specification is implemented Substantially the part that contributes to existing technology can be embodied in the form of software products the technical solution of example in other words, The computer software product can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are to make It is each to obtain computer equipment (can be personal computer, server or the network equipment etc.) execution this specification embodiment Method described in certain parts of a embodiment or embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of any several equipment.
The above is only the specific embodiment of this specification embodiment, it is noted that for the general of the art For logical technical staff, under the premise of not departing from this specification embodiment principle, several improvements and modifications can also be made, this A little improvements and modifications also should be regarded as the protection scope of this specification embodiment.

Claims (15)

  1. It include multiple service providers in the payment platform, with the clothes 1. a kind of security management and control system applied to payment platform Multiple subordinate trade companies of business quotient, the security management and control system include at least and enter risk supervision module,
    The risk supervision module of entering is used for:
    Check information is extracted in information in entering for trade company's submission, the check information is preset for examining trade company Enter the specific information of risk;
    Obtain training in advance enters detection model group, and described enter includes several different entering detection mould in detection model group Type, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of classification by trade company of detection model Characteristic training form;
    Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output not Generic risk score;
    The different classes of risk score is weighted, enters value-at-risk for what calculated result was determined as trade company.
  2. 2. security management and control system as described in claim 1, by calculated result be determined as trade company enter value-at-risk after, also wrap It includes:
    By the affiliated service provider for entering value-at-risk and being pushed to the trade company, so that the service provider utilizes the calculated result Corresponding further audit policy is used to the trade company.
  3. 3. security management and control system as described in claim 1, described that check information is extracted in information in entering for trade company's submission, Include:
    Text Feature Extraction is carried out in the merchant information for the textual form that trade company submits, to obtain shops's address information, the industry of user Information and expansion channel qualification information;
    Image recognition is carried out to the certificate information for the graphic form that trade company submits, the certificate information is resolved into textual form Manage qualification information and door head photographic intelligence;
    The information that the Text Feature Extraction and image recognition obtain is determined as to the check information of trade company.
  4. 4. security management and control system as described in claim 1, described to enter detection model group described in check information input, The different trade companies for entering detection model output is obtained in different classes of risk score, comprising:
    It is true that corresponding informance in the check information is inputted into address authenticity risk computation model trained in advance, qualification respectively In reality risk computation model, industry authenticity risk computation model and transaction authenticity risk model, the different wind are received The different classes of risk score that dangerous model exports respectively.
  5. 5. security management and control system as described in claim 1, the system also includes entering detection model group building module,
    The detection model group building module of entering is used for:
    Black and white sample data is obtained, the black sample data is that there are the merchant data of historical risk transaction, the white sample numbers According to for there is no the merchant datas that historical risk is traded;
    Determine that several characteristic data sets of trade company, each characteristic data set are used to characterize the quotient of trade company's one of which classification Family feature;
    Using the black and white sample data, the difference being built into group in detection model respectively with the different characteristic data set enters In detection model.
  6. 6. system as claimed in claim 5, described to enter detection model group building module, it is also used to:
    The supplement black and white sample data that service provider uploads is received, the supplement black and white sample data is service provider according to own service The black sample trade company and white sample trade company that scene defines;
    Based on transfer learning algorithm, enter detection model using described in supplement black and white sample data training so that it is described enter The iteration of business scenario where completion in detection model adapts to the service provider.
  7. 7. security management and control system as described in claim 1, the system also includes real-time risk supervision module,
    The real-time risk supervision module is used for:
    It the use of risk trade model trained is in advance that the transaction is beaten for any real-time deal information for entering trade company Point, calculated risk score value is recorded in the merchant data for generating the transaction;
    Trade company is entered for any, according to the risk trade stroke count that trade company described in current slot generates, calculates the quotient The current risk concentration at family;
