CN110148000A - A kind of security management and control system and method applied to payment platform - Google Patents
A kind of security management and control system and method applied to payment platform Download PDFInfo
- Publication number
- CN110148000A CN110148000A CN201910309707.3A CN201910309707A CN110148000A CN 110148000 A CN110148000 A CN 110148000A CN 201910309707 A CN201910309707 A CN 201910309707A CN 110148000 A CN110148000 A CN 110148000A
- Authority
- CN
- China
- Prior art keywords
- risk
- trade company
- information
- detection model
- trade
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000001514 detection method Methods 0.000 claims description 82
- 238000007726 management method Methods 0.000 claims description 34
- 238000012549 training Methods 0.000 claims description 21
- 238000012797 qualification Methods 0.000 claims description 18
- 239000013589 supplement Substances 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 8
- 238000000605 extraction Methods 0.000 claims description 7
- 238000013526 transfer learning Methods 0.000 claims description 6
- 238000012550 audit Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 4
- 241001269238 Data Species 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims 1
- 230000002708 enhancing effect Effects 0.000 abstract description 2
- 239000000463 material Substances 0.000 abstract description 2
- 239000000047 product Substances 0.000 description 18
- 238000004891 communication Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 10
- 208000001613 Gambling Diseases 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000007689 inspection Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000002265 prevention Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000013016 learning Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000013066 combination product Substances 0.000 description 1
- 229940127555 combination product Drugs 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000155 melt Substances 0.000 description 1
- 238000012011 method of payment Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (15)
- It include multiple service providers in the payment platform, with the clothes 1. a kind of security management and control system applied to payment platform Multiple subordinate trade companies of business quotient, the security management and control system include at least and enter risk supervision module,The risk supervision module of entering is used for:Check information is extracted in information in entering for trade company's submission, the check information is preset for examining trade company Enter the specific information of risk;Obtain training in advance enters detection model group, and described enter includes several different entering detection mould in detection model group Type, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of classification by trade company of detection model Characteristic training form;Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output not Generic risk score;The different classes of risk score is weighted, enters value-at-risk for what calculated result was determined as trade company.
- 2. security management and control system as described in claim 1, by calculated result be determined as trade company enter value-at-risk after, also wrap It includes:By the affiliated service provider for entering value-at-risk and being pushed to the trade company, so that the service provider utilizes the calculated result Corresponding further audit policy is used to the trade company.
- 3. security management and control system as described in claim 1, described that check information is extracted in information in entering for trade company's submission, Include:Text Feature Extraction is carried out in the merchant information for the textual form that trade company submits, to obtain shops's address information, the industry of user Information and expansion channel qualification information;Image recognition is carried out to the certificate information for the graphic form that trade company submits, the certificate information is resolved into textual form Manage qualification information and door head photographic intelligence;The information that the Text Feature Extraction and image recognition obtain is determined as to the check information of trade company.
- 4. security management and control system as described in claim 1, described to enter detection model group described in check information input, The different trade companies for entering detection model output is obtained in different classes of risk score, comprising:It is true that corresponding informance in the check information is inputted into address authenticity risk computation model trained in advance, qualification respectively In reality risk computation model, industry authenticity risk computation model and transaction authenticity risk model, the different wind are received The different classes of risk score that dangerous model exports respectively.
- 5. security management and control system as described in claim 1, the system also includes entering detection model group building module,The detection model group building module of entering is used for:Black and white sample data is obtained, the black sample data is that there are the merchant data of historical risk transaction, the white sample numbers According to for there is no the merchant datas that historical risk is traded;Determine that several characteristic data sets of trade company, each characteristic data set are used to characterize the quotient of trade company's one of which classification Family feature;Using the black and white sample data, the difference being built into group in detection model respectively with the different characteristic data set enters In detection model.
- 6. system as claimed in claim 5, described to enter detection model group building module, it is also used to:The supplement black and white sample data that service provider uploads is received, the supplement black and white sample data is service provider according to own service The black sample trade company and white sample trade company that scene defines;Based on transfer learning algorithm, enter detection model using described in supplement black and white sample data training so that it is described enter The iteration of business scenario where completion in detection model adapts to the service provider.
