TW202032454A - Risk identification-based account transfer request processing method and device - Google Patents

Risk identification-based account transfer request processing method and device Download PDF

Info

Publication number
TW202032454A
TW202032454A TW108129630A TW108129630A TW202032454A TW 202032454 A TW202032454 A TW 202032454A TW 108129630 A TW108129630 A TW 108129630A TW 108129630 A TW108129630 A TW 108129630A TW 202032454 A TW202032454 A TW 202032454A
Authority
TW
Taiwan
Prior art keywords
risk
delay time
target
user
identification result
Prior art date
Application number
TW108129630A
Other languages
Chinese (zh)
Inventor
沈琳倩
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202032454A publication Critical patent/TW202032454A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Abstract

A risk identification-based account transfer request processing method and device. Upon receipt of an account transfer request initiated by a user, an electronic payment platform first performs risk identification on the account transfer request on the basis of a preset fraud risk identification model; if the identification result indicates the existence of a fraud risk, on the one hand, prompts the user to trigger an account transfer delay function, and on the other hand, determines a delay duration according to the identification result. The longer the determined delay duration, the higher the fraud risk indicated by the identification result. Then, if the user selects to trigger the account transfer delay function, the electronic payment platform performs delayed account transfer on the basis of the determined delay duration.

Description

基於風險辨識的轉帳請求處理方法及裝置Method and device for processing transfer request based on risk identification

本說明書實施例涉及資訊技術領域,尤其涉及一種基於風險辨識的轉帳請求處理方法及裝置。The embodiments of this specification relate to the field of information technology, and in particular to a method and device for processing transfer requests based on risk identification.

實際生活中,時常會出現用戶因受到詐欺(如電信詐欺)而向不法分子轉帳的情況。在這種情況下,用戶往往在轉帳後才會意識到自己被騙,此時,如果不法分子的帳戶已經接收到的用戶轉帳的資金,那麼不法分子很可能已經將帳戶中的資金轉移,導致用戶很難挽回自己的資金損失。 現有的電子支付平臺一般支援延時到帳功能(功能觸發後,默認資金24小時後到帳)。具體地,用戶在透過電子支付平臺發起轉帳時,如果意識到自己可能被騙,則可以同時選擇觸發延時到帳功能,這意味著,用戶發起轉帳24小時後,轉帳的資金才會打入收款方的帳戶。如果發起轉帳的24小時內,用戶確認自己被騙,則用戶可以及時請求電子支付平臺凍結轉帳交易。 然而,上述的觸發延時轉帳方式對用戶而言依然不夠安全。In real life, users often transfer money to criminals due to fraud (such as telecommunication fraud). In this case, users often realize that they have been deceived after the transfer. At this time, if the account of the criminal has received the funds transferred by the user, the criminal has probably transferred the funds in the account, resulting in It is difficult for users to recover their financial losses. Existing electronic payment platforms generally support the delayed arrival function (after the function is triggered, the default funds will arrive after 24 hours). Specifically, when a user initiates a transfer through an electronic payment platform, if he realizes that he may be deceived, he can also choose to trigger the delayed arrival function, which means that the funds transferred will not be received until 24 hours after the user initiates the transfer. The account of the payer. If the user confirms that he has been cheated within 24 hours of initiating the transfer, the user can promptly request the electronic payment platform to freeze the transfer transaction. However, the aforementioned method of triggering delayed transfer is still not safe enough for users.

為了解決現有的觸發延時轉帳的方式對用戶而言不夠安全的問題,本說明書實施例提供一種基於風險辨識的轉帳請求處理方法及裝置,技術方案如下: 根據本說明書實施例的第1方面,提供一種基於風險辨識的轉帳請求處理方法,包括: 接收用戶發起的轉帳請求; 基於預設的詐欺風險辨識模型,針對所述轉帳請求進行風險辨識; 若辨識結果表徵具有詐欺風險,則提示所述用戶觸發延時轉帳功能;並且,根據所述辨識結果,確定延時時長;其中,所述延時時長越長,表明所述辨識結果表徵的詐欺風險越高; 若確定所述延時轉帳功能被觸發,則基於所述延時時長,進行延時轉帳。 根據本說明書實施例的第2方面,提供一種基於風險辨識的轉帳請求處理裝置,包括: 接收模組,接收用戶發起的轉帳請求; 風險辨識模組,基於預設的詐欺風險辨識模型,針對所述轉帳請求進行風險辨識; 提示模組,若辨識結果表徵具有詐欺風險,則提示所述用戶觸發延時轉帳功能; 延時時長確定模組,若辨識結果表徵具有詐欺風險,則根據所述辨識結果,確定延時時長;其中,所述延時時長越長,表明所述辨識結果表徵的詐欺風險越高; 執行模組,若確定所述延時轉帳功能被觸發,則基於所述延時時長,進行延時轉帳。 本說明書實施例所提供的技術方案,電子支付平臺當接收到用戶發起的轉帳請求時,會先基於預設的詐欺風險辨識模型對轉帳請求進行風險辨識,如果辨識結果表徵具有詐欺風險,就會一方面提示用戶觸發延時轉帳功能,另一方面根據辨識結果確定延時時長。確定的延時時長越長,表明辨識結果表徵的詐欺風險越高。隨後,如果用戶選擇觸發延時轉帳功能,電子支付平臺就會基於確定的延時時長,進行延時轉帳。 如此,一方面,如果用戶發起的轉帳請求具有詐欺風險,那麼,哪怕用戶並沒有意識到自己可能被騙,電子支付平臺也能夠及時對用戶進行風險提醒,引導用戶觸發延時轉帳功能,這對用戶而言更為安全。另一方面,電子支付平臺會根據轉帳請求具有的詐欺風險程度的高低,確定合適的延時時長進行延時轉帳,而不是無論詐欺風險高低,都延時很長時間(24小時)進行轉帳,如此,可以在明確轉帳風險的前提下,儘量加快轉帳進度。 應當理解的是,以上的一般描述和後文的細節描述僅是示例性和解釋性的,並不能限制本說明書實施例。 此外,本說明書實施例中的任一實施例並不需要達到上述的全部效果。In order to solve the problem that the existing method of triggering delayed transfer is not safe enough for users, embodiments of this specification provide a method and device for processing transfer request based on risk identification. The technical solution is as follows: According to the first aspect of the embodiments of this specification, a method for processing transfer requests based on risk identification is provided, including: Receive transfer requests initiated by users; Perform risk identification for the transfer request based on a preset fraud risk identification model; If the identification result indicates that there is a risk of fraud, the user is prompted to trigger the delayed transfer function; and according to the identification result, the delay time is determined; wherein, the longer the delay time