    Threshold value is divided according to predefined level and determines the corresponding risk level of the risk concentration, according to the risk level pair The predefined processing strategie answered carries out risk processing to the trade company and affiliated service provider and pushes with information.
  8. It include multiple service providers in the payment platform, with the clothes 8. a kind of security control method applied to payment platform Multiple subordinate trade companies of business quotient, the security control method include:
    Check information is extracted in information in entering for trade company's submission, the check information is preset for examining trade company Enter the specific information of risk;
    Obtain training in advance enters detection model group, and described enter includes several different entering detection mould in detection model group Type, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of classification by trade company of detection model Characteristic training form;
    Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output not Generic risk score;
    The different classes of risk score is weighted, enters value-at-risk for what calculated result was determined as trade company.
  9. 9. security control method as claimed in claim 8, by calculated result be determined as trade company enter value-at-risk after, also wrap It includes:
    By the affiliated service provider for entering value-at-risk and being pushed to the trade company, so that the service provider utilizes the calculated result Corresponding further audit policy is used to the trade company.
  10. 10. security control method as claimed in claim 8, described to extract verification letter in entering in information for trade company's submission Breath, comprising:
    Text Feature Extraction is carried out in the merchant information for the textual form that trade company submits, to obtain shops's address information, the industry of user Information and expansion channel qualification information;
    Image recognition is carried out to the certificate information for the graphic form that trade company submits, the certificate information is resolved into textual form Manage qualification information and door head photographic intelligence;
    The information that the Text Feature Extraction and image recognition obtain is determined as to the check information of trade company.
  11. 11. security control method as claimed in claim 8, described to enter detection model described in check information input Group obtains the different trade companies for entering detection model output in different classes of risk score, comprising:
    It is true that corresponding informance in the check information is inputted into address authenticity risk computation model trained in advance, qualification respectively In reality risk computation model, industry authenticity risk computation model and transaction authenticity risk model, the different wind are received The different classes of risk score that dangerous model exports respectively.
  12. 12. security control method as claimed in claim 8, the method also includes:
    Black and white sample data is obtained, the black sample data is that there are the merchant data of historical risk transaction, the white sample numbers According to for there is no the merchant datas that historical risk is traded;
    Determine that several characteristic data sets of trade company, each characteristic data set are used to characterize the quotient of trade company's one of which classification Family feature;
    Using the black and white sample data, the difference being built into group in detection model respectively with the different characteristic data set enters In detection model.
  13. 13. method as claimed in claim 12, the difference being built into group in detection model respectively enters detection model Afterwards, further includes:
    The supplement black and white sample data that service provider uploads is received, the supplement black and white sample data is service provider according to own service The black sample trade company and white sample trade company that scene defines;
    Based on transfer learning algorithm, enter detection model using described in supplement black and white sample data training so that it is described enter The iteration of business scenario where completion in detection model adapts to the service provider.
  14. 14. security control method as claimed in claim 8, the method also includes:
    It the use of risk trade model trained is in advance that the transaction is beaten for any real-time deal information for entering trade company Point, calculated risk score value is recorded in the merchant data for generating the transaction;
    Trade company is entered for any, according to the risk trade stroke count that trade company described in current slot generates, calculates the quotient The current risk concentration at family;
    Threshold value is divided according to predefined level and determines the corresponding risk level of the risk concentration, according to the risk level pair The predefined processing strategie answered carries out different degrees of risk processing to the trade company and its affiliated service provider respectively and pushes away with information It send.
  15. 15. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, wherein the processor realizes method according to claim 8 when executing described program.
CN201910309707.3A 2019-04-17 2019-04-17 A kind of security management and control system and method applied to payment platform Pending CN110148000A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910309707.3A CN110148000A (en) 2019-04-17 2019-04-17 A kind of security management and control system and method applied to payment platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910309707.3A CN110148000A (en) 2019-04-17 2019-04-17 A kind of security management and control system and method applied to payment platform

Publications (1)

Publication Number Publication Date
CN110148000A true CN110148000A (en) 2019-08-20

