TW202006642A - Risk prevention and control method and system, and terminal device - Google Patents

Risk prevention and control method and system, and terminal device Download PDF

Info

Publication number
TW202006642A
TW202006642A TW108115873A TW108115873A TW202006642A TW 202006642 A TW202006642 A TW 202006642A TW 108115873 A TW108115873 A TW 108115873A TW 108115873 A TW108115873 A TW 108115873A TW 202006642 A TW202006642 A TW 202006642A
Authority
TW
Taiwan
Prior art keywords
address
transaction
elements
list
text similarity
Prior art date
Application number
TW108115873A
Other languages
Chinese (zh)
Inventor
劉志鵬
朱通
趙華
鍾飛
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202006642A publication Critical patent/TW202006642A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/194Calculation of difference between files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping

Abstract

The embodiments of the present description provide a risk prevention and control method and system, and a terminal device. The risk prevention and control method comprises: processing, on the basis of logistics address information for a user to perform a real-time transaction, to obtain a plurality of address elements; determining text similarities between the address elements in a temporary list and preset address elements in a preset list, the temporary list being used to mark the plurality of address elements; and on the basis of the text similarities of the address elements, determining whether to execute the transaction.

Description

風險防控方法、系統及終端設備Risk prevention and control method, system and terminal equipment

本說明書實施例涉及資訊安全技術領域,尤其涉及一種風險防控方法、系統及終端設備。The embodiments of the present specification relate to the field of information security technology, and in particular, to a risk prevention and control method, system, and terminal equipment.

在國際物流的風險防控場景中,當被盜用的銀行卡的發卡國家與使用該銀行卡購買的商品所運往的國家(為了便於描述,簡稱為物流國家)不同時,為了盡可能掩蓋盜用行為,有些盜用者會將物流國家偽裝為被盜銀行卡的發卡國家,同時,具體的物流位址填寫的相對模糊,如在州或城市名稱上增減字母,或在州或城市名稱上添加特殊字元等。 現有的風險防控方法是對物流位址進行攔截,透過識別物流位址的州或城市中的關鍵字進行風險防控。但是,盜用者可以透過對物流位址的州或城市名稱進行簡單修改,來繞過風險防控系統的關鍵字識別,需要不斷對關鍵字進行調整來達到風險防控的目的,成本較大。In the risk prevention and control scenario of international logistics, when the issuing country of the stolen bank card is different from the country to which the goods purchased with the bank card are shipped (for convenience of description, referred to as the logistics country), in order to cover up the misappropriation as much as possible , Some pirates will disguise the logistics country as the country of issue of the stolen bank card, and at the same time, the specific logistics address is relatively ambiguous, such as adding or subtracting letters to the state or city name, or adding special to the state or city name Characters, etc. The existing risk prevention and control method is to intercept the logistics address and carry out risk prevention and control by identifying keywords in the state or city of the logistics address. However, the pirate can bypass the keyword identification of the risk prevention and control system by simply modifying the name of the state or city of the logistics address. It is necessary to constantly adjust the keywords to achieve the purpose of risk prevention and control, and the cost is relatively large.

本說明書實施例提供一種風險防控方法、系統及終端設備,以解決現有技術中的風險防控方法需要不斷對關鍵字進行調整來達到風險防控的目的,所帶來的成本較大的問題。 本說明書實施例採用下述技術方案: 第一態樣,提供了一種風險防控方法,包括: 基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,所述臨時清單用於標記所述多個位址元素; 基於所述位址元素的文本相似度,確定是否執行所述交易。 第二態樣,提供了一種風險防控系統,包括: 處理模組,用於基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 第一確定模組,用於確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,所述臨時清單用於標記所述多個位址元素; 第二確定模組,用於基於所述位址元素的文本相似度,確定是否執行所述交易。 第三態樣,提供了一種終端設備,包括:記憶體、處理器及儲存在所述記憶體上並可在所述處理器上運行的電腦程式,所述電腦程式被所述處理器執行時實現如下步驟: 基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,所述臨時清單用於標記所述多個位址元素; 基於所述位址元素的文本相似度,確定是否執行所述交易。 第四態樣,提供了一種電腦可讀儲存媒體,所述電腦可讀儲存媒體上儲存有電腦程式,所述電腦程式被處理器執行時實現如下步驟: 基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,所述臨時清單用於標記所述多個位址元素; 基於所述位址元素的文本相似度,確定是否執行所述交易。 本說明書實施例採用的上述至少一個技術方案能夠達到以下有益效果: 本說明書實施例基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,再基於臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,確定是否執行交易,能夠動態捕捉物流位址的模糊修改,無需對關鍵字進行調整,成本較低,能夠達到更好的風控效果。The embodiments of the present specification provide a risk prevention and control method, system and terminal equipment to solve the problem that the risk prevention and control method in the prior art needs to continuously adjust keywords to achieve the purpose of risk prevention and control, which brings about a large cost . The embodiments of this specification adopt the following technical solutions: In the first aspect, it provides a risk prevention and control method, including: Multiple address elements are obtained based on the processing of logistics address information for real-time transactions of users; Determining the text similarity between the address element in the temporary list and the preset address element in the preset list, the temporary list is used to mark the plurality of address elements; Based on the text similarity of the address elements, it is determined whether to execute the transaction. The second aspect provides a risk prevention and control system, including: The processing module is used to process multiple address elements based on the logistics address information for real-time transactions of users; The first determining module is used to determine the text similarity between the address element in the temporary list and the preset address element in the preset list, and the temporary list is used to mark the plurality of address elements; The second determining module is used to determine whether to execute the transaction based on the text similarity of the address elements. In a third aspect, a terminal device is provided, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, when the computer program is executed by the processor Implement the following steps: Multiple address elements are obtained based on the processing of logistics address information for real-time transactions of users; Determining the text similarity between the address element in the temporary list and the preset address element in the preset list, the temporary list is used to mark the plurality of address elements; Based on the text similarity of the address elements, it is determined whether to execute the transaction. In a fourth aspect, a computer-readable storage medium is provided, and a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the following steps are implemented: Multiple address elements are obtained based on the processing of logistics address information for real-time transactions of users; Determining the text similarity between the address element in the temporary list and the preset address element in the preset list, the temporary list is used to mark the plurality of address elements; Based on the text similarity of the address elements, it is determined whether to execute the transaction. The above at least one technical solution adopted in the embodiments of the present specification can achieve the following beneficial effects: The embodiment of the present specification is based on processing the logistics address information of the user's real-time transaction to obtain multiple address elements, and then based on the text similarity between the address element in the temporary list and the preset address element in the preset list to determine Whether to execute the transaction, it can dynamically capture the fuzzy modification of the logistics address, without the need to adjust keywords, the cost is lower, and a better risk control effect can be achieved.