is, the fraud risk represented by the identification result Higher If it is determined that the delayed transfer function is triggered, the delayed transfer is performed based on the delayed time. According to a second aspect of the embodiments of the present specification, there is provided a transfer request processing device based on risk identification, including: The receiving module receives the transfer request initiated by the user; The risk identification module, based on a preset fraud risk identification model, performs risk identification for the transfer request; The prompt module, if the identification result indicates a fraud risk, prompt the user to trigger the delayed transfer function; The delay time determination module, if the identification result indicates a risk of fraud, determine the delay time according to the identification result; wherein, the longer the delay time, the higher the fraud risk represented by the identification result; The execution module, if it is determined that the delayed transfer function is triggered, performs delayed transfer based on the delayed time. In the technical solution provided by the embodiments of this specification, when the electronic payment platform receives a transfer request initiated by a user, it will first perform risk identification on the transfer request based on a preset fraud risk identification model. If the identification result indicates a fraud risk, it will On the one hand, the user is prompted to trigger the delayed transfer function, and on the other hand, the delay time is determined according to the identification result. The longer the determined delay time, the higher the fraud risk represented by the identification result. Subsequently, if the user chooses to trigger the delayed transfer function, the electronic payment platform will perform the delayed transfer based on the determined delay time. In this way, on the one hand, if the transfer request initiated by the user has a risk of fraud, then even if the user does not realize that he may be deceived, the electronic payment platform can promptly remind the user of the risk and guide the user to trigger the delayed transfer function. In terms of safety. On the other hand, the electronic payment platform will determine the appropriate delay time for delayed transfer according to the level of fraud risk of the transfer request, instead of delaying the transfer for a long time (24 hours) regardless of the fraud risk. You can speed up the transfer process as much as possible on the premise of clear transfer risks. It should be understood that the above general description and the following detailed description are only exemplary and explanatory, and cannot limit the embodiments of this specification. In addition, any embodiment in the embodiments of this specification does not need to achieve all the above-mentioned effects.

目前,電子支付平臺一般僅支援用戶在意識到詐欺風險的情況下主動進行延時轉帳。然而,很多情況下,用戶往往缺乏辨識詐欺風險的資訊與能力,意識不到自己所面臨的詐欺風險。假設用戶因被詐欺而發起轉帳,卻沒有意識到自己可能被詐欺,那麼,用戶轉帳的資金就會即時到達不法分子的帳戶,導致資金難以追回。 此外,現有的延時轉帳功能是默認資金24小時後到帳的。然而,如果用戶發起的轉帳交易雖然具有詐欺可能性,但是詐欺可能性較低的,那麼,對於用戶而言,延時24小時進行轉帳所付出的時間代價過大。 基於以上,本發明提出了一種基於風險辨識的轉帳請求處理方法。一方面,如果用戶發起的轉帳請求具有詐欺風險,那麼,哪怕用戶並沒有意識到自己可能被騙,電子支付平臺也能夠及時對用戶進行風險提醒,引導用戶觸發延時轉帳功能,這對用戶而言更為安全。另一方面,電子支付平臺會根據轉帳請求具有的詐欺風險程度的高低,確定合適的延時時長進行延時轉帳,而不是無論詐欺風險高低,都延時很長時間(24小時)進行轉帳,如此,可以在明確轉帳風險的前提下,儘量加快轉帳進度。 為了使本領域技術人員更好地理解本說明書實施例中的技術方案,下面將結合本說明書實施例中的圖式,對本說明書實施例中的技術方案進行詳細地描述,顯然,所描述的實施例僅僅是本說明書的一部分實施例,而不是全部的實施例。基於本說明書中的實施例,本領域普通技術人員所獲得的所有其他實施例,都應當屬保護的範圍。 以下結合圖式,詳細說明本說明書各實施例提供的技術方案。 圖1是本說明書實施例提供的一種基於風險辨識的轉帳請求處理方法的流程示意圖,包括以下步驟: S100:接收用戶發起的轉帳請求。 本方法的執行主體具體可以是電子支付平臺的伺服器。下文對所述電子支付平臺執行的步驟進行說明,實際上是對所述電子支付平臺的伺服器執行的步驟進行說明。 在本說明書實施例中,所述用戶是指發起轉帳的用戶。通常,所述用戶在電子支付平臺上開通有帳戶,用戶向電子支付平臺發起轉帳請求,實際上是請求電子支付平臺將自己的帳戶中的一定金額轉移給其他用戶。 S102:基於預設的詐欺風險辨識模型,針對所述轉帳請求進行風險辨識。 在本說明書實施例中,所述詐欺風險辨識模型可以是用於針對一筆轉帳交易進行詐欺風險辨識的策略、規則,也可以是基於機器學習算法訓練得到的,用於針對一筆轉帳交易進行詐欺風險辨識的模型。 具體地,基於所述詐欺風險辨識模型,針對所述轉帳請求進行詐欺風險辨識,實際上是根據所述轉帳請求中包含的轉帳用戶資訊、收帳用戶資訊、轉帳金額,進行風險分析,風險分析過程一般涉及對轉帳用戶的交易歷史記錄、習慣特徵的分析,以及對收帳用戶的交易歷史記錄、習慣特徵的分析,還可能涉及對當前交易時間是否合理、所述轉帳用戶當前使用的設備是否為常用設備等因素的分析。總之,對本領域技術人員而言,可以根據實際需要預設各種不同的詐欺風險辨識模型,實現對轉帳請求的詐欺風險辨識。 在本說明書實施例中,針對轉帳請求的詐欺風險辨識的辨識結果具體可以是詐欺風險機率,詐欺風險機率越大,說明所述用戶因被詐欺而發起所述轉帳請求的可能性就越高,即詐欺風險越高。 具體地,可以預先指定機率閾值,當對所述轉帳請求進行風險辨識所得到的詐欺風險機率大於所述機率閾值,就可以視為具有詐欺風險。當對所述轉帳請求進行風險辨識所得到的詐欺風險機率不大於所述機率閾值,就可以視為不具有詐欺風險。 S104:若辨識結果表徵具有詐欺風險,則提示所述用戶觸發延時轉帳功能。 S106:若辨識結果表徵具有詐欺風險,則根據所述辨識結果,確定延時時長。 在本說明書實施例中,電子支付平臺如果確定辨識結果表徵具有詐欺風險,可以一方面對用戶進行風險提示,建議用戶觸發延時轉帳功能。例如,電子支付平臺可以向用戶展示一段提示資訊“當前轉帳存在詐欺風險,建議進行延時轉帳”。另一方面,電子支付平臺可以根據所述辨識結果所表徵的詐欺風險的高低,確定延時時長。確定的延時時長越長,表明所述辨識結果表徵的詐欺風險越高(即詐欺風險機率越大)。 進一步地,本說明書實施例提供了以下幾種確定延時時長的方式: 方式1:確定的延時時長與所述辨識結果表徵的詐欺風險(詐欺風險機率)正相關。如此,確定延時時長的方式實際上是,以延時時長因變數,以詐欺風險機率為自變數的正相關函數。例如,所述正相關函數可以是y=2x,其中,y表徵延時時長,x表徵詐欺風險機率。 方式2:預設若干風險等級,針對每個風險等級,為該風險等級分配對應的機率區間,並且,為該風險等級分配對應的時長。其中,針對任意兩個風險等級,較高的風險等級所對應的機率區間的左端點值大於較低的風險等級所對應的機率區間的右端點值。 如此,可以根據針對轉帳請求進行風險辨識所得到詐欺風險機率,確定所述詐欺風險機率落入的機率區間,進而將確定的機率區間對應的風險等級作為目標風險等級。隨後,將目標風險等級對應的時長確定為延時時長。 顯然,在方式2中,所述目標風險等級越高,表明所述辨識結果表徵的詐欺風險越高。所述延時時長越長,表明所述目標風險等級越高。 此外需要說明的是,在方式2中,根據多個不同的辨識結果(詐欺風險機率)所確定的延時時長可能相同。這是因為,多個不同的詐欺風險機率可能落入預設的同一機率區間,也就對應於同一風險等級,最終確定的延時時長皆為該風險等級對應的時長。 方式3:基於方式2進行修改,針對預設的每個風險等級,預設該風險等級對應的時長區間;針對任意兩個風險等級,較高的風險等級所對應的時長區間的左端點值大於較低的風險等級所對應的時長區間的右端點值。 如此,在確定出目標風險等級之後,可以確定所述目標風險等級對應的時長區間,作為目標時長區間。然後,基於所述目標時長區間,確定延時時長。也就是所,將一個落入所述目標時長區間的時長作為延時時長。