CN110390526A - A kind of network trading analysis method and system - Google Patents

A kind of network trading analysis method and system Download PDF

Info

Publication number
CN110390526A
CN110390526A CN201810347857.9A CN201810347857A CN110390526A CN 110390526 A CN110390526 A CN 110390526A CN 201810347857 A CN201810347857 A CN 201810347857A CN 110390526 A CN110390526 A CN 110390526A
Authority
CN
China
Prior art keywords
transaction
credible
confidence levels
sample data
sample
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810347857.9A
Other languages
Chinese (zh)
Inventor
樊帅
李贵军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Xingyun Digital Technology Co Ltd
Original Assignee
Suningcom Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suningcom Group Co Ltd filed Critical Suningcom Group Co Ltd
Priority to CN201810347857.9A priority Critical patent/CN110390526A/en
Publication of CN110390526A publication Critical patent/CN110390526A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Abstract

The invention discloses a kind of network trading analysis method and system, under the premise of not being obviously improved leakage and killing rate, the intercepted transaction in part is let off, and then reduce and manslaughter, promote user experience.The network trading analysis method, comprising: collecting sample data establish sample database;The sample data includes the case data of arm's length dealing data and abnormal exchanges;According to the transaction index that the sample data records, confidence levels division is carried out to transaction, constructs trust model;The real-time deal information that system is intercepted, inputs in the trust model, calculates whether the real-time deal belongs to high confidence levels, if belonging to, trade;If being not belonging to, transaction interception is carried out.