為使本說明書的目的、技術方案和優點更加清楚,下面將結合本說明書具體實施例及相應的圖式對本說明書技術方案進行清楚、完整地描述。顯然,所描述的實施例僅是本說明書一部分實施例,而不是全部的實施例。基於本說明書中的實施例,本領域普通技術人員在沒有做出創造性勞動前提下所獲得的所有其他實施例,都屬於本說明書保護的範圍。 本說明書實施例提供一種風險防控方法、系統及終端設備,以解決現有技術中的風險防控方法需要不斷對關鍵字進行調整來達到風險防控的目的,所帶來的成本較大的問題。本說明書實施例提供一種風險防控方法,該方法的執行主體,可以但不限於終端設備或能夠被配置為執行本說明書實施例提供的該方法的裝置或系統。 為便於描述,下文以該方法的執行主體為能夠執行該方法的終端設備為例,對該方法的實施方式進行介紹。可以理解,該方法的執行主體為終端設備只是一種示例性的說明,並不應理解為對該方法的限定。 本說明書實施例提供的風險防控方法可以應用於國際物流或國內物流,本說明書實施例以應用於國際物流為例進行詳細說明。 圖1為本說明書實施例提供的風險防控方法的流程圖,圖1的方法可以由終端設備執行。如圖1所示,該方法可以包括: 步驟110、基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素。 其中,對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,具體實現可以為: 對用戶進行即時交易的物流位址資訊進行拆分,得到多個位址元素;或者,對用戶進行即時交易的物流位址資訊進行重組,得到多個位址元素。 步驟120、確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。 該臨時清單由多個位址元素創建而成的,該臨時清單用於標記所述多個位址元素。 該預設位址元素可以指正確的物流位址中的各個組成部分。 該預設清單是由鎖個預設位址元素創建而成的。 在本說明書實施例中,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,實現方式可以包括以下幾種: 第一,透過文本編輯距離演算法,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度; 第二,透過夾角餘弦演算法,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度; 第三,透過歐幾里得距離演算法,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。 步驟130、基於所述位址元素的文本相似度,確定是否執行所述交易。 其中,基於位址元素的文本相似度,確定是否執行所述交易,具體可以為:若位址元素的文本相似度值大於閾值,則終止執行交易;若位址元素的文本相似度值小於等於閾值,則繼續執行交易。 本說明書實施例基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,再基於臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,確定是否執行交易,能夠動態捕捉物流位址的模糊修改,無需對關鍵字進行調整,成本較低,能夠達到更好的風控效果。 可選的,作為一個實施例,步驟120具體可實現為: 基於所述位址元素對應的字串轉換成所述預設位址元素對應的字串所需的最少編輯操作次數,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。 示例性的,以位址元素為Cohinnd,預設位址元素為China為例: 需要計算Cohinnd和China的編輯距離:Cohinnd→Cohinna→Cohina→China 首先,創建7×9的表1(Cohinnd長度為7,China長度為5,各加2)