例如,可以隨機選擇一個落入所述目標時長區間的時長作為延時時長。 方式4:基於方式3進行修改,電子支付平臺可以獲取所述用戶基於所述目標時長區間指定的延時時長。也就是說,在根據辨識結果表徵的詐欺風險的高低,確定目標時長區間之後,可以由用戶來指定一個落入所述目標時長區間的時長作為延時時長。圖2是本說明書實施例提供的確定延時時長的示意圖。圖2所示的實際上是上述方式4。 S108:若確定所述延時轉帳功能被觸發,則基於所述延時時長,進行延時轉帳。 在本說明書實施例中,一旦所述用戶選擇觸發延時轉帳功能,電子支付平臺就可以基於確定出的延時時長,進行延時轉帳。 需要說明的是,電子支付平臺可以當確定所述延時轉帳功能被觸發時,從所述用戶的帳戶中進行扣款。接著,當時間經過所述延時時長之後,執行轉帳,即將所扣款項打入收款方的帳戶。 例如,假設用戶指定的延時時長為3個小時,那麼,電子支付平臺可以在獲取到所述用戶指定的延時時長時,從所述用戶的帳戶中進行扣款。接著,在3小時之後,將所扣款項打入收款方的帳戶。 此外需要說明的是,在本說明書實施例中,對上述步驟S104與S106的執行順序不作具體限定。具體可以有以下幾種情況: 情況1:電子支付平臺如果確定辨識結果表徵具有詐欺風險,則可以先提示所述用戶觸發延時轉帳功能,待確定所述延時轉帳功能被觸發時,再根據所述辨識結果確定延時時長。 情況2:電子支付平臺如果確定辨識結果表徵具有詐欺風險,則可以同時執行步驟S104與步驟S106。例如,如果採用上述的方式3確定延時時長,那麼,電子支付平臺在確定辨識結果表徵具有詐欺風險時,可以向所述用戶展示一個界面,界面中既顯示了用於提示所述用戶詐欺風險的提示資訊,又顯示有所述目標時長區間,以請求所述用戶基於所述目標時長區間,指定延時時長。 情況3:電子支付平臺如果確定辨識結果表徵具有詐欺風險,則可以先根據所述辨識結果確定延時時長,再提示所述用戶觸發延時轉帳功能。 情況4:如果採用前文所述的方式3確定延時時長,那麼,可以在執行步驟S106的過程中,插入步驟S104。具體地,若採用方式3執行步驟S106,則在確定出目標時長區間之後,可以執行步驟S104,將所述目標時長區間展示給所述用戶,這相當於提示所述用戶存在詐欺風險,並請求所述用戶基於所述目標時長區間指定延時時長。相應的,電子支付平臺當獲取到所述用戶指定的延時時長,意味著確定所述延時轉帳功能被觸發。 透過圖1所示的方法,電子支付平臺當接收到用戶發起的轉帳請求時,會先基於預設的詐欺風險辨識模型對轉帳請求進行風險辨識,如果辨識結果表徵具有詐欺風險,就會一方面提示用戶觸發延時轉帳功能,另一方面根據辨識結果確定延時時長。確定的延時時長越長,表明辨識結果表徵的詐欺風險越高。隨後,如果用戶選擇觸發延時轉帳功能,電子支付平臺就會基於確定的延時時長,進行延時轉帳。 圖3是本說明書實施例提供的基於風險辨識的轉帳請求處理方法的示例圖。具體可以實現如下技術效果: 1、無需用戶具有風險意識,電子支付平臺可以基於預設的詐欺風險辨識模型辨識出存在詐欺風險的轉帳請求,並對用戶進行風險提示,引導用戶進行延時轉帳。這對用戶而言安全性更高。 2、針對不同風險程度的轉帳交易,建議用戶選擇不同的延時時長進行延時轉帳。具有詐欺風險且詐欺風險較高的轉帳交易,相應的延時時長較長;具有詐欺風險且詐欺風險較低的轉帳交易,相應的延時時長較短。如此,可以在明確詐欺風險的前提下,儘量加快轉帳進度。 3、透過本說明實施例,用戶在電子支付平臺提供的時長範圍內(電子支付平臺明確詐欺風險程度的前提下),指定延時時長,這也可以增強用戶對風險的感知,強化用戶進行轉帳時的安全體驗。 基於圖1所示的基於風險辨識的轉帳請求處理方法,本說明書實施例還對應提供了一種基於風險辨識的轉帳請求處理裝置,如圖4所示,包括: 接收模組401,接收用戶發起的轉帳請求; 風險辨識模組402,基於預設的詐欺風險辨識模型,針對所述轉帳請求進行風險辨識; 提示模組403,若辨識結果表徵具有詐欺風險,則提示所述用戶觸發延時轉帳功能; 延時時長確定模組404,若辨識結果表徵具有詐欺風險,則根據所述辨識結果,確定延時時長;其中,所述延時時長越長,表明所述辨識結果表徵的詐欺風險越高; 執行模組405,若確定所述延時轉帳功能被觸發,則基於所述延時時長,進行延時轉帳。 所述延時時長確定模組404,根據所述辨識結果,從預設的至少兩個風險等級中確定所述辨識結果對應的風險等級,作為目標風險等級;其中,所述目標風險等級越高,表明所述辨識結果表徵的詐欺風險越高;根據所述目標風險等級,確定延時時長;其中,所述延時時長越長,表明所述目標風險等級越高。 針對預設的每個風險等級,預設該風險等級對應的時長區間;針對任意兩個風險等級,較高的風險等級所對應的時長區間的左端點值大於較低的風險等級所對應的時長區間的右端點值; 所述延時時長確定模組404,根據所述目標風險等級,確定所述目標風險等級對應的時長區間,作為目標時長區間;基於所述目標時長區間,確定延時時長。 所述提示模組403,將所述目標時長區間展示給所述用戶,以提示所述用戶基於所述目標時長區間指定延時時長; 所述執行模組405,若確定獲取到所述用戶指定的延時時長,則確定所述延時轉帳功能被觸發。 所述延時時長確定模組404,獲取所述用戶基於所述目標時長區間指定的延時時長。 所述延時時長確定模組404,若確定所述延時轉帳功能被觸發,則根據所述辨識結果,確定延時時長。 本說明書實施例還提供一種電腦設備,其至少包括儲存器、處理器及儲存在儲存器上並可在處理器上運行的電腦程式,其中,處理器執行所述程式時實現圖1所示的方法。 圖5示出了本說明書實施例所提供的一種更為具體的計算設備硬體結構示意圖,該設備可以包括:處理器1010、儲存器1020、輸入/輸出介面1030、通訊介面1040和匯流排1050。其中處理器1010、儲存器1020、輸入/輸出介面1030和通訊介面1040透過匯流排1050實現彼此之間在設備內部的通訊連接。 處理器1010可以採用通用的CPU(Central Processing Unit,中央處理器)、微處理器、應用專用積體電路(Application Specific Integrated Circuit,ASIC)、或者一個或多個積體電路等方式實現,用於執行相關程式,以實現本說明書實施例所提供的技術方案。 儲存器1020可以採用ROM(Read Only Memory,唯讀記憶體)、RAM(Random Access Memory,隨機存取記憶體)、靜態儲存設備,動態儲存設備等形式實現。儲存器1020可以儲存操作系統和其他應用程式,在透過軟體或者韌體來實現本說明書實施例所提供的技術方案時,相關的程式代碼保存在儲存器1020中,並由處理器1010來呼叫執行。 輸入/輸出介面1030用於連接輸入/輸出模組,以實現資訊輸入及輸出。輸入輸出/模組可以作為組件配置在設備中(圖中未示出),也可以外接於設備以提供相應功能。其中輸入設備可以包括鍵盤、滑鼠、觸控螢幕、麥克風、各類傳感器等,輸出設備可以包括顯示器、揚聲器、振動器、指示燈等。 通訊介面1040用於連接通訊模組(圖中未示出),以實現本設備與其他設備的通訊交互。其中通訊模組可以透過有線方式(例如USB、網線等)實現通訊,也可以透過無線方式(例如行動網路、WIFI、藍牙等)實現通訊。 匯流排1050包括一通路,在設備的各個組件(例如處理器1010、儲存器1020、輸入/輸出介面1030和通訊介面1040)之間傳輸資訊。 需要說明的是,儘管上述設備僅示出了處理器1010、儲存器1020、輸入/輸出介面1030、通訊介面1040以及匯流排1050,但是在具體實施過程中,該設備還可以包括實現正常運行所必需的其他組件。此外,本領域的技術人員可以理解的是,上述設備中也可以僅包含實現本說明書實施例方案所必需的組件,而不必包含圖中所示的全部組件。 本說明書實施例還提供一種電腦可讀儲存媒體,其上儲存有電腦程式,該程式被處理器執行時實現圖1所示的方法。 電腦可讀媒體包括永久性和非永久性、可移除和非可移除媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀儲存器(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、卡式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 透過以上的實施方式的描述可知,本領域的技術人員可以清楚地瞭解到本說明書實施例可借助軟體加必需的通用硬體平臺的方式來實現。基於這樣的理解,本說明書實施例的技術方案本質上或者說對現有技術做出貢獻的部分可以以軟體產品的形式體現出來,該電腦軟體產品可以儲存在儲存媒體中,如ROM/RAM、磁碟、光碟等,包括若干指令用以使得一台電腦設備(可以是個人電腦,伺服器,或者網路設備等)執行本說明書實施例各個實施例或者實施例的某些部分所述的方法。 上述實施例闡明的系統、方法、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、蜂窩電話、相機電話、智慧電話、個人數位助理、媒體播放器、導航設備、電子郵件收發設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於方法實施例而言,由於其基本相似於方法實施例,所以描述得比較簡單,相關之處參見方法實施例的部分說明即可。以上所描述的方法實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是實體上分開的,在實施本說明書實施例方案時可以把各模組的功能在同一個或多個軟體及/或硬體中實現。也可以根據實際的需要選擇其中的部分或者全部模組來實現本實施例方案的目的。本領域普通技術人員在不付出進步性勞動的情況下,即可以理解並實施。 以上所述僅是本說明書實施例的具體實施方式,應當指出,對於本技術領域的普通技術人員來說,在不脫離本說明書實施例原理的前提下,還可以做出若干改進和潤飾,這些改進和潤飾也應視為本說明書實施例的保護範圍。Currently, electronic payment platforms generally only support users to proactively make delayed transfers when they are aware of the risk of fraud. However, in many cases, users often lack the information and ability to identify fraud risks, and are not aware of the fraud risks they face. Assuming that the user initiates a transfer due to fraud, but does not realize that he may be fraudulent, then the funds transferred by the user will immediately reach the criminal’s account, making it difficult to recover the funds. In addition, the existing delayed transfer function defaults that funds arrive after 24 hours. However, if the transfer transaction initiated by the user has the possibility of fraud, but the possibility of fraud is low, then the time cost for the user to delay the transfer for 24 hours is too high. Based on the above, the present invention proposes a method for processing transfer requests based on risk identification. On the one hand, if the transfer request initiated by the user has a risk of fraud, the electronic payment platform