- 7. security management and control system as described in claim 1, the system also includes real-time risk supervision module,The real-time risk supervision module is used for:It the use of risk trade model trained is in advance that the transaction is beaten for any real-time deal information for entering trade company Point, calculated risk score value is recorded in the merchant data for generating the transaction;Trade company is entered for any, according to the risk trade stroke count that trade company described in current slot generates, calculates the quotient The current risk concentration at family;Threshold value is divided according to predefined level and determines the corresponding risk level of the risk concentration, according to the risk level pair The predefined processing strategie answered carries out risk processing to the trade company and affiliated service provider and pushes with information.
- It include multiple service providers in the payment platform, with the clothes 8. a kind of security control method applied to payment platform Multiple subordinate trade companies of business quotient, the security control method include:Check information is extracted in information in entering for trade company's submission, the check information is preset for examining trade company Enter the specific information of risk;Obtain training in advance enters detection model group, and described enter includes several different entering detection mould in detection model group Type, wherein the characteristic of trade company is divided into several classifications, each enters the corresponding one of classification by trade company of detection model Characteristic training form;Detection model group will be entered described in check information input, obtains the different trade companies for entering detection model output not Generic risk score;The different classes of risk score is weighted, enters value-at-risk for what calculated result was determined as trade company.
- 9. security control method as claimed in claim 8, by calculated result be determined as trade company enter value-at-risk after, also wrap It includes:By the affiliated service provider for entering value-at-risk and being pushed to the trade company, so that the service provider utilizes the calculated result Corresponding further audit policy is used to the trade company.
- 10. security control method as claimed in claim 8, described to extract verification letter in entering in information for trade company's submission Breath, comprising:Text Feature Extraction is carried out in the merchant information for the textual form that trade company submits, to obtain shops's address information, the industry of user Information and expansion channel qualification information;Image recognition is carried out to the certificate information for the graphic form that trade company submits, the certificate information is resolved into textual form Manage qualification information and door head photographic intelligence;The information that the Text Feature Extraction and image recognition obtain is determined as to the check information of trade company.
- 11. security control method as claimed in claim 8, described to enter detection model described in check information input Group obtains the different trade companies for entering detection model output in different classes of risk score, comprising:It is true that corresponding informance in the check information is inputted into address authenticity risk computation model trained in advance, qualification respectively In reality risk computation model, industry authenticity risk computation model and transaction authenticity risk model, the different wind are received The different classes of risk score that dangerous model exports respectively.
- 12. security control method as claimed in claim 8, the method also includes:Black and white sample data is obtained, the black sample data is that there are the merchant data of historical risk transaction, the white sample numbers According to for there is no the merchant datas that historical risk is traded;Determine that several characteristic data sets of trade company, each characteristic data set are used to characterize the quotient of trade company's one of which classification Family feature;Using the black and white sample data, the difference being built into group in detection model respectively with the different characteristic data set enters In detection model.
- 13. method as claimed in claim 12, the difference being built into group in detection model respectively enters detection model Afterwards, further includes:The supplement black and white sample data that service provider uploads is received, the supplement black and white sample data is service provider according to own service The black sample trade company and white sample trade company that scene defines;Based on transfer learning algorithm, enter detection model using described in supplement black and white sample data training so that it is described enter The iteration of business scenario where completion in detection model adapts to the service provider.
- 14. security control method as claimed in claim 8, the method also includes:It the use of risk trade model trained is in advance that the transaction is beaten for any real-time deal information for entering trade company Point, calculated risk score value is recorded in the merchant data for generating the transaction;Trade company is entered for any, according to the risk trade stroke count that trade company described in current slot generates, calculates the quotient The current risk concentration at family;Threshold value is divided according to predefined level and determines the corresponding risk level of the risk concentration, according to the risk level pair The predefined processing strategie answered carries out different degrees of risk processing to the trade company and its affiliated service provider respectively and pushes away with information It send.