Description

A kind of network trading analysis method and system
Technical field
The invention belongs to big data technical field of risk control, it particularly relates to a kind of network trading analysis method and System.
Background technique
With the fast development that internet is done shopping, more and more offenders pay close attention to Third-party payment platform.Crime point Son is sought loopholes using some loopholes of platform, is stolen platform account, is stolen platform user fund etc., very big damage is brought to client It loses.With the growth and growth of Third-party payment platform, the high loyal client of part high quality can be cultivated, but is similarly had big Measure the behavior of fraud.Although Third-party payment platform availability risk intercepting system can effectively intercept abnormal transaction, protection client is closed Method property safety, but inevitably also stop many arm's length dealings, affect certain customers' experience.How normal friendship is reduced Easily intercepted probability improves user experience, is the technical problem that those skilled in the art face.
Summary of the invention
The embodiment of the present invention provides a kind of network trading analysis method and system, in the premise for not being obviously improved leakage and killing rate Under, the intercepted transaction in part is let off, and then reduce and manslaughter, promotes user experience.
In order to solve the above technical problems, the embodiment of the present invention uses following technical scheme:
In a first aspect, the embodiment of the present invention provides a kind of network trading analysis method, which comprises
Collecting sample data, establish sample database;The sample data includes arm's length dealing data and abnormal exchanges Case data;According to the transaction index that the sample data records, confidence levels division is carried out to transaction, constructs credible mould Type;
The real-time deal information that system is intercepted, inputs in the trust model, calculates whether the real-time deal belongs to High confidence levels are traded if belonging to;If being not belonging to, transaction interception is carried out.
With reference to first aspect, as the first achievable scheme, the transaction according to sample data record refers to Mark carries out confidence levels division to transaction, constructs trust model, comprising:
Credible element of transaction is screened from the transaction index that the sample data records;
According to correlation rule, the credible indexes of the credible element of transaction are calculated;The credible indexes include support, set Reliability and promotion degree;
According to the credible indexes, confidence levels division will be carried out comprising the transaction of the credible element of transaction, building can Believe model;Confidence levels include high confidence levels.
The achievable scheme of with reference to first aspect the first, as second of achievable scheme, described in the calculating The credible indexes of credible element of transaction, comprising:
To the credible element of transaction according to combining form, credible indexes are calculated.
The achievable scheme of with reference to first aspect the first, as the third achievable scheme, described in the calculating The support process of credible element of transaction are as follows:
If credible element of transaction is m, m is the integer more than or equal to 1;
If in sample database simultaneously including m credible element of transaction, the key element in element of transaction credible for one Arm's length dealing quantity be S ';
If the transaction amount amount in sample database is S;
Support W1=S '/S.
The third achievable scheme with reference to first aspect, as the 4th kind of achievable scheme, described in the calculating The confidence process of credible element of transaction are as follows:
If the number of transaction simultaneously containing the key element in m credible element of transaction in sample database is S1
Confidence level W2=S '/S1
The 4th kind of achievable scheme with reference to first aspect, as the 5th kind of achievable scheme, described in the calculating Journey is spent in the promotion of credible element of transaction are as follows:
If arm's length dealing amount is N, promotion degree W3=W2/ (N/S) in sample database.
Second aspect, the embodiment of the present invention provide a kind of network trading analysis system, comprising:
Construction part module: collecting sample data are used for, sample database is established;Referred to according to the transaction that the sample data records Mark carries out confidence levels division to transaction, constructs trust model;
Trust model: the real-time deal information for being intercepted to system, calculate the real-time deal whether belong to it is high credible Rank is traded if belonging to;If being not belonging to, transaction interception is carried out.
In conjunction with second aspect, as the first achievable scheme, the construction part module, comprising:
Acquisition unit: collecting sample data are used for, sample database is established;The sample data includes arm's length dealing data With the case data of abnormal exchanges;
Screening unit: for screening credible element of transaction from the transaction index that the sample data records;
Computing unit: for calculating the credible indexes of the credible element of transaction according to correlation rule;The credible indexes Including support, confidence level and promotion degree;
Division unit: for according to the credible indexes, credible element of transaction to be carried out confidence levels division, confidence levels Including high confidence levels.
The first achievable scheme in conjunction with second aspect, as second of achievable scheme, the computing unit: tool Body is used to calculate credible indexes according to combining form to the credible element of transaction.