can promptly remind the user of the risk and guide the user to trigger the delayed transfer function, even if the user is not aware that he may be deceived. More secure. On the other hand, the electronic payment platform will determine the appropriate delay time for delayed transfer according to the level of fraud risk of the transfer request, instead of delaying the transfer for a long time (24 hours) regardless of the fraud risk. You can speed up the transfer process as much as possible on the premise of clear transfer risks. In order to enable those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation The examples are only a part of the embodiments of this specification, not all the embodiments. Based on the embodiments in this specification, all other embodiments obtained by those of ordinary skill in the art should fall within the scope of protection. The following describes in detail the technical solutions provided by the embodiments of this specification in conjunction with the drawings. Figure 1 is a schematic flow chart of a method for processing transfer requests based on risk identification provided by an embodiment of this specification, including the following steps: S100: Receive a transfer request initiated by the user. The execution subject of this method may specifically be a server of an electronic payment platform. The following describes the steps executed by the electronic payment platform, which is actually an explanation of the steps executed by the server of the electronic payment platform. In the embodiment of this specification, the user refers to the user who initiates the transfer. Generally, the user has an account opened on the electronic payment platform, and the user initiates a transfer request to the electronic payment platform, which actually requests the electronic payment platform to transfer a certain amount of money in the account to other users. S102: Perform risk identification for the transfer request based on a preset fraud risk identification model. In the embodiment of this specification, the fraud risk identification model can be a strategy or rule for fraud risk identification for a transfer transaction, or it can be obtained based on machine learning algorithm training and used for fraud risk for a transfer transaction. Recognized model. Specifically, based on the fraud risk identification model, the fraud risk identification for the transfer request is actually based on the transfer user information, the receiving user information, and the transfer amount included in the transfer request to conduct risk analysis and risk analysis. The process generally involves the analysis of the transaction history and habit characteristics of the transfer user, and the analysis of the transaction history and habit characteristics of the receiving user. It may also involve the analysis of whether the current transaction time is reasonable and whether the device currently used by the transfer user Analysis of factors such as commonly used equipment. In short, for those skilled in the art, various different fraud risk identification models can be preset according to actual needs to realize fraud risk identification for transfer requests. In the embodiment of this specification, the identification result of the fraud risk identification for the transfer request may specifically be the fraud risk probability. The greater the fraud risk probability, the higher the probability that the user will initiate the transfer request due to fraud. That is, the higher the risk of fraud. Specifically, a probability threshold may be pre-designated, and when the fraud risk probability obtained by performing risk identification on the transfer request is greater than the probability threshold, it can be deemed to have a fraud risk. When the fraud risk probability obtained by performing risk identification on the transfer request is not greater than the probability threshold, it can be deemed that there is no fraud risk. S104: If the identification result indicates that there is a risk of fraud, prompt the user to trigger the delayed transfer function. S106: If the identification result indicates that there is a risk of fraud, determine the delay time according to the identification result. In the embodiment of this specification, if the electronic payment platform determines that the identification result indicates a risk of fraud, it can provide a risk warning to the user on the one hand, and suggest that the user trigger the delayed transfer function. For example, the electronic payment platform can display a prompt message to the user "there is a risk of fraud in the current transfer, and a delayed transfer is recommended." On the other hand, the electronic payment platform can determine the delay time according to the level of fraud risk characterized by the identification result. The longer the determined delay time, the higher the fraud risk represented by the identification result (that is, the greater the fraud risk probability). Further, the embodiments of this specification provide the following ways to determine the delay time: Manner 1: The determined delay time is positively correlated with the fraud risk (fraud risk probability) represented by the identification result. In