Figure 02_image001
然後,如下位置填入數字,如表2所示:
Figure 02_image003
從3,3格開始,開始計算。取以下三個值的最小值: 如果最上方的字元等於最左方的字元,則為左上方的數字。否則為左上方的數字+1。(對於3,3來說為1) 左方數字+1(對於3,3格來說為2) 上方數字+1(對於3,3格來說為2) 因此,3,3格為0,如表3所示:
Figure 02_image005
從3,4(三行四列)格開始,開始計算。取以下三個值的最小值: 如果最上方的字元等於最左方的字元,則為左上方的數字。否則為左上方的數字+1。(對於3,4來說為2) 左方數字+1(對於3,4格來說為1) 上方數字+1(對於3,4格來說為3) 因此,格3,4為1,如表4所示:
Figure 02_image007
迴圈操作,得到表5
Figure 02_image009
取右下角,得編輯距離為2。 本說明書實施例基於位址元素對應的字串轉換成預設位址元素對應的字串所需的最少編輯操作次數,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,可以動態捕捉位址元素的修改,從而更好的達到風控效果。 可選的,作為一個實施例,步驟120具體可實現為: 基於所述臨時清單中的位址元素和所述預設清單中的預設位址元素,分別建立與位址元素和預設位址元素對應的向量; 基於所述位址元素和預設位址元素對應的向量的餘弦值,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。 示例性的,對於二維空間,假設位址元素和預設位址元素對應的向量分別為a、b ,顯然可以得知:
Figure 02_image011
假設向量a、b的座標分別為(x1 ,y1 )、(x2 ,y2 )。則:
Figure 02_image013
其中,餘弦值的範圍在[-1,1]之間,值越趨近於1,代表兩個向量的方向越接近,即位址元素和預設位址元素越相似,相似度值越小;越趨近於-1,他們的方向越相反,即位址元素和預設位址元素越不同,相似度值越大。 本說明書實施例基於臨時清單中的位址元素和預設清單中的預設位址元素,分別建立與位址元素和預設位址元素對應的向量;基於位址元素和預設位址元素對應的向量的餘弦值,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,可以動態捕捉位址元素的修改,從而更好的達到風控效果。 可選的,作為一個實施例,步驟110具體可實現為: 以分隔符號為拆分節點,將用戶進行即時交易的物流位址資訊進行拆分,得到多個位址元素。 該分隔符號可以為常用分隔符號,該常用分隔符號可以為空格、底線、逗號、分號。示例性的,常用分隔符號 (“-”,“_”,“,”,“ ”)。 示例性的,假設物流地址為China Beijing chaoyangqu,則以分隔符號為拆分節點,將用戶進行即時交易的物流位址資訊進行拆分後,得到多個位址元素分別為China、Beijing、chaoyangqu。 本說明書實施例透過以分隔符號為拆分節點,將用戶進行即時交易的物流位址資訊進行拆分,以對物流位址資訊進行簡單的拆分,得到該物流位址的各個元素,以便於後續對各個元素進行文本相似度確定,無需進行任何調整即可即時對各個元素的模糊修改進行捕捉,為達到更好的風控效果奠定基礎。 可選的,作為一個實施例,在執行步驟110之前,本說明書實施例提供的風險防控方法還可以包括: 在基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素之前,還包括: 獲取用戶進行即時交易的交易資料; 若所述交易資料滿足風險條件,則確定所述交易資料對應的交易為風險交易;所述風險條件為具有盜用交易資訊行為的條件; 步驟110具體可實現為: 基於所述風險交易的物流位址資訊進行處理得到多個位址元。 本說明書實施例透過對用戶進行即時交易的交易資料進行篩選,篩選出具有風險的交易(即風險交易),並基於風險交易的物流位址資訊進行處理得到多個位址元,使得對進行即時交易的交易資料進行初步篩選,減少資料量,減少記憶體的佔用空間,提高效率。 可選的,作為一個實施例,步驟130具體可實現為: 若得到的最大的文本相似度值大於閾值,則終止執行所述交易; 若得到的最大的文本相似度值小於等於閾值,則繼續執行所述交易。 本說明書實施例中,透過在多個位址元素中選取文本相似度值最大的,若最大的文本相似度值大於閾值,則終止執行所述交易;若最大的文本相似度值大於閾值,則終止執行所述交易,可以動態捕捉位址元素的模糊修改,可以根據地址元素的模糊修改即時判定是否執行交易,提高了安全性,能夠達到更好的風控效果。 下面將結合具體的實施例,對本發明實施例的方法做進一步的描述。 圖2示出了本發明實施例提供的業務的風險防控方法在實際應用場景下的流程圖; 具體地說,如圖2所示: 在210,獲取用戶進行即時交易的交易資料; 在220,若所述交易資料滿足風險條件,則確定所述交易資料對應的交易為風險交易;所述風險條件為具有盜用交易資訊行為的條件; 在230,基於所述風險交易的物流位址資訊進行處理得到多個位址元素; 其中,對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,具體實現可以為:對用戶進行即時交易的物流位址資訊進行拆分,得到多個位址元素;或者,對用戶進行即時交易的物流位址資訊進行重組,得到多個位址元素。 在240,基於多個位址元素創建臨時清單; 在250,基於所述位址元素對應的字串轉換成所述預設位址元素對應的字串所需的最少編輯操作次數,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。 在260,對計算出的所有位址元素的文本相似度值,取最大的文本相似度值; 在270,將取得的最大的文本相似度值與閾值進行比較,確定最大的文本相似度值是否大於閾值; 在280,若得到的最大的文本相似度值大於閾值,則終止執行所述交易; 在290,若得到的最大的文本相似度值小於等於閾值,則繼續執行交易。 本說明書實施例中的各個步驟的具體實現及對應的有益效果詳見上述實施例中的相關內容,本說明書實施例不再贅述。 本說明書實施例基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,再基於臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,確定是否執行交易,能夠動態捕捉物流位址的模糊修改,無需對關鍵字進行調整,成本較低,能夠達到更好的風控效果。 以上,結合圖1至圖2詳細說明了本說明書實施例的風險防控方法,下面,結合圖3,詳細說明本說明書實施例的風險防控系統。 圖3示出了本說明書實施例提供的風險防控系統的結構示意圖,如圖3所示,該風險防控系統300可以包括: 處理模組310,用於基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 第一確定模組320,用於確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,所述臨時清單用於標記所述多個位址元素; 第二確定模組330,用於基於所述位址元素的文本相似度,確定是否執行所述交易。 在一種實施例中,所述第一確定模組320可以包括: 第一確定單元,用於基於所述位址元素對應的字串轉換成所述預設位址元素對應的字串所需的最少編輯操作次數,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。 在一種實施例中,所述第一確定模組320可以包括: 建立單元,用於基於所述臨時清單中的位址元素和所述預設清單中的預設位址元素,分別建立與位址元素和預設位址元素對應的向量; 第二確定單元,用於基於所述位址元素和預設位址元素對應的向量的餘弦值,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。 在一種實施例中,所述處理模組310可以包括: 拆分單元,用於以分隔符號為拆分節點,將用戶進行即時交易的物流位址資訊進行拆分,得到多個位址元素。 在一種實施例中,風險防控系統300還可以包括: 獲取模組340,用於獲取用戶進行即時交易的交易資料; 第三確定模組350,用於若所述交易資料滿足風險條件,則確定所述交易資料對應的交易為風險交易;所述風險條件為具有盜用交易資訊行為的條件; 處理模組310可以包括:處理單元,用於基於所述風險交易的物流位址資訊進行處理得到多個位址元素。 在一種實施例中,所述第二確定模組330可以包括: 執行單元,用於若得到的最大的文本相似度值大於閾值,則終止執行所述交易;若得到的最大的文本相似度值小於等於閾值,則繼續執行所述交易。 本說明書實施例基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,再基於臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,確定是否執行交易,能夠動態捕捉物流位址的模糊修改,無需對關鍵字進行調整,成本較低,能夠達到更好的風控效果。 圖4是本說明書的一個實施例提供的終端設備的結構示意圖。請參考圖4,在硬體層面,該終端設備包括處理器,可選地還包括內部匯流排、網路介面、儲存器。其中,儲存器可能包含記憶體,例如高速隨機存取記憶體(Random-Access Memory,RAM),也可能還包括非易失性記憶體(non-volatile memory),例如至少1個磁碟記憶體等。當然,該終端設備還可能包括其他業務所需要的硬體。 處理器、網路介面和儲存器可以透過內部匯流排相互連接,該內部匯流排可以是ISA(Industry Standard Architecture,工業標準架構)匯流排、PCI(Peripheral Component Interconnect,外設部件互連標準)匯流排或EISA(Extended Industry Standard Architecture,延伸工業標準架構)匯流排等。所述匯流排可以分為位址匯流排、資料匯流排、控制匯流排等。為便於表示,圖4中僅用一個雙向箭頭表示,但並不表示僅有一根匯流排或一種類型的匯流排。 儲存器,用於存放程式。具體地,程式可以包括程式碼,所述程式碼包括電腦操作指令。儲存器可以包括記憶體和非易失性記憶體,並向處理器提供指令和資料。 處理器從非易失性記憶體中讀取對應的電腦程式到記憶體中然後運行,在邏輯層面上形成資源增值物件與資源物件的關聯裝置。處理器,執行儲存器所存放的程式,並具體用於執行以下操作: 基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,所述臨時清單用於標記所述多個位址元素; 基於所述位址元素的文本相似度,確定是否執行所述交易。 本說明書實施例基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,再基於臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,確定是否執行交易,能夠動態捕捉物流位址的模糊修改,無需對關鍵字進行調整,成本較低,能夠達到更好的風控效果。 上述如本說明書圖1所示實施例揭示的風險防控方法可以應用於處理器中,或者由處理器實現。處理器可能是一種積體電路晶片,具有信號的處理能力。在實現過程中,上述方法的各步驟可以透過處理器中的硬體的積體邏輯電路或者軟體形式的指令完成。上述的處理器可以是通用處理器,包括中央處理器(Central Processing Unit,CPU)、網路處理器(Network Processor,NP)等;還可以是數位訊號處理器(Digital Signal Processor,DSP)、專用積體電路(Application Specific Integrated Circuit,ASIC)、現場可程式設計閘陣列(Field-Programmable Gate Array,FPGA)或者其他可程式設計邏輯裝置、分立閘或者電晶體邏輯裝置、分立硬體元件。可以實現或者執行本說明書一個或多個實施例中的公開的各方法、步驟及邏輯方塊圖。通用處理器可以是微處理器或者該處理器也可以是任何一般的處理器等。結合本說明書一個或多個實施例所公開的方法的步驟可以直接體現為硬體解碼處理器執行完成,或者用解碼處理器中的硬體及軟體模組組合執行完成。軟體模組可以位於隨機記憶體,快閃記憶體、唯讀記憶體,可程式設計唯讀記憶體或者電可讀寫可程式設計記憶體、寄存器等本領域成熟的儲存媒體中。該儲存媒體位於儲存器,處理器讀取儲存器中的資訊,結合其硬體完成上述方法的步驟。 該終端設備還可執行圖3的風險防控系統所執行圖1的風險防控方法,本說明書在此不再贅述。 當然,除了軟體實現方式之外,本說明書的終端設備並不排除其他實現方式,比如邏輯裝置抑或軟硬體結合的方式等等,也就是說以下處理流程的執行主體並不限定於各個邏輯單元,也可以是硬體或邏輯裝置。 本說明書實施例還提供一種電腦可讀儲存媒體,電腦可讀儲存媒體上儲存有電腦程式,該電腦程式被處理器執行時實現上述各個方法實施例的各個過程,且能達到相同的技術效果,為避免重複,這裡不再贅述。其中,所述的電腦可讀儲存媒體,如唯讀記憶體(Read-Only Memory,簡稱ROM)、隨機存取記憶體(Random Access Memory,簡稱RAM)、磁碟或者光碟等。 本領域內的技術人員應明白,本說明書的實施例可提供為方法、系統、或電腦程式產品。因此,本說明書可採用完全硬體實施例、完全軟體實施例、或結合軟體和硬體方面的實施例的形式。而且,本說明書可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。 本說明書是參照根據本說明書實施例的方法、設備(系統)、和電腦程式產品的流程圖和/或方塊圖來描述的。應理解可由電腦程式指令實現流程圖和/或方塊圖中的每一流程和/或方塊、以及流程圖和/或方塊圖中的流程和/或方塊的結合。可提供這些電腦程式指令到通用電腦、專用電腦、嵌入式處理機或其他可程式設計資料處理設備的處理器以產生一個機器,使得透過電腦或其他可程式設計資料處理設備的處理器執行的指令產生用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的系統。 這些電腦程式指令也可儲存在能引導電腦或其他可程式設計資料處理設備以特定方式工作的電腦可讀儲存器中,使得儲存在該電腦可讀儲存器中的指令產生包括指令系統的製造品,該指令系統實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能。 這些電腦程式指令也可裝載到電腦或其他可程式設計資料處理設備上,使得在電腦或其他可程式設計設備上執行一系列操作步驟以產生電腦實現的處理,從而在電腦或其他可程式設計設備上執行的指令提供用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的步驟。 在一個典型的配置中,電腦設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和記憶體。 記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或非易失性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。記憶體是電腦可讀媒體的示例。 電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可程式設計唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁片儲存或其他磁性存放裝置或任何其他非傳輸媒體,可用於儲存可以被電腦設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 上述對說明書特定實施例進行了描述。其它實施例在申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在圖式中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多工處理和並行處理也是可以的或者可能是有利的。 還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括要素的過程、方法、商品或者設備中還存在另外的相同要素。 以上僅為本說明書的實施例而已,並不用於限制本說明書。對於本領域技術人員來說,本說明書可以有各種更改和變化。凡在本說明書的精神和原理之內所作的任何修改、等同替換、改進等,均應包含在本說明書的申請專利範圍的範圍之內。In order to make the purpose, technical solutions and advantages of the specification clearer, the technical solutions of the specification will be described clearly and completely in conjunction with the specific embodiments of the specification and the corresponding drawings. Obviously, the described embodiments are only a part of the embodiments of this specification, but not all the embodiments. Based on the embodiments in this specification, all other embodiments obtained by those of ordinary skill in the art without making creative efforts fall within the protection scope of this specification. The embodiments of the present specification provide a risk prevention and control method, system and terminal equipment to solve the problem that the risk prevention and control method in the prior art needs to continuously adjust keywords to achieve the purpose of risk prevention and control, which brings about a large cost . The embodiments of the present specification provide a risk prevention and control method. The execution subject of the method may be, but not limited to, a terminal device or an apparatus or system that can be configured to execute the method provided by the embodiments of the present specification. For ease of description, the following describes the implementation of the method by taking an example in which the method is executed as a terminal device capable of executing the method. It can be understood that the execution subject of the method is the terminal device, which is only an exemplary description, and should not be understood as a limitation of the method. The risk prevention and control methods provided in the embodiments of the present specification can be applied to international logistics or domestic logistics. The embodiments of the present specification are described in detail by applying the example to international logistics. FIG. 1 is a flowchart of a risk prevention and control method provided by an embodiment of the present specification. The method of FIG. 1 may be executed by a terminal device. As shown in FIG. 1, the method may include: Step 110: Processing multiple logistics address information based on logistics address information for real-time transactions with users. Among them, the logistics address information of the user's real-time transaction is processed to obtain multiple address elements. The specific implementation can be: the logistics address information of the user's real-time transaction is split to obtain multiple address elements; or, the The logistics address information of users performing real-time transactions is reorganized to obtain multiple address elements. Step 120: Determine the text similarity between the address element in the temporary list and the preset address element in the preset list. The temporary list is created from multiple address elements, and the temporary list is used to mark the multiple address elements. The preset address element may refer to each component in the correct logistics address. The preset list is created by locking a preset address element. In the embodiment of the present specification, to determine the text similarity between the address element in the temporary list and the preset address element in the preset list, the implementation method may include the following: First, through the text editing distance algorithm, determine The text similarity between the address element in the temporary list and the default address element in the default list; Second, the angle cosine algorithm is used to determine the address element in the temporary list and the default address in the default list The text similarity of the elements. Third, through the Euclidean distance algorithm, the text similarity between the address elements in the temporary list and the default address elements in the preset list is determined. Step 130: Determine whether to execute the transaction based on the text similarity of the address elements. Among them, determining whether to execute the transaction based on the text similarity of the address element may specifically be: if the text similarity value of the address element is greater than the threshold, the execution of the transaction is terminated; if the text similarity value of the address element is less than or equal to Threshold, then continue to execute the transaction. The embodiment of the present specification is based on processing the logistics address information of the user's real-time transaction to obtain multiple address elements, and then based on the text similarity between the address element in the temporary list and the preset address element in the preset list to determine Whether to execute the transaction, it can dynamically capture the fuzzy modification of the logistics address, without the need to adjust keywords, the cost is lower, and a better risk control effect can be achieved. Optionally, as an embodiment, step 120 may be specifically implemented as follows: based on the minimum number of editing operations required to convert the string corresponding to the address element into the string corresponding to the preset address element, determine the temporary list The text similarity between the address element in and the default address element in the default list. Exemplarily, taking the address element as Cohinnd and the default address element as China as an example: The editing distance between Cohinnd and China needs to be calculated: Cohinnd→Cohinna→Cohina→China First, create a 7×9 table 1 (Cohinnd length is 7, China length is 5, plus 2)