The first achievable scheme in conjunction with second aspect, as the third achievable scheme, the computing unit: tool Body is used to calculate support according to following methods:
If credible element of transaction is m, m is the integer more than or equal to 1;
If in sample database simultaneously including m credible element of transaction, the key element in element of transaction credible for one Arm's length dealing quantity be S ';
If the transaction amount amount in sample database is S;
Support W1=S '/S.
The first achievable scheme in conjunction with second aspect, as the 4th kind of achievable scheme, the computing unit: tool Body is used to calculate confidence level according to following methods:
If the number of transaction simultaneously containing the key element in m credible element of transaction in sample database is S1
Confidence level W2=S '/S1
The first achievable scheme in conjunction with second aspect, as the 5th kind of achievable scheme, the computing unit: tool Body is used to calculate promotion degree according to following methods:
If arm's length dealing amount is N, promotion degree W3=W2/ (N/S) in sample database.
Compared with prior art, the network trading analysis method and system of the embodiment of the present invention, is killed not being obviously improved leakage Under the premise of rate, the intercepted transaction in part is let off, and then reduce and manslaughter, promote user experience.The method of the embodiment In, firstly, carrying out confidence levels division according to the transaction index that sample data records to transaction, constructing trust model;Then, The real-time deal information that system is intercepted, inputs in the trust model, calculates whether the real-time deal belongs to high credible grade Not, it if belonging to, trades;If being not belonging to, transaction interception is carried out.This method carries out the real-time deal intercepted by system Judgement, if belong to the transaction of high confidence levels, if belonged to, allow to trade.This method can be greatly reduced normally The probability that transaction is accidentally blocked by risk system reduces the rate of bothering to client, and reduction is manslaughtered, and promotes air control accuracy rate, to mention Rise user experience.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 is method flow block diagram provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of step 10) in the method for the embodiment of the present invention;
Fig. 4 is the transaction index exemplary diagram generated in whole network transaction flow;
Fig. 5 is in the embodiment of the present invention, and transaction level divides exemplary diagram;
Fig. 6 is the structural block diagram of specific example provided in an embodiment of the present invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, with reference to the accompanying drawing and specific embodiment party Present invention is further described in detail for formula.Embodiments of the present invention are described in more detail below, the embodiment is shown Example is shown in the accompanying drawings, and in which the same or similar labels are throughly indicated same or similar element or has identical or class Like the element of function.It is exemplary below with reference to the embodiment of attached drawing description, for explaining only the invention, and cannot It is construed to limitation of the present invention.Those skilled in the art of the present technique are appreciated that unless expressly stated, odd number shape used herein Formula " one ", "one", " described " and "the" may also comprise plural form.It is to be further understood that specification of the invention Used in wording " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that In the presence of or add other one or more features, integer, step, operation, element, component and/or their group.It should be understood that When we say that an element is " connected " or " coupled " to another element, it can be directly connected or coupled to other elements, or There may also be intermediary elements.In addition, " connection " used herein or " coupling " may include being wirelessly connected or coupling.Here make Wording "and/or" includes one or more associated any cells for listing item and all combinations.The art Technical staff is appreciated that unless otherwise defined all terms (including technical terms and scientific terms) used herein have Meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.It should also be understood that such as general Those terms, which should be understood that, defined in dictionary has a meaning that is consistent with the meaning in the context of the prior art, and Unless defined as here, it will not be explained in an idealized or overly formal meaning.
Risk control system is typically provided in existing network platform transaction.The risk control system carries out suspicious transaction It intercepts.Although the system can intercept abnormal transaction, part arm's length dealing is also intercepted.Knot of the embodiment of the present invention Big data and related analysis technology are closed, is traded according to existing arm's length dealing and case, is weighed according to the relevant informational element of transaction Amount gives the confidence level of transaction.Transaction credible for the height intercepted by system is let pass.
The embodiment of the present invention may be implemented in a kind of system as shown in Figure 1.The system includes user terminal, trades and put down Platform, trust model, trading information data library.