this way, the way to determine the delay time is actually to take the delay time as a variable and the risk of fraud as a positive correlation function of the independent variable. For example, the positive correlation function may be y=2x, where y represents the delay time, and x represents the probability of fraud risk. Method 2: Preset several risk levels, for each risk level, a corresponding probability interval is assigned to the risk level, and the corresponding time length is assigned to the risk level. Among them, for any two risk levels, the left end value of the probability interval corresponding to the higher risk level is greater than the right end value of the probability interval corresponding to the lower risk level. In this way, the probability range in which the fraud risk probability falls may be determined according to the fraud risk probability obtained by risk identification for the transfer request, and then the risk level corresponding to the determined probability range can be used as the target risk level. Subsequently, the duration corresponding to the target risk level is determined as the delay duration. Obviously, in way 2, the higher the target risk level, the higher the fraud risk characterized by the identification result. The longer the delay time, the higher the target risk level. In addition, it should be noted that in method 2, the delay time determined according to multiple different identification results (fraud risk probability) may be the same. This is because multiple different fraud risk probabilities may fall into the same preset probability interval, which corresponds to the same risk level, and the final delay time is the time corresponding to the risk level. Method 3: Modification based on Method 2, for each preset risk level, preset the duration interval corresponding to the risk level; for any two risk levels, the left end of the duration interval corresponding to the higher risk level The value is greater than the right end value of the duration interval corresponding to the lower risk level. In this way, after the target risk level is determined, the duration interval corresponding to the target risk level can be determined as the target duration interval. Then, based on the target duration interval, the delay duration is determined. That is to say, a time length falling within the target time length interval is taken as the delay time length. For example, a duration that falls within the target duration interval can be randomly selected as the delay duration. Manner 4: Modification based on Manner 3, the electronic payment platform can obtain the delay time specified by the user based on the target time interval. That is to say, after determining the target duration interval according to the level of the fraud risk represented by the identification result, the user may specify a duration that falls within the target duration interval as the delay duration. Fig. 2 is a schematic diagram of determining the delay time provided by an embodiment of the present specification. What Figure 2 shows is actually the above method 4. S108: If it is determined that the delayed account transfer function is triggered, perform delayed account transfer based on the delayed duration. In the embodiment of this specification, once the user chooses to trigger the delayed transfer function, the electronic payment platform can perform delayed transfer based on the determined delay time. It should be noted that the electronic payment platform may deduct money from the user's account when it is determined that the delayed transfer function is triggered. Then, when the time has passed the delay period, the transfer is executed, that is, the deducted money is credited to the payee's account. For example, assuming that the delay time specified by the user is 3 hours, then the electronic payment platform may deduct money from the user's account when the delay time specified by the user is obtained. Then, after 3 hours, credit the deducted money to the payee’s account. In addition, it should be noted that in the embodiment of this specification, the execution order of the above steps S104 and S106 is not specifically limited. There are several situations: Case 1: If the electronic payment platform determines that the identification result indicates a risk of fraud, it may first prompt the user to trigger the delayed transfer function, and when it is determined that the delayed transfer function is triggered, the delay time is determined according to the identification result. Case 2: If the electronic payment platform determines that the identification result indicates a risk of fraud, it can perform step S104 and step S106 simultaneously. For example, if the above method 3 is used to determine the delay time, then when the electronic payment platform determines that the identification result indicates a fraud risk, it can display an interface to the user. The interface displays the user’s fraud risk. The prompt information of is displayed with the target time interval, so as to request the user to specify the delay time based on the target time interval. Situation 3: If the electronic payment platform determines that the identification result indicates a risk of fraud, it may first determine