Family

ID=67589697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910309707.3A Pending CN110148000A (en) 2019-04-17 2019-04-17 A kind of security management and control system and method applied to payment platform

Country Status (1)

Country Link
CN (1) CN110148000A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033120A (en) * 2019-03-06 2019-07-19 阿里巴巴集团控股有限公司 For providing the method and device that risk profile energizes service for trade company
CN110717653A (en) * 2019-09-17 2020-01-21 阿里巴巴集团控股有限公司 Risk identification method and device and electronic equipment
CN110910041A (en) * 2019-12-04 2020-03-24 支付宝(杭州)信息技术有限公司 Risk control method, system and device
CN111754245A (en) * 2020-06-18 2020-10-09 支付宝(杭州)信息技术有限公司 Method, device and equipment for authenticating business scene
CN112017059A (en) * 2020-07-14 2020-12-01 北京淇瑀信息科技有限公司 Hierarchical optimization risk control method and device and electronic equipment
CN112990939A (en) * 2020-11-27 2021-06-18 中国银联股份有限公司 Method, apparatus and computer readable medium for verifying user data
CN113344376A (en) * 2021-06-02 2021-09-03 南京星云数字技术有限公司 Merchant risk monitoring method and device, computer equipment and storage medium
CN113762966A (en) * 2020-06-05 2021-12-07 网联清算有限公司 Merchant information verification method, device, equipment and storage medium
CN113839851A (en) * 2020-06-08 2021-12-24 腾讯科技(深圳)有限公司 Payment configuration method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105590261A (en) * 2014-12-31 2016-05-18 中国银联股份有限公司 Merchant risk estimation method and system
CN106815754A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The charging method and air control system server of a kind of risk control system
WO2017162113A1 (en) * 2016-03-25 2017-09-28 阿里巴巴集团控股有限公司 Method and device for outputting risk information and constructing risk information
CN107622432A (en) * 2017-07-28 2018-01-23 阿里巴巴集团控股有限公司 Trade company's evaluation method and system
CN107644375A (en) * 2016-07-22 2018-01-30 花生米浙江数据信息服务股份有限公司 Small trade company's credit estimation method that a kind of expert model merges with machine learning model
CN108305012A (en) * 2018-02-11 2018-07-20 深圳市快付通金融网络科技服务有限公司 A kind of air control regulation obtaining method and device
CN108932585A (en) * 2018-06-19 2018-12-04 腾讯科技(深圳)有限公司 A kind of trade company's operation management method and its equipment, storage medium, electronic equipment
CN109389457A (en) * 2018-08-20 2019-02-26 深圳壹账通智能科技有限公司 Method of network entry, device, equipment and the readable storage medium storing program for executing of application gathering permission
CN110264221A (en) * 2019-05-15 2019-09-20 阿里巴巴集团控股有限公司 A kind of full link safety business federal solution for service provider's industry

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105590261A (en) * 2014-12-31 2016-05-18 中国银联股份有限公司 Merchant risk estimation method and system
CN106815754A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The charging method and air control system server of a kind of risk control system
WO2017162113A1 (en) * 2016-03-25 2017-09-28 阿里巴巴集团控股有限公司 Method and device for outputting risk information and constructing risk information
CN107644375A (en) * 2016-07-22 2018-01-30 花生米浙江数据信息服务股份有限公司 Small trade company's credit estimation method that a kind of expert model merges with machine learning model
CN107622432A (en) * 2017-07-28 2018-01-23 阿里巴巴集团控股有限公司 Trade company's evaluation method and system
CN108305012A (en) * 2018-02-11 2018-07-20 深圳市快付通金融网络科技服务有限公司 A kind of air control regulation obtaining method and device
CN108932585A (en) * 2018-06-19 2018-12-04 腾讯科技(深圳)有限公司 A kind of trade company's operation management method and its equipment, storage medium, electronic equipment
CN109389457A (en) * 2018-08-20 2019-02-26 深圳壹账通智能科技有限公司 Method of network entry, device, equipment and the readable storage medium storing program for executing of application gathering permission
CN110264221A (en) * 2019-05-15 2019-09-20 阿里巴巴集团控股有限公司 A kind of full link safety business federal solution for service provider's industry