Figure 02_image001
Then, fill in the numbers in the following positions, as shown in Table 2:
Figure 02_image003
Starting at 3 and 3, start counting. Take the minimum of the following three values: If the uppermost character is equal to the leftmost character, it is the upper left number. Otherwise, the number at the top left is +1. (1 for 3 and 3) Left digit +1 (2 for 3 and 3 grids) Upper digit +1 (2 for 3 and 3 grids) Therefore, 3 and 3 grids are 0, as shown in Table 3:
Figure 02_image005
Starting from the 3, 4 (three rows and four columns) grid, start counting. Take the minimum of the following three values: If the uppermost character is equal to the leftmost character, it is the upper left number. Otherwise, the number at the top left is +1. (2 for 3 and 4) Left digit +1 (1 for 3 and 4 squares) Upper digit +1 (3 for 3 and 4 squares) Therefore, squares 3 and 4 are 1, As shown in Table 4:
Figure 02_image007
Loop operation, get Table 5
Figure 02_image009
Take the lower right corner, the edit distance is 2. The embodiment of the present specification determines the address element in the temporary list and the default address element in the default list based on the minimum number of editing operations required to convert the string corresponding to the address element into the string corresponding to the default address element The similarity of the text can dynamically capture the modification of the address element, so as to better achieve the effect of risk control. Optionally, as an embodiment, step 120 may be specifically implemented as follows: based on the address element in the temporary list and the preset address element in the preset list, create an address element and a preset bit respectively The vector corresponding to the address element; based on the cosine value of the vector corresponding to the address element and the preset address element, determine the text similarity between the address element in the temporary list and the preset address element in the preset list. Exemplarily, for a two-dimensional space, assuming that the vectors corresponding to the address element and the default address element are a and b, respectively, it is obvious that:
Figure 02_image011
Assume that the coordinates of vectors a and b are (x 1 , y 1 ) and (x 2 , y 2 ), respectively. then:
Figure 02_image013
Among them, the range of the cosine value is between [-1,1], the closer the value is to 1, the closer the direction of the two vectors is, that is, the more similar the address element and the preset address element are, the smaller the similarity value; The closer to -1, the more opposite their direction is, that is, the more different the address element and the default address element are, the greater the similarity value. In the embodiment of the present specification, based on the address elements in the temporary list and the default address elements in the default list, vectors corresponding to the address elements and the default address elements are created respectively; based on the address elements and the default address elements The cosine value of the corresponding vector determines the text similarity between the address element in the temporary list and the preset address element in the preset list, and can dynamically capture the modification of the address element to better achieve the wind control effect. Optionally, as an embodiment, step 110 may be specifically implemented as: using a separator as a splitting node to split the logistics address information of the user for real-time transactions to obtain multiple address elements. The separator may be a common separator, and the common separator may be a space, underline, comma, or semicolon. Exemplary, commonly used separators ("-", "_", ",", ""). Exemplarily, assuming that the logistics address is China Beijing chaoyangqu, the separator symbol is used as a split node to split the logistics address information of the user's real-time transaction, and multiple address elements are obtained, namely China, Beijing, and chaoyangqu. In this embodiment of the present specification, by using the delimiting symbol as a splitting node, the logistics address information of the user for real-time transactions is split to simply split the logistics address information to obtain each element of the logistics address, so as to facilitate Subsequent determination of the text similarity of each element, without any adjustment, can immediately capture the fuzzy modification of each element, and lay the foundation for a better wind control effect. Optionally, as an embodiment, before performing step 110, the risk prevention and control method provided by the embodiment of the present specification may further include: before processing multiple logistics elements based on logistics address information for real-time transactions with users It also includes: Obtaining transaction data of the user for real-time transactions; if the transaction data meets the risk conditions, then determine that the transaction corresponding to the transaction data is a risk transaction; the risk condition is a condition of having misappropriated transaction information; Step 110 Specifically, it can be implemented as follows: the logistics address information based on the risk transaction is processed to obtain multiple address elements. In this embodiment of the specification, through screening the transaction data of the user's real-time transactions, the risky transactions (ie, risk transactions) are selected, and the logistics address information based on the risk transactions is processed to obtain multiple address elements, so that the real-time The transaction data of the transaction is preliminarily screened to reduce the amount of data, reduce the memory footprint, and improve efficiency. Optionally, as an embodiment, step 130 may be specifically implemented as follows: if the obtained maximum text similarity value is greater than the threshold, the execution of the transaction is terminated; if the obtained maximum text similarity value is less than or equal to the threshold, continue Perform the transaction. In the embodiment of the present specification, by selecting the largest text similarity value among multiple address elements, if the largest text similarity value is greater than the threshold, the execution of the transaction is terminated; if the largest text similarity value is greater than the threshold, then When the execution of the transaction is terminated, the fuzzy modification of the address element can be dynamically captured, and whether the transaction is executed can be immediately determined according to the fuzzy modification of the address element, which improves the security and can achieve a better risk control effect. The method of the embodiments of the present invention will be further described below in conjunction with specific embodiments. FIG. 2 shows a flowchart of a business risk prevention and control method provided by an embodiment of the present invention in an actual application scenario; specifically, as shown in FIG. 2: At 210, acquiring transaction data of a user performing an instant transaction; at 220 , If the transaction data meets the risk conditions, the transaction corresponding to the transaction data is determined to be a risk transaction; the risk condition is a condition with the behavior of misappropriating transaction information; at 230, based on the logistics address information of the risk transaction Multiple address elements are obtained by processing; among them, the logistics address information for real-time transactions of users is processed to obtain multiple address elements. The specific implementation may be: the logistics address information for real-time transactions of users is split to obtain more Address elements; or, reorganize the logistics address information of the user's real-time transactions to obtain multiple address elements. At 240, a temporary list is created based on multiple address elements; at 250, a temporary list is determined based on the minimum number of editing operations required to convert the string corresponding to the address element into the string corresponding to the default address element The text similarity between the address element in and the default address element in the default list. At 260, for the calculated text similarity values of all address elements, the largest text similarity value is taken; at 270, the obtained maximum text similarity value is compared with a threshold to determine whether the largest text similarity value Greater than the threshold; at 280, if the obtained maximum text similarity value is greater than the threshold, the execution of the transaction is terminated; at 290, if the obtained maximum text similarity value is less than or equal to the threshold, the execution of the transaction is continued. For the specific implementation of each step in the embodiments of this specification and the corresponding beneficial effects, please refer to the relevant content in the above embodiments for details, and the embodiments of this specification will not be repeated here. The embodiment of the present specification is based on processing the logistics address information of the user's real-time transaction to obtain multiple address elements, and then based on the text similarity between the address element in the temporary list and the preset address element in the preset list to determine Whether to execute the transaction, it can dynamically capture the fuzzy modification of the logistics address, without the need to adjust keywords, the cost is lower, and a better risk control effect can be achieved. Above, the risk prevention and control method of the embodiment of the present specification has been described in detail with reference to FIGS. 1 to 2, and below, the risk prevention and control system of the embodiment of the present specification will be described in detail with reference to FIG. FIG. 3 shows a schematic structural diagram of a risk prevention and control system provided by an embodiment of the present specification. As shown in FIG. 3, the risk prevention and control system 300 may include: a processing module 310, which is used for logistics based on real-time transactions with users The address information is processed to obtain multiple address elements; the first determining module 320 is used to determine the text similarity between the address elements in the temporary list and the default address elements in the default list, the temporary list is used for Mark the plurality of address elements; a second determination module 330 is used to determine whether to execute the transaction based on the text similarity of the address elements. In an embodiment, the first determining module 320 