- 15. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, wherein the processor realizes method according to claim 8 when executing described program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910309707.3A CN110148000A (en) | 2019-04-17 | 2019-04-17 | A kind of security management and control system and method applied to payment platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910309707.3A CN110148000A (en) | 2019-04-17 | 2019-04-17 | A kind of security management and control system and method applied to payment platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110148000A true CN110148000A (en) | 2019-08-20 |
Family
ID=67589697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910309707.3A Pending CN110148000A (en) | 2019-04-17 | 2019-04-17 | A kind of security management and control system and method applied to payment platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110148000A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110033120A (en) * | 2019-03-06 | 2019-07-19 | 阿里巴巴集团控股有限公司 | For providing the method and device that risk profile energizes service for trade company |
CN110717653A (en) * | 2019-09-17 | 2020-01-21 | 阿里巴巴集团控股有限公司 | Risk identification method and device and electronic equipment |
CN110910041A (en) * | 2019-12-04 | 2020-03-24 | 支付宝(杭州)信息技术有限公司 | Risk control method, system and device |
CN111754245A (en) * | 2020-06-18 | 2020-10-09 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for authenticating business scene |
CN112017059A (en) * | 2020-07-14 | 2020-12-01 | 北京淇瑀信息科技有限公司 | Hierarchical optimization risk control method and device and electronic equipment |
CN112990939A (en) * | 2020-11-27 | 2021-06-18 | 中国银联股份有限公司 | Method, apparatus and computer readable medium for verifying user data |
CN113344376A (en) * | 2021-06-02 | 2021-09-03 | 南京星云数字技术有限公司 | Merchant risk monitoring method and device, computer equipment and storage medium |
CN113762966A (en) * | 2020-06-05 | 2021-12-07 | 网联清算有限公司 | Merchant information verification method, device, equipment and storage medium |
CN113839851A (en) * | 2020-06-08 | 2021-12-24 | 腾讯科技(深圳)有限公司 | Payment configuration method and device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105590261A (en) * | 2014-12-31 | 2016-05-18 | 中国银联股份有限公司 | Merchant risk estimation method and system |
CN106815754A (en) * | 2015-12-02 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The charging method and air control system server of a kind of risk control system |
WO2017162113A1 (en) * | 2016-03-25 | 2017-09-28 | 阿里巴巴集团控股有限公司 | Method and device for outputting risk information and constructing risk information |
CN107622432A (en) * | 2017-07-28 | 2018-01-23 | 阿里巴巴集团控股有限公司 | Trade company's evaluation method and system |
CN107644375A (en) * | 2016-07-22 | 2018-01-30 | 花生米浙江数据信息服务股份有限公司 | Small trade company's credit estimation method that a kind of expert model merges with machine learning model |
CN108305012A (en) * | 2018-02-11 | 2018-07-20 | 深圳市快付通金融网络科技服务有限公司 | A kind of air control regulation obtaining method and device |
CN108932585A (en) * | 2018-06-19 | 2018-12-04 | 腾讯科技(深圳)有限公司 | A kind of trade company's operation management method and its equipment, storage medium, electronic equipment |
CN109389457A (en) * | 2018-08-20 | 2019-02-26 | 深圳壹账通智能科技有限公司 | Method of network entry, device, equipment and the readable storage medium storing program for executing of application gathering permission |
CN110264221A (en) * | 2019-05-15 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of full link safety business federal solution for service provider's industry |
-
2019
- 2019-04-17 CN CN201910309707.3A patent/CN110148000A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105590261A (en) * | 2014-12-31 | 2016-05-18 | 中国银联股份有限公司 | Merchant risk estimation method and system |
CN106815754A (en) * | 2015-12-02 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The charging method and air control system server of a kind of risk control system |
WO2017162113A1 (en) * | 2016-03-25 | 2017-09-28 | 阿里巴巴集团控股有限公司 | Method and device for outputting risk information and constructing risk information |
CN107644375A (en) * | 2016-07-22 | 2018-01-30 | 花生米浙江数据信息服务股份有限公司 | Small trade company's credit estimation method that a kind of expert model merges with machine learning model |
CN107622432A (en) * | 2017-07-28 | 2018-01-23 | 阿里巴巴集团控股有限公司 | Trade company's evaluation method and system |
CN108305012A (en) * | 2018-02-11 | 2018-07-20 | 深圳市快付通金融网络科技服务有限公司 | A kind of air control regulation obtaining method and device |