the delay time according to the identification result, and then prompt the user to trigger the delayed transfer function. Case 4: If the method 3 described above is used to determine the delay time, then step S104 can be inserted in the process of performing step S106. Specifically, if step S106 is executed in way 3, after the target duration interval is determined, step S104 may be executed to display the target duration interval to the user, which is equivalent to reminding the user that there is a risk of fraud. And request the user to specify the delay time based on the target time interval. Correspondingly, when the electronic payment platform obtains the delay time specified by the user, it means that it is determined that the delayed transfer function is triggered. Through the method shown in Figure 1, when the electronic payment platform receives the transfer request initiated by the user, it will first identify the risk of the transfer request based on the preset fraud risk identification model. If the identification result indicates a fraud risk, it will The user is prompted to trigger the delayed transfer function, and on the other hand, the delay time is determined according to the identification result. The longer the determined delay time, the higher the fraud risk represented by the identification result. Subsequently, if the user chooses to trigger the delayed transfer function, the electronic payment platform will perform the delayed transfer based on the determined delay time. Fig. 3 is an exemplary diagram of a method for processing a transfer request based on risk identification provided by an embodiment of the present specification. Specifically, the following technical effects can be achieved: 1. There is no need for users to have risk awareness. The electronic payment platform can identify transfer requests that have fraud risks based on a preset fraud risk identification model, and prompt users for risks and guide users to delay transfers. This is more secure for users. 2. For transfer transactions with different levels of risk, it is recommended that users choose different delay times for delayed transfer. Transfer transactions with a risk of fraud and a higher risk of fraud have a longer corresponding delay time; transfer transactions with a risk of fraud and a lower risk of fraud have a shorter corresponding delay time. In this way, under the premise of clarifying the risk of fraud, the transfer progress can be accelerated as much as possible. 3. Through the illustrated embodiment, the user specifies the delay time within the time range provided by the electronic payment platform (on the premise that the electronic payment platform clarifies the degree of fraud risk), which can also enhance the user’s perception of risk and strengthen the user’s performance Security experience when transferring money. Based on the risk identification-based transfer request processing method shown in FIG. 1, the embodiment of this specification also correspondingly provides a risk identification-based transfer request processing device, as shown in FIG. 4, including: The receiving module 401 receives the transfer request initiated by the user; The risk identification module 402, based on a preset fraud risk identification model, performs risk identification for the transfer request; The prompt module 403, if the identification result indicates a fraud risk, prompt the user to trigger the delayed transfer function; The delay time determination module 404, if the identification result indicates a risk of fraud, determine the delay time according to the identification result; wherein, the longer the delay time, the higher the fraud risk represented by the identification result; The execution module 405, if it is determined that the delayed transfer function is triggered, performs a delayed transfer based on the delay time. The delay time determination module 404 determines the risk level corresponding to the identification result from at least two preset risk levels according to the identification result, as the target risk level; wherein, the higher the target risk level is , Indicating that the fraud risk represented by the identification result is higher; determining the delay time according to the target risk level; wherein, the longer the delay time is, the higher the target risk level is. For each preset risk level, preset the duration interval corresponding to the risk level; for any two risk levels, the left end value of the duration interval corresponding to the higher risk level is greater than that of the lower risk level The right end value of the duration interval of The delay duration determination module 404 determines the duration interval corresponding to the target risk level according to the target risk level as the target duration interval; and determines the delay duration based on the target duration interval. The prompt module 403 displays the target duration interval to the user to prompt the user to specify the delay duration based on the target duration interval; The execution module 405 determines that the delayed transfer function is triggered if it is determined that the delay time specified by the user is acquired. The delay time determination module 404 obtains the delay time