User terminal is specifically as follows an independent system, or is integrated in a variety of different medium data playing systems, Such as smart phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer) or Person's personal digital assistant (personal digital assistant, abbreviation PDA) etc..Installation can be passed through on user terminal Application program (such as browser) or APP, by the webpage of user terminal access, specifically can be to load and show webpage The page that operation system (such as online shopping platform, promotion website, financial marketing platform etc.) is shown to user, these pages can be by The server system operation for running operation system, can also be run, i.e., the described server apparatus by the server apparatus in system It can integrate in the server system of operation operation system.
Transaction platform can be individual server apparatus, such as: rack, blade, tower or cabinet-type service Device equipment can also have stronger computing capability hardware device using work station, mainframe computer etc.;It is also possible to by multiple clothes The server cluster of device equipment of being engaged in composition.Transaction platform is for carrying out network trading.
Trust model can be individual server apparatus, also can integrate in the server system of transaction platform.It can Letter model is for judging intercepted real-time deal, if belongs to high confidence levels.
Trading information data library is for storing and managing historical trading data.Database Systems, which specifically can be, to be individually made , the server apparatus of management, storage for data is also possible to the server cluster being made of multiple server apparatus. The database that corresponding server equipment is run on the hardware device of Database Systems, for manage simultaneously storage server equipment Data.Common network database (Network Database), relational database (Relational can specifically be used Database), tree shaped data library (Hierarchical Database), object-oriented database (Object-oriented ) and big data system architecture of new generation Database.
In above system, trust model is according to the historical trading data in trading information data library, component model, and to quilt The transaction that transaction platform intercepts is judged, if belongs to high credible transaction.
A kind of network trading analysis method of the embodiment of the present invention, as shown in Figure 2, comprising:
S10 collecting sample data, establish sample database;The sample data includes arm's length dealing data and improper friendship Easy case data;According to the transaction index that the sample data records, confidence levels division is carried out to transaction, constructs credible mould Type;
The real-time deal information that S20 intercepts system, inputs in the trust model, calculates whether the real-time deal belongs to In high confidence levels, if belonging to, trade;If being not belonging to, transaction interception is carried out.
The method of above-described embodiment, the real-time deal information intercept to system and not all interception, forbid trading.This method By being analyzed to intercepted real-time deal information, judge whether the real-time deal information belongs to high confidence levels.As belonged to It in high confidence levels, then abandons intercepting, allows to trade.High confidence levels are such as not belonging to, then carry out transaction interception.Above-mentioned side Method analyzes the real-time deal information intercepted by system again, and based on the analysis results, to the reality for belonging to high confidence levels When trade, no longer intercept, allow to trade.This is conducive to the progress for ensuring arm's length dealing, promotes user experience.
In step S10, sample data includes the case data of arm's length dealing data and abnormal exchanges.Split data into two Class, one kind are arm's length dealing data, and another kind of is abnormal exchanges data.Abnormal exchanges data are as case data.This two Class data can be internally sourced, can also be from outside.Two class data of acquisition are added in database.In addition, sample data It is renewable, to improve the precision of trust model analysis.For example, after real-time deal, either arm's length dealing, also right and wrong The secondary transaction data can be all stored in sample data by arm's length dealing.
Information data source in sample data is including but not limited to following data source: order details, payment are detailed Thin information, shipping address information, device-fingerprint information, the registration information of transaction agent.
The method of above-described embodiment analyzes the real-time deal information intercepted by system by building trust model. As preference, as shown in figure 3, the building trust model, comprising:
S101 screens credible element of transaction from the transaction index that the sample data records.
In step S101, credible element of transaction is the most transaction of user identifier in the transaction index of system record Index.With the development of technology, while a transaction occurs, transaction system will record many transaction indexs.Such as Fig. 4 institute Show, the issuable transaction index example in whole network transaction flow.As preference, by address, cell-phone number, identity card Number, bank's card number, IP address, wifimac, device number, mailbox be as credible element of transaction.It, can constructing as technology develops When believing model, the credible element of transaction of use can change.
S102 calculates the credible indexes of the credible element of transaction according to correlation rule.
After determining credible element of transaction, according to correlation rule, to independent credible element of transaction and the credible friendship of combination Easy element calculates separately its credible indexes.Credible indexes include support, confidence level and promotion degree.Preferably, to described credible Element of transaction calculates credible indexes according to combining form.The use of the highest trust data of integration factor is better than independent element It uses.Integration factor can mutually support that reduction is manslaughtered between each other, promote air control and intercept accuracy rate, utmostly to promote use Family experience.