may include: a first determining unit, configured to convert a word string corresponding to the address element into a word string corresponding to the preset address element Minimum number of editing operations to determine the text similarity between the address element in the temporary list and the default address element in the default list. In an embodiment, the first determining module 320 may include: a creating unit, configured to create a separate bit based on the address element in the temporary list and the default address element in the preset list A vector corresponding to the address element and the preset address element; a second determining unit, configured to determine the address element and the preset list in the temporary list based on the cosine value of the vector corresponding to the address element and the preset address element The text similarity of the default address element in. In one embodiment, the processing module 310 may include: a splitting unit, which is used to split the logistics address information of the user's real-time transaction using the delimiting symbol as a splitting node to obtain multiple address elements. In an embodiment, the risk prevention and control system 300 may further include: an acquisition module 340 for acquiring transaction data of the user for real-time transactions; a third determination module 350 for if the transaction data meets the risk conditions, then It is determined that the transaction corresponding to the transaction data is a risk transaction; the risk condition is a condition of misappropriation of transaction information; the processing module 310 may include a processing unit for processing based on the logistics address information of the risk transaction Multiple address elements. In an embodiment, the second determining module 330 may include: an execution unit configured to terminate execution of the transaction if the obtained maximum text similarity value is greater than a threshold; if the obtained maximum text similarity value If it is less than or equal to the threshold, the transaction is continued. The embodiment of the present specification is based on processing the logistics address information of the user's real-time transaction to obtain multiple address elements, and then based on the text similarity between the address element in the temporary list and the preset address element in the preset list to determine Whether to execute the transaction, it can dynamically capture the fuzzy modification of the logistics address, without the need to adjust keywords, the cost is lower, and a better risk control effect can be achieved. 4 is a schematic structural diagram of a terminal device provided by an embodiment of this specification. Please refer to FIG. 4, at the hardware level, the terminal device includes a processor, and optionally also includes an internal bus, a network interface, and a storage. Wherein, the memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), or may also include non-volatile memory (non-volatile memory), such as at least one disk memory Wait. Of course, the terminal device may also include hardware required for other services. The processor, network interface and storage can be connected to each other through an internal bus, which can be an ISA (Industry Standard Architecture) bus, PCI (Peripheral Component Interconnect) peripheral bus Bus or EISA (Extended Industry Standard Architecture) bus. The bus can be divided into an address bus, a data bus, and a control bus. For ease of representation, only one bidirectional arrow is used in FIG. 4, but it does not mean that there is only one bus bar or one type of bus bar. Storage for storing programs. Specifically, the program may include program code, and the program code includes computer operation instructions. The storage may include memory and non-volatile memory, and provide instructions and data to the processor. The processor reads the corresponding computer program from the non-volatile memory into the memory and then runs it to form an associated device of resource value-added objects and resource objects at a logical level. The processor executes the program stored in the storage, and is specifically used to perform the following operations: obtain multiple address elements based on processing the logistics address information of the user's real-time transactions; determine the address elements and presets in the temporary list The text similarity of the preset address elements in the list, and the temporary list is used to mark the plurality of address elements; based on the text similarity of the address elements, determine whether to execute the transaction. The embodiment of the present specification is based on processing the logistics address information of the user's real-time transaction to obtain multiple address elements, and then based on the text similarity between the address element in the temporary list and the preset address element in the preset list to determine Whether to execute the transaction, it can dynamically capture the fuzzy modification of the logistics address, without the need to adjust keywords, the cost is lower, and a better risk control effect can be achieved. The above risk prevention and control method disclosed in the embodiment shown in FIG. 1 of the present specification may be applied to a processor, or implemented by a processor. The processor may be an integrated circuit chip with signal processing capabilities. In the implementation process, the steps of the above method can be completed by instructions in the form of hardware integrated logic circuits or software in the processor. The above processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it may also be a digital signal processor (Digital Signal Processor, DSP), dedicated Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in one or more embodiments of this specification can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may be any general processor. The steps of the method disclosed in conjunction with one or more embodiments of this specification can be directly embodied and executed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor. The software module can be located in random memory, flash memory, read-only memory, programmable read-only memory or electrically readable and writable programmable memory, registers and other mature storage media in the art. The storage medium is located in the storage. The processor reads the information in the storage and combines the hardware to complete the steps of the above method. The terminal device may also execute the risk prevention and control method of FIG. 1 executed by the risk prevention and control system of FIG. 3, and details are not repeated herein. Of course, in addition to the software implementation, the terminal device of this specification does not exclude other implementations, such as a logic device or a combination of hardware and software, etc., that is to say, the execution body of the following processing flow is not limited to each logical unit , Can also be hardware or logic devices. The embodiments of the present specification also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the processes of the foregoing method embodiments are implemented, and the same technical effect can be achieved. To avoid repetition, I will not repeat them here. Wherein, the computer-readable storage medium, such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk or optical disk, etc. Those skilled in the art should understand that the embodiments of the present specification may be provided as methods, systems, or computer program products. Therefore, this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, this manual can take the form of computer program products implemented on one or more computer usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer usable program code . This specification is described with reference to the flowcharts and/or block diagrams of the method, device (system), and computer program product according to the embodiments of this specification. It should be understood that each flow and/or block in the flowchart and/or block diagram and a combination of the flow and/or block in the flowchart and/or block diagram can be implemented by computer program instructions. These computer program instructions can be provided to a general-purpose computer, special-purpose computer, embedded processor, or other programmable data processing equipment processor to produce a machine that allows instructions executed by the computer or other programmable data processing equipment processor Generate a system for implementing the functions specified in one block or multiple blocks of a flowchart or a flow and/or block diagram. These computer program instructions can also be stored in a computer readable memory that can guide the computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer readable memory produce a manufactured product including an instruction system The command system implements the functions specified in one block or multiple blocks in one flow or multiple flows in the flowchart and/or one block or multiple blocks in the block diagram. These computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of operating steps can be performed on the computer or other programmable device to generate computer-implemented processing, and thus on the computer or other programmable device The instructions executed on provide steps for implementing the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams. In a typical configuration, computer equipment includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. Memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory ( flash RAM). Memory is an example of computer-readable media. Computer-readable media, including permanent and non-permanent, removable and non-removable media, can be stored by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable and programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital multifunction Optical discs (DVDs) or other optical storage, magnetic cassette tapes, magnetic tape storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computer equipment. According to the definition in this article, computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves. The foregoing describes specific embodiments of the specification. Other embodiments are within the scope of patent application. In some cases, the actions or steps described in the scope of the patent application may be performed in a different order than in the embodiment and still achieve the desired result. In addition, the processes depicted in the drawings do not necessarily require the particular order shown or sequential order to achieve the desired results. In some embodiments, multiplexing and parallel processing are also possible or may be advantageous. It should also be noted that the terms "include", "include" or any other variant thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or device that includes a series of elements includes not only those elements, but also includes Other elements not explicitly listed, or include elements inherent to this process, method, commodity, or equipment. Without more restrictions, the elements defined by the sentence "include one..." do not exclude the existence of other identical elements in the process, method, commodity, or equipment that includes the elements. The above are only examples of this specification, and are not intended to limit this specification. For those skilled in the art, this specification may have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this specification shall be included in the scope of the patent application of this specification.