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033120A (en) * 2019-03-06 2019-07-19 阿里巴巴集团控股有限公司 For providing the method and device that risk profile energizes service for trade company
CN110717653A (en) * 2019-09-17 2020-01-21 阿里巴巴集团控股有限公司 Risk identification method and device and electronic equipment
CN110717653B (en) * 2019-09-17 2023-05-12 创新先进技术有限公司 Risk identification method and apparatus, and electronic device
CN110910041A (en) * 2019-12-04 2020-03-24 支付宝(杭州)信息技术有限公司 Risk control method, system and device
WO2021109667A1 (en) * 2019-12-04 2021-06-10 支付宝(杭州)信息技术有限公司 Risk management and control method, system and device
CN113762966A (en) * 2020-06-05 2021-12-07 网联清算有限公司 Merchant information verification method, device, equipment and storage medium
CN113839851A (en) * 2020-06-08 2021-12-24 腾讯科技(深圳)有限公司 Payment configuration method and device
CN111754245A (en) * 2020-06-18 2020-10-09 支付宝(杭州)信息技术有限公司 Method, device and equipment for authenticating business scene
CN112017059A (en) * 2020-07-14 2020-12-01 北京淇瑀信息科技有限公司 Hierarchical optimization risk control method and device and electronic equipment
CN112990939A (en) * 2020-11-27 2021-06-18 中国银联股份有限公司 Method, apparatus and computer readable medium for verifying user data
CN113344376A (en) * 2021-06-02 2021-09-03 南京星云数字技术有限公司 Merchant risk monitoring method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110148000A (en) A kind of security management and control system and method applied to payment platform
Humbani et al. A cashless society for all: Determining consumers’ readiness to adopt mobile payment services
Christl et al. Corporate surveillance in everyday life
TW202020888A (en) Risk control method and apparatus, and server and storage medium
US11395094B1 (en) Network based resource management and allocation
McGurk Data profiling and insurance law
Ing et al. Intention to use e-wallet amongst the university students in Klang Valley
Pranto et al. A blockchain, smart contract and data mining based approach toward the betterment of e-commerce
KR20200020505A (en) Value selective marketing system
Lipartito Mediating reputation: Credit reporting systems in American history
KR102358156B1 (en) Method for providing customized loan brokerage services
CN113793150A (en) Wisdom campus system
Ganapathy Digital Bancassurance Business Models
Steverding et al. Initial coin offerings in Europe–the current legal framework and its consequences for investors and issuers
KR102021477B1 (en) A System Providing Automatic Payment Service After Repayment Based on Credit Evaluation Using Multi-Media Big Data Matching Pattern Analysis
Considine et al. Social technology: A compendium of short cases
Parthasarathy et al. A framework for managing ethics in data science projects
Khan Islamic banks web-marketing during the Covid-19 crisis.
CN111327572B (en) Account behavior identification method, device and storage medium
CN111818118B (en) Internet trading platform uncertainty evaluation filtering system based on CIWN-II
Tavallaei et al. Presenting the conceptual model of evaluating e-banking effect on banks’ performances with the approach of BSC
Kawamura How can Financial Service Providers improve the KYC onboarding experience?: challenges and technological solutions
Singh et al. Factors Affecting Selection of a Commercial Bank: A Study of Retail Banking Customers in Gurgaon
Kachan de Freitas Soares Crypto Assets for Wealth Management: an Analysis of the Financial System and Private Bankers' Clientele
Parveen et al. Digital Banking Experience after Crisis Demands Changes in Legislative Framework and IT Governance: Insight from Gen X, Gen Y & Gen Z

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200929

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200929

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190820