CN108932585A (en) * | 2018-06-19 | 2018-12-04 | 腾讯科技(深圳)有限公司 | A kind of trade company's operation management method and its equipment, storage medium, electronic equipment |
CN109389457A (en) * | 2018-08-20 | 2019-02-26 | 深圳壹账通智能科技有限公司 | Method of network entry, device, equipment and the readable storage medium storing program for executing of application gathering permission |
CN110264221A (en) * | 2019-05-15 | 2019-09-20 | 阿里巴巴集团控股有限公司 | A kind of full link safety business federal solution for service provider's industry |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110033120A (en) * | 2019-03-06 | 2019-07-19 | 阿里巴巴集团控股有限公司 | For providing the method and device that risk profile energizes service for trade company |
CN110717653A (en) * | 2019-09-17 | 2020-01-21 | 阿里巴巴集团控股有限公司 | Risk identification method and device and electronic equipment |
CN110717653B (en) * | 2019-09-17 | 2023-05-12 | 创新先进技术有限公司 | Risk identification method and apparatus, and electronic device |
CN110910041A (en) * | 2019-12-04 | 2020-03-24 | 支付宝(杭州)信息技术有限公司 | Risk control method, system and device |
WO2021109667A1 (en) * | 2019-12-04 | 2021-06-10 | 支付宝(杭州)信息技术有限公司 | Risk management and control method, system and device |
CN113762966A (en) * | 2020-06-05 | 2021-12-07 | 网联清算有限公司 | Merchant information verification method, device, equipment and storage medium |
CN113839851A (en) * | 2020-06-08 | 2021-12-24 | 腾讯科技(深圳)有限公司 | Payment configuration method and device |
CN111754245A (en) * | 2020-06-18 | 2020-10-09 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for authenticating business scene |
CN112017059A (en) * | 2020-07-14 | 2020-12-01 | 北京淇瑀信息科技有限公司 | Hierarchical optimization risk control method and device and electronic equipment |
CN112990939A (en) * | 2020-11-27 | 2021-06-18 | 中国银联股份有限公司 | Method, apparatus and computer readable medium for verifying user data |
CN113344376A (en) * | 2021-06-02 | 2021-09-03 | 南京星云数字技术有限公司 | Merchant risk monitoring method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110148000A (en) | A kind of security management and control system and method applied to payment platform | |
Humbani et al. | A cashless society for all: Determining consumers’ readiness to adopt mobile payment services | |
Christl et al. | Corporate surveillance in everyday life | |
TW202020888A (en) | Risk control method and apparatus, and server and storage medium | |
US11395094B1 (en) | Network based resource management and allocation | |
McGurk | Data profiling and insurance law | |
Ing et al. | Intention to use e-wallet amongst the university students in Klang Valley | |
Pranto et al. | A blockchain, smart contract and data mining based approach toward the betterment of e-commerce | |
KR20200020505A (en) | Value selective marketing system | |
Lipartito | Mediating reputation: Credit reporting systems in American history | |
KR102358156B1 (en) | Method for providing customized loan brokerage services | |
CN113793150A (en) | Wisdom campus system | |
Ganapathy | Digital Bancassurance Business Models | |
Steverding et al. | Initial coin offerings in Europe–the current legal framework and its consequences for investors and issuers | |
KR102021477B1 (en) | A System Providing Automatic Payment Service After Repayment Based on Credit Evaluation Using Multi-Media Big Data Matching Pattern Analysis | |
Considine et al. | Social technology: A compendium of short cases | |
Parthasarathy et al. | A framework for managing ethics in data science projects | |
Khan | Islamic banks web-marketing during the Covid-19 crisis. | |
CN111327572B (en) | Account behavior identification method, device and storage medium | |
CN111818118B (en) | Internet trading platform uncertainty evaluation filtering system based on CIWN-II | |
Tavallaei et al. | Presenting the conceptual model of evaluating e-banking effect on banks’ performances with the approach of BSC | |
Kawamura | How can Financial Service Providers improve the KYC onboarding experience?: challenges and technological solutions | |
Singh et al. | Factors Affecting Selection of a Commercial Bank: A Study of Retail Banking Customers in Gurgaon | |
Kachan de Freitas Soares | Crypto Assets for Wealth Management: an Analysis of the Financial System and Private Bankers' Clientele | |
Parveen et al. | Digital Banking Experience after Crisis Demands Changes in Legislative Framework and IT Governance: Insight from Gen X, Gen Y & Gen Z |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200929 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20200929 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Applicant before: Alibaba Group Holding Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190820 |