specified by the user based on the target time interval. The delay time determination module 404, if it is determined that the delayed transfer function is triggered, determines the delay time according to the identification result. The embodiment of this specification also provides a computer device, which at least includes a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor executes the program as shown in FIG. 1 method. FIG. 5 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification. The device may include a processor 1010, a storage 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. . The processor 1010, the storage 1020, the input/output interface 1030 and the communication interface 1040 realize the communication connection between each other in the device through the bus 1050. The processor 1010 may be implemented by a general CPU (Central Processing Unit, central processing unit), a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc., for Execute related programs to realize the technical solutions provided in the embodiments of this specification. The storage 1020 can be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc. The storage 1020 can store the operating system and other application programs. When the technical solutions provided in the embodiments of this specification are implemented through software or firmware, the related program codes are stored in the storage 1020 and called for execution by the processor 1010 . The input/output interface 1030 is used for connecting input/output modules to realize information input and output. The input/output/module can be configured in the device as a component (not shown in the figure), or can be connected to the device to provide corresponding functions. The input devices may include keyboards, mice, touch screens, microphones, various sensors, etc., and output devices may include displays, speakers, vibrators, indicator lights, and so on. The communication interface 1040 is used to connect a communication module (not shown in the figure) to realize the communication interaction between the device and other devices. The communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.). The bus 1050 includes a path for transmitting information between various components of the device (such as the processor 1010, the storage 1020, the input/output interface 1030, and the communication interface 1040). It should be noted that although the above device only shows the processor 1010, the storage 1020, the input/output interface 1030, the communication interface 1040, and the bus 1050, in the specific implementation process, the device may also include a place for normal operation. Other required components. In addition, those skilled in the art can understand that the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of the present specification, rather than all the components shown in the figures. The embodiment of the specification also provides a computer-readable storage medium on which a computer program is stored, and the program is executed by a processor to implement the method shown in FIG. 1. Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital multi-function Optical discs (DVD) or other optical storage, cassette tapes, magnetic tape storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. From the description of the above embodiments, those skilled in the art can clearly understand that the embodiments of this specification can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solutions of the embodiments of this specification can be embodied in the form of software products, which can be stored in storage media, such as ROM/RAM, magnetic A disc, an optical disc, etc., include a number of instructions to make a computer device (which can be a personal computer, a server, or a network device, etc.) execute the methods described in the various embodiments or some parts of the embodiments of this specification. The systems, methods, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game console , Tablets, wearable devices, or a combination of any of these devices. The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the method embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant part can refer to the part of the description of the method embodiment. The method embodiments described above are merely illustrative. The modules described as separate components may or may not be physically separated. When implementing the solutions of the embodiments of this specification, the functions of the modules can be Implemented in the same one or more software and/or hardware. It is also possible to select some or all of the modules according to actual needs to achieve the objectives of the solutions of the embodiments. Those of ordinary skill in the art can understand and implement it without making progressive work. The above are only specific implementations of the embodiments of this specification. It should be pointed out that for those of ordinary skill in the art, without departing from the principle of the embodiments of this specification, several improvements and modifications can be made. These Improvements and modifications should also be regarded as the protection scope of the embodiments of this specification.