300‧‧‧風險防控系統 310‧‧‧處理模組 320‧‧‧第一確定模組 330‧‧‧第二確定模組 340‧‧‧獲取模組 350‧‧‧第三確定模組300‧‧‧Risk prevention and control system 310‧‧‧Processing module 320‧‧‧ First confirmed module 330‧‧‧The second module 340‧‧‧Get Module 350‧‧‧The third module

此處所說明的圖式用來提供對本說明書的進一步理解,構成本說明書的一部分,本說明書的示意性實施例及其說明用於解釋本說明書,並不構成對本說明書的不當限定。在圖式中: 圖1為本說明書的一個實施例提供的風險防控方法的流程圖; 圖2為本說明書的一個實施例提供的風險防控方法的實際應用場景實現流程示意圖; 圖3為本說明書的一個實施例提供的風險防控系統的結構方塊圖; 圖4為本說明書的一個實施例提供的終端設備的結構方塊圖。The drawings described herein are used to provide a further understanding of this specification and form part of this specification. The exemplary embodiments and descriptions of this specification are used to explain this specification and do not constitute an undue limitation of this specification. In the diagram: FIG. 1 is a flowchart of a risk prevention and control method provided by an embodiment of this specification; 2 is a schematic diagram of an actual application scenario implementation process of a risk prevention and control method provided by an embodiment of the present specification; 3 is a structural block diagram of a risk prevention and control system provided by an embodiment of this specification; FIG. 4 is a structural block diagram of a terminal device provided by an embodiment of the present specification.