Preferably, the method for support is calculated are as follows:
If credible element of transaction is m, m is the integer more than or equal to 1.If credible comprising m simultaneously in sample database Element of transaction, the arm's length dealing quantity of the key element in element of transaction credible for one are S ';If the friendship in sample database Easy total quantity is S;Support W1=S '/S.When m is 1, indicate that credible element of transaction is one.When m is greater than 1, expression can Believe that element of transaction is multiple.Element is the element for the embodiment user characteristics attribute that can be collected into process of exchange.Key element is The element of user characteristics attribute can be embodied, such as device number, the address ip, cell-phone number for trading etc..
Preferably, the method for confidence level is calculated are as follows:
If the number of transaction simultaneously containing the key element in m credible element of transaction in sample database is S1;Confidence Spend W2=S '/S1
Preferably, the method for promotion degree is calculated are as follows:
If arm's length dealing amount is N in sample database;Promotion degree W3=W2/ (N/S).
Below as one example, illustrate the calculating process of support, confidence level and promotion degree.
If cell-phone number A has traded 8 times, a case.Address B trades 12 times, a case.Mobile phone A+address B goes out simultaneously It is 6 times existing, without case.If total number of transactions number is 20 in database, arm's length dealing quantity is 18.
(1) using address B and mobile phone A as credible element of transaction, i.e., integration factor is as credible element of transaction:
Support W1=6/20=0.3
Confidence level W2=6/6=1
Promotion degree W3=1/ (18/20)=1.11
(2) using mobile phone A as credible element of transaction, i.e., single element is as credible element of transaction:
Support W1=7/20=0.35
Confidence level W2=7/8=0.875
Promotion degree W3=0.875/0.9=0.972.
It is 0.1 that confidence threshold, which is arranged, otherwise it is low confidence that being greater than threshold value, which is high confidence level,.Promotion degree threshold value is 1, greatly It is high promotion degree in threshold value, is otherwise low promotion degree.Support is sorted according to sixteen threshold values by height on earth, and preceding 5% is height, It is low lower than 20% in 5%-20%.
It to sum up, is high confidence level, high promotion degree using address B and mobile phone A as the transaction of credible element of transaction.If branch Degree of holding enters preceding 5%, then the transaction belongs to high confidence levels, allows to trade.Using mobile phone A as the transaction of credible element of transaction, For high confidence level, low promotion degree.Even if the support of the transaction enters preceding 5%, then the transaction is also not belonging to high confidence levels, hands over It is easily intercepted.
It, can be more acurrate from examples detailed above as can be seen that the multiple credible element of transaction of combination carry out the calculating of credible indexes The risk for reflecting transaction prevents transaction from being intercepted by mistake.
S103 will carry out confidence levels division comprising the transaction of the credible element of transaction according to the credible indexes, can Believe that rank includes high confidence levels.
By credible indexes, transaction is divided into several ranks.The rank includes high confidence levels.When credible element of transaction Corresponding transaction belongs to high confidence levels, then system allows the transaction to carry out.As preference, as shown in figure 5, transaction is divided into Five ranks, respectively high insincere rank, low insincere rank, low confidence levels, middle confidence levels and high confidence levels.Tool For body, transaction is divided by four classes according to promotion degree and confidence level, then segment by support:
The low promotion of low confidence: case rate is higher, can be set as high-risk list;
The high low promotion of confidence and low confidence height are promoted: being had arm's length dealing also to have case, be can be considered gray list;
High confidence height is promoted: the partial amount is larger, and case did not occurred, for such transaction, then will by support The transaction of this classification is divided into three classes according to high support, middle support and low support.
The confidence level of classification is respectively as follows: from high to low
50 points: high confidence level+height promotion degree+high support;
40 points: high confidence level+height promotion degree+middle support;
30 points: high confidence level+height promotion degree+low support;
20 points: high confidence level+low promotion degree and low confidence+height promotion degree;
10 points: low confidence+low promotion degree;
For the metric form of credible element of transaction, the judgment criteria of credible element of transaction can be freely configured, is freely arranged Metric threshold.Confidence level, promotion degree and support are to be carried out dividing according to the threshold value of setting belonging to high-level or low level. High insincere rank corresponds to score value 10, and low insincere rank corresponds to score value 20, and low confidence levels correspond to score value 30, middle confidence levels Corresponding score value 40, high confidence levels correspond to score value 50.
Currently, the mistake of normal account can be brought to intercept using air control means while intercepting high-risk account trading.For The interception to normal account trading is reduced, by carrying out the association analysis of case to particular transaction element, credible transaction wanted Element is divided into several major class, no longer intercepts to high believable transaction is belonged to, allowing to trade goes on smoothly, to reduce the mistake of arm's length dealing It intercepts.
In the method for above-described embodiment, big data and related analysis technology are combined, related analysis technology is applied to wind Dangerous control field.The method of above-described embodiment helps to reduce and manslaughter, subtract for analyzing the transaction intercepted by system It is few that the use of normal users is bothered, and the workload of risk auditor can be reduced, improve the accuracy that risk intercepts.
The balancing method of transaction confidence level is to comprehensively consider most representative credible element of transaction under payment whole scene, meter Calculate support, promotion degree and the confidence level of credible element of transaction.Single dimension element and integration factor are judged, will most may be used The part of letter is as the foundation for reducing mistake interception.
This method will bring following technical effect to transaction risk control: available a variety of most user identifiers Credible element of transaction can be combined with each other into more effective integration factor between credible element of transaction.Single dimension element with Integration factor all may act on actual production.Integration factor also avoids the one-sidedness of single element, can utmostly identify and be missed The arm's length dealing killed.In addition, calculating separately single element of transaction can recognize with the confidence level of element of transaction, confidence level the pick of is combined For low-risk client, then accidentally blocked when, is let off, and is bothered with reducing arm's length dealing, is promoted user experience.
As shown in fig. 6, the embodiment of the present invention also provides a kind of network trading analysis system, comprising:
Construction part module: collecting sample data are used for, sample database is established;The sample data includes arm's length dealing data With the case data of abnormal exchanges;According to the transaction index that the sample data records, confidence levels division is carried out to transaction, Construct trust model.
Trust model: the real-time deal information for being intercepted to system, calculate the real-time deal whether belong to it is high credible Rank is traded if belonging to;If being not belonging to, transaction interception is carried out.
The system of above-described embodiment forbids trading to intercepted real-time deal information and not all interception.The system is logical Trust model is crossed to intercepted real-time deal information, is analyzed, judges whether the real-time deal information belongs to high credible grade Not.Such as belong to high confidence levels, then abandon intercepting, allows to trade.High confidence levels are such as not belonging to, then carries out transaction and blocks It cuts.This is conducive to the progress for ensuring arm's length dealing, promotes user experience.
As preference, the building module, comprising:
Acquisition unit: collecting sample data are used for, sample database is established;The sample data includes arm's length dealing data With the case data of abnormal exchanges;
Screening unit: for screening credible element of transaction from the transaction index that the sample data records;
Computing unit: for calculating the credible indexes of the credible element of transaction according to correlation rule;The credible indexes Including support, confidence level and promotion degree;
Division unit: for according to the credible indexes, credible element of transaction to be carried out confidence levels division, confidence levels Including high confidence levels.
Preferably, computing unit calculates credible indexes to the credible element of transaction according to combining form.It is multiple credible Element of transaction combines, and carries out the calculating of credible indexes, more accurately can carry out partition of the level for transaction.
In above-mentioned computing unit, support, confidence level and promotion degree are calculated according to following methods:
If credible element of transaction is m, m is the integer more than or equal to 1;Simultaneously comprising m credible friendships in sample database Easy element, the arm's length dealing quantity of the key element in element of transaction credible for one are S ';If containing simultaneously in sample database The number of transaction for having the key element in m credible element of transaction is S1;If the transaction amount amount in sample database is S;If Arm's length dealing amount is N in sample database.
Support W1=S '/S.Confidence level W2=S '/S1.Promotion degree W3=W2/ (N/S).
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.
Those skilled in the art should know, realize the method or system of above-described embodiment, can pass through computer journey Sequence instructs to realize.The computer program instructions are loaded into programmable data processing device, such as computer, thus that can compile Corresponding instruction is executed on journey data processing equipment, for realizing the function of method or the system realization of above-described embodiment.
Those skilled in the art can carry out non-creative technological improvement according to above-described embodiment to the application, without It is detached from Spirit Essence of the invention.These improvement still should be regarded as within the protection scope of the claim of this application.