Claims (10)

一種風險防控方法,包括: 基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,該臨時清單用於標記該多個位址元素; 基於該位址元素的文本相似度,確定是否執行該交易。A risk prevention and control method, including: Multiple address elements are obtained based on the processing of logistics address information for real-time transactions of users; Determine the text similarity between the address elements in the temporary list and the default address elements in the default list. The temporary list is used to mark the multiple address elements; Based on the text similarity of the address element, it is determined whether to execute the transaction. 如申請專利範圍第1項所述的方法,該確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,包括: 基於該位址元素對應的字串轉換成該預設位址元素對應的字串所需的最少編輯操作次數,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。According to the method described in item 1 of the patent application scope, the text similarity between the address element in the provisional list and the preset address element in the preset list includes: Based on the minimum number of editing operations required to convert the string corresponding to the address element into the string corresponding to the default address element, determine the text of the address element in the temporary list and the default address element in the default list Similarity. 如申請專利範圍第1項所述的方法,該確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,包括: 基於該臨時清單中的位址元素和該預設清單中的預設位址元素,分別建立與位址元素和預設位址元素對應的向量; 基於該位址元素和預設位址元素對應的向量的餘弦值,確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度。According to the method described in item 1 of the patent application scope, the text similarity between the address element in the provisional list and the preset address element in the preset list includes: Based on the address elements in the temporary list and the default address elements in the default list, create vectors corresponding to the address elements and the default address elements, respectively; Based on the cosine value of the vector corresponding to the address element and the preset address element, the text similarity between the address element in the temporary list and the preset address element in the preset list is determined. 如申請專利範圍第1項所述的方法,該基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,包括: 以分隔符號為拆分節點,將用戶進行即時交易的物流位址資訊進行拆分,得到多個位址元素。According to the method described in item 1 of the patent application scope, the logistics address information based on real-time transactions of users is processed to obtain multiple address elements, including: The separator is used as a split node to split the logistics address information of the user for real-time transactions to obtain multiple address elements. 如申請專利範圍第1項所述的方法,在基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素之前,還包括: 獲取用戶進行即時交易的交易資料; 若該交易資料滿足風險條件,則確定該交易資料對應的交易為風險交易;該風險條件為具有盜用交易資訊行為的條件; 該基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素,包括: 基於該風險交易的物流位址資訊進行處理得到多個位址元素。As described in item 1 of the patent application scope, before processing multiple logistics elements based on logistics address information for real-time transactions with users, it also includes: Obtain the transaction information of users' real-time transactions; If the transaction data satisfies the risk conditions, the transaction corresponding to the transaction data is determined to be a risk transaction; the risk condition is a condition for the behavior of misappropriating transaction information; The logistics address information based on real-time transactions of users is processed to obtain multiple address elements, including: The logistics address information based on the risk transaction is processed to obtain multiple address elements. 如申請專利範圍第1項所述的方法,該基於該位址元素的文本相似度,確定是否執行該交易,包括: 若得到的最大的文本相似度值大於閾值,則終止執行該交易。According to the method described in item 1 of the patent application scope, the determination of whether to execute the transaction based on the text similarity of the address element includes: If the maximum text similarity value obtained is greater than the threshold, the execution of the transaction is terminated. 如申請專利範圍第1項所述的方法,該基於該位址元素的文本相似度,確定是否執行該交易,包括: 若得到的最大的文本相似度值小於等於閾值,則繼續執行該交易。According to the method described in item 1 of the patent application scope, the determination of whether to execute the transaction based on the text similarity of the address element includes: If the maximum text similarity value obtained is less than or equal to the threshold, the transaction is continued. 一種風險防控系統,包括: 處理模組,用於基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 第一確定模組,用於確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,該臨時清單用於標記該多個位址元素; 第二確定模組,用於基於該位址元素的文本相似度,確定是否執行該交易。A risk prevention and control system, including: The processing module is used to process multiple address elements based on the logistics address information for real-time transactions of users; The first determining module is used to determine the text similarity between the address element in the temporary list and the preset address element in the preset list, and the temporary list is used to mark the multiple address elements; The second determination module is used to determine whether to execute the transaction based on the text similarity of the address element. 一種終端設備,包括:儲存器、處理器及儲存在該儲存器上並可在該處理器上運行的電腦程式,該電腦程式被該處理器執行時實現如下步驟: 基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,該臨時清單用於標記該多個位址元素; 基於該位址元素的文本相似度,確定是否執行該交易。A terminal device includes: a storage, a processor, and a computer program stored on the storage and executable on the processor. When the computer program is executed by the processor, the following steps are implemented: Multiple address elements are obtained based on the processing of logistics address information for real-time transactions of users; Determine the text similarity between the address elements in the temporary list and the default address elements in the default list. The temporary list is used to mark the multiple address elements; Based on the text similarity of the address element, it is determined whether to execute the transaction. 一種電腦可讀儲存媒體,該電腦可讀儲存媒體上儲存有電腦程式,該電腦程式被處理器執行時實現如下步驟: 基於對用戶進行即時交易的物流位址資訊進行處理得到多個位址元素; 確定臨時清單中的位址元素與預設清單中的預設位址元素的文本相似度,該臨時清單用於標記該多個位址元素; 基於該位址元素的文本相似度,確定是否執行該交易。A computer-readable storage medium. The computer-readable storage medium stores a computer program. When the computer program is executed by a processor, the following steps are implemented: Multiple address elements are obtained based on the processing of logistics address information for real-time transactions of users; Determine the text similarity between the address elements in the temporary list and the default address elements in the default list. The temporary list is used to mark the multiple address elements; Based on the text similarity of the address element, it is determined whether to execute the transaction.
TW108115873A 2018-07-10 2019-05-08 Risk prevention and control method and system, and terminal device TW202006642A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810753378.7A CN108960645B (en) 2018-07-10 2018-07-10 Risk prevention and control method, system and terminal equipment
CN201810753378.7 2018-07-10