Claims (12)

1. a kind of network trading analysis method, which is characterized in that the described method includes:
Collecting sample data, establish sample database;The sample data includes the case of arm's length dealing data and abnormal exchanges Number of packages evidence;According to the transaction index that the sample data records, confidence levels division is carried out to transaction, constructs trust model;
By system intercept real-time deal information, input in the trust model, calculate the real-time deal whether belong to height can Letter rank is traded if belonging to;If being not belonging to, transaction interception is carried out.
2. according to the method for claim 1, which is characterized in that the transaction index recorded according to the sample data, Confidence levels division is carried out to transaction, constructs trust model, comprising:
Credible element of transaction is screened from the transaction index that the sample data records;
According to correlation rule, the credible indexes of the credible element of transaction are calculated;The credible indexes include support, confidence level With promotion degree;
According to the credible indexes, confidence levels division will be carried out comprising the transaction of the credible element of transaction, construct credible mould Type;Confidence levels include high confidence levels.
3. according to the method for claim 2, which is characterized in that the credible indexes for calculating the credible element of transaction, Include:
To the credible element of transaction according to combining form, credible indexes are calculated.
4. according to the method for claim 2, which is characterized in that the support process for calculating the credible element of transaction Are as follows:
If credible element of transaction is m, m is the integer more than or equal to 1;
If in sample database simultaneously including m credible element of transaction, the key element in element of transaction credible for one is just Normal number of transaction is S ';
If the transaction amount amount in sample database is S;
Support W1=S '/S.
5. according to the method for claim 4, which is characterized in that the confidence process for calculating the credible element of transaction Are as follows:
If the number of transaction simultaneously containing the key element in m credible element of transaction in sample database is S1
Confidence level W2=S '/S1
6. according to the method for claim 5, which is characterized in that journey is spent in the promotion for calculating the credible element of transaction Are as follows:
If arm's length dealing amount is N, promotion degree W3=W2/ (N/S) in sample database.
7. a kind of network trading analysis system characterized by comprising
Construction part module: collecting sample data are used for, sample database is established;According to the sample data record transaction index, Confidence levels division is carried out to transaction, constructs trust model;
Trust model: the real-time deal information for intercepting to system calculates whether the real-time deal belongs to high confidence levels, If belonging to, trade;If being not belonging to, transaction interception is carried out.
8. system according to claim 7, which is characterized in that the construction part module, comprising:
Acquisition unit: collecting sample data are used for, sample database is established;The sample data includes arm's length dealing data and non- The case data of arm's length dealing;
Screening unit: for screening credible element of transaction from the transaction index that the sample data records;
Computing unit: for calculating the credible indexes of the credible element of transaction according to correlation rule;The credible indexes include Support, confidence level and promotion degree;
Division unit: for credible element of transaction being carried out confidence levels division, confidence levels include according to the credible indexes High confidence levels.
9. system according to claim 8, which is characterized in that the computing unit: being specifically used for the credible transaction Element calculates credible indexes according to combining form.
10. system according to claim 8, which is characterized in that the computing unit: being specifically used for according to following methods meter Calculate support:
If credible element of transaction is m, m is the integer more than or equal to 1;
If in sample database simultaneously including m credible element of transaction, the key element in element of transaction credible for one is just Normal number of transaction is S ';
If the transaction amount amount in sample database is S;
Support W1=S '/S.
11. system according to claim 8, which is characterized in that the computing unit: being specifically used for according to following methods meter Calculate confidence level:
If the number of transaction simultaneously containing the key element in m credible element of transaction in sample database is S1
Confidence level W2=S '/S1
12. system according to claim 8, which is characterized in that the computing unit: being specifically used for according to following methods meter Calculate promotion degree:
If arm's length dealing amount is N, promotion degree W3=W2/ (N/S) in sample database.
CN201810347857.9A 2018-04-18 2018-04-18 A kind of network trading analysis method and system Pending CN110390526A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810347857.9A CN110390526A (en) 2018-04-18 2018-04-18 A kind of network trading analysis method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810347857.9A CN110390526A (en) 2018-04-18 2018-04-18 A kind of network trading analysis method and system