Publications (1)

Publication Number Publication Date
TW202006642A true TW202006642A (en) 2020-02-01

Family

ID=64482666

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108115873A TW202006642A (en) 2018-07-10 2019-05-08 Risk prevention and control method and system, and terminal device

Country Status (3)

Country Link
CN (2) CN112598321A (en)
TW (1) TW202006642A (en)
WO (1) WO2020010982A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112598321A (en) * 2018-07-10 2021-04-02 创新先进技术有限公司 Risk prevention and control method, system and terminal equipment
CN111488334B (en) * 2019-01-29 2023-04-14 阿里巴巴集团控股有限公司 Data processing method and electronic equipment
CN111401860B (en) * 2020-04-09 2024-03-29 上海东普信息科技有限公司 Automatic message issuing method and device for interceptor, equipment and storage medium
CN112765502B (en) * 2021-01-13 2024-03-19 上海派拉软件股份有限公司 Malicious access detection method, device, electronic equipment and storage medium

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000057258A2 (en) * 1999-03-19 2000-09-28 Cybersource Corporation Method and apparatus for verifying address information
KR101132150B1 (en) * 2010-10-12 2012-07-11 (주)수지원넷소프트 Address processing for formalizing addresses
CN102929891B (en) * 2011-08-11 2015-09-16 阿里巴巴集团控股有限公司 The method and apparatus of process text
US20150006358A1 (en) * 2013-07-01 2015-01-01 Mastercard International Incorporated Merchant aggregation through cardholder brand loyalty
CN103678708B (en) * 2013-12-30 2017-01-18 小米科技有限责任公司 Method and device for recognizing preset addresses
CN105528372B (en) * 2014-09-30 2019-05-24 华为技术有限公司 A kind of address search method and equipment
CN106161372B (en) * 2015-04-09 2019-05-31 阿里巴巴集团控股有限公司 A kind of Risk Identification Method and device based on address matching
CN105224610A (en) * 2015-09-08 2016-01-06 方正国际软件有限公司 The method and apparatus that a kind of address is compared
CN106569994B (en) * 2015-10-10 2019-02-26 阿里巴巴集团控股有限公司 The analysis method and device of address
CN107203522B (en) * 2016-03-16 2020-02-07 北京京东尚科信息技术有限公司 Method and device for judging malicious order address
CN107526967B (en) * 2017-07-05 2020-06-02 阿里巴巴集团控股有限公司 Risk address identification method and device and electronic equipment
CN108229977A (en) * 2018-01-11 2018-06-29 脉度(上海)电子商务有限公司 A kind of electric business method for preventing goods from altering
CN108256112B (en) * 2018-02-09 2021-01-01 浙江省测绘科学技术研究院 Geographical semantic based place name and address retrieval quality evaluation method
CN112598321A (en) * 2018-07-10 2021-04-02 创新先进技术有限公司 Risk prevention and control method, system and terminal equipment

Also Published As

Publication number Publication date
CN108960645A (en) 2018-12-07
CN112598321A (en) 2021-04-02
WO2020010982A1 (en) 2020-01-16
CN108960645B (en) 2020-11-13

Similar Documents

Publication Publication Date Title
TW202006642A (en) Risk prevention and control method and system, and terminal device
KR102226257B1 (en) Method and device for writing service data to a blockchain system
TWI715999B (en) Identification method and device of identity information
JP6928104B2 (en) Methods and Devices for Writing Service Data to the Blockchain, and Methods for Determining the Service Subset
TWI696090B (en) Model training method, method and device for detecting URL
KR20190099053A (en) Method and apparatus for verifying block data in blockchain
US20180330190A1 (en) Anomaly detection using non-target clustering
CN106611037A (en) Method and device for distributed diagram calculation
CN115237599B (en) Rendering task processing method and device
CN112559606A (en) Conversion method and conversion device for JSON format data
TWI727639B (en) Method and device for tracing block chain transactions
TWI723535B (en) Data calculation method and engine
CN112052857A (en) Method and related device for detecting target field in bill image
CN112579623A (en) Method, device, storage medium and equipment for storing data
CN111459937A (en) Data table association method, device, server and storage medium
CN110502902A (en) A kind of vulnerability classification method, device and equipment
US11580251B1 (en) Query-based database redaction
CN113051778B (en) Garment design method, device, electronic equipment and storage medium
CN111459474B (en) Templated data processing method and device
TW201909077A (en) Method and device for transmitting electronic ticket
CN111310824A (en) Multi-angle dense target detection inhibition optimization method and equipment
JP6127206B2 (en) Method, apparatus and system for establishing secondary indexes in a distributed storage system
US11106427B2 (en) Memory filtering for disaggregate memory architectures
CN106407215A (en) Data processing method and device
CN106897278A (en) For the data read-write processing method and equipment of key value database