Publications (1)

Publication Number Publication Date
CN110390526A true CN110390526A (en) 2019-10-29

Family

ID=68282590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810347857.9A Pending CN110390526A (en) 2018-04-18 2018-04-18 A kind of network trading analysis method and system

Country Status (1)

Country Link
CN (1) CN110390526A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164474A (en) * 2011-12-15 2013-06-19 中国移动通信集团贵州有限公司 Method for analyzing data service
CN105279691A (en) * 2014-07-25 2016-01-27 中国银联股份有限公司 Financial transaction detection method and equipment based on random forest model
CN105512781A (en) * 2014-09-26 2016-04-20 阿里巴巴集团控股有限公司 Transaction processing method and transaction processing device
CN105976242A (en) * 2016-04-21 2016-09-28 中国农业银行股份有限公司 Transaction fraud detection method and system based on real-time streaming data analysis
CN107767138A (en) * 2017-10-20 2018-03-06 杭州呯嘭智能技术有限公司 On-line payment is counter to cheat method and system
CN108537671A (en) * 2018-04-27 2018-09-14 广州品唯软件有限公司 A kind of transaction risk appraisal procedure and system
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164474A (en) * 2011-12-15 2013-06-19 中国移动通信集团贵州有限公司 Method for analyzing data service
CN105279691A (en) * 2014-07-25 2016-01-27 中国银联股份有限公司 Financial transaction detection method and equipment based on random forest model
CN105512781A (en) * 2014-09-26 2016-04-20 阿里巴巴集团控股有限公司 Transaction processing method and transaction processing device
CN105976242A (en) * 2016-04-21 2016-09-28 中国农业银行股份有限公司 Transaction fraud detection method and system based on real-time streaming data analysis
CN107767138A (en) * 2017-10-20 2018-03-06 杭州呯嘭智能技术有限公司 On-line payment is counter to cheat method and system
CN108537671A (en) * 2018-04-27 2018-09-14 广州品唯软件有限公司 A kind of transaction risk appraisal procedure and system
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior

Similar Documents

Publication Publication Date Title
US20210174440A1 (en) Providing virtual markers based upon network connectivity
US20210232608A1 (en) Trust scores and/or competence ratings of any entity
US11023963B2 (en) Detection of compromise of merchants, ATMs, and networks
US10467631B2 (en) Ranking and tracking suspicious procurement entities
EP3125186A1 (en) Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US20190087821A1 (en) Hierarchical profiling inputs and self-adaptive fraud detection system
US20210287303A9 (en) Scoring trustworthiness, competence, and/or compatibility of any entity for activities including recruiting or hiring decisions, composing a team, insurance underwriting, credit decisions, or shortening or improving sales cycles
CN106033575A (en) Risk account identification method and apparatus
CN109213857A (en) A kind of fraud recognition methods and device
CN109313541A (en) For showing and the user interface of comparison attacks telemetering resource
Salau et al. Data cooperatives for neighborhood watch
CN111598713A (en) Cluster recognition method and device based on similarity weight updating and electronic equipment
KR102042442B1 (en) Regtech platform apparatus for digital compliance and risk management, method for risk management of financial transactions and computer program for the same
Zhang Risk assessment of supply chain finance with intuitionistic fuzzy information
US20220164874A1 (en) Privacy Separated Credit Scoring System
Mou et al. Microlending on mobile social credit platforms: an exploratory study using Philippine loan contracts
US20180365687A1 (en) Fraud detection
CN110428240A (en) The suspicious transaction automatic identification of one kind and processing method, terminal and server
CA3033793C (en) Scoring trustworthiness, competence, and/or compatibility of any entity for activities including recruiting or hiring decisions, skip tracing, insurance underwriting, credit decisions, or shortening or improving sales cycles
CN206497498U (en) A kind of integrated system of credit rating information data based on enterprise's reference business
US20210357942A1 (en) Method and apparatus for identifying risky vertices
Chatterjee et al. Next Generation Financial Services: Role of Blockchain enabled Federated Learning and Metaverse
CN110390526A (en) A kind of network trading analysis method and system
KR20200112622A (en) Regtech platform apparatus for digital compliance and risk management, method for risk management of financial transactions and computer program for the same
Shirazi et al. A New Model for Information Security Risk Management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210730

Address after: Room 834, Yingying building, 99 Tuanjie Road, yanchuangyuan, Jiangbei new district, Nanjing, Jiangsu 210000

Applicant after: Nanjing Xingyun Digital Technology Co.,Ltd.

Address before: 210042 Suning Headquarters, No. 1 Suning Avenue, Xuanwu District, Nanjing City, Jiangsu Province

Applicant before: SUNING.COM Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20191029

RJ01 Rejection of invention patent application after publication