S100:步驟 S102:步驟 S104:步驟 S106:步驟 S108:步驟 401:接收模組 402:風險辨識模組 403:提示模組 404:延時時長確定模組 405:執行模組 1010:處理器 1020:儲存器 1030:輸入/輸出介面 1040:通訊介面 1050:匯流排S100: steps S102: Step S104: Step S106: Step S108: Step 401: receiving module 402: Risk Identification Module 403: Prompt Module 404: Delay time determination module 405: Execution Module 1010: processor 1020: Storage 1030: input/output interface 1040: Communication interface 1050: Bus

為了更清楚地說明本說明書實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的圖式作簡單地介紹,顯而易見地,下面描述中的圖式僅僅是本說明書實施例中記載的一些實施例,對於本領域普通技術人員來講,還可以根據這些圖式獲得其他的圖式。 圖1是本說明書實施例提供的一種基於風險辨識的轉帳請求處理方法的流程示意圖; 圖2是本說明書實施例提供的確定延時時長的示意圖; 圖3是本說明書實施例提供的基於風險辨識的轉帳請求處理方法的示例圖; 圖4是本說明書實施例提供的一種基於風險辨識的轉帳請求處理裝置的結構示意圖; 圖5是用於配置本說明書實施例方法的一種設備的結構示意圖。In order to more clearly explain the technical solutions in the embodiments of this specification or the prior art, the following will briefly introduce the drawings that need to be used in the embodiments or the description of the prior art. Obviously, the drawings in the following description are merely the present For some of the embodiments described in the embodiments of the specification, for those of ordinary skill in the art, other drawings may be obtained based on these drawings. FIG. 1 is a schematic flowchart of a method for processing a transfer request based on risk identification according to an embodiment of this specification; FIG. 2 is a schematic diagram of determining the delay time provided by an embodiment of this specification; FIG. 3 is an exemplary diagram of a method for processing a transfer request based on risk identification according to an embodiment of this specification; FIG. 4 is a schematic structural diagram of a transfer request processing device based on risk identification according to an embodiment of this specification; Fig. 5 is a schematic structural diagram of a device for configuring the method of the embodiment of this specification.

Claims (13)

一種基於風險辨識的轉帳請求處理方法,包括: 接收用戶發起的轉帳請求; 基於預設的詐欺風險辨識模型,針對所述轉帳請求進行風險辨識; 若辨識結果表徵具有詐欺風險,則提示所述用戶觸發延時轉帳功能;並且,根據所述辨識結果,確定延時時長;其中,所述延時時長越長,表明所述辨識結果表徵的詐欺風險越高; 若確定所述延時轉帳功能被觸發,則基於所述延時時長,進行延時轉帳。A method for processing transfer requests based on risk identification, including: Receive transfer requests initiated by users; Perform risk identification for the transfer request based on a preset fraud risk identification model; If the identification result indicates that there is a risk of fraud, the user is prompted to trigger the delayed transfer function; and according to the identification result, the delay time is determined; wherein, the longer the delay time is, the fraud risk represented by the identification result Higher If it is determined that the delayed transfer function is triggered, the delayed transfer is performed based on the delayed time. 如請求項1所述的方法,根據所述辨識結果,確定延時時長,具體包括: 根據所述辨識結果,從預設的至少兩個風險等級中確定所述辨識結果對應的風險等級,作為目標風險等級;其中,所述目標風險等級越高,表明所述辨識結果表徵的詐欺風險越高; 根據所述目標風險等級,確定延時時長;其中,所述延時時長越長,表明所述目標風險等級越高。According to the method described in claim 1, determining the delay time according to the identification result, which specifically includes: According to the identification result, the risk level corresponding to the identification result is determined from the preset at least two risk levels as the target risk level; wherein, the higher the target risk level is, the fraud risk represented by the identification result Higher Determine the delay time according to the target risk level; wherein, the longer the delay time, the higher the target risk level. 如請求項2所述的方法,針對預設的每個風險等級,預設該風險等級對應的時長區間;針對任意兩個風險等級,較高的風險等級所對應的時長區間的左端點值大於較低的風險等級所對應的時長區間的右端點值; 根據所述目標風險等級,確定延時時長,具體包括: 根據所述目標風險等級,確定所述目標風險等級對應的時長區間,作為目標時長區間; 基於所述目標時長區間,確定延時時長。As described in claim 2, for each preset risk level, preset the duration interval corresponding to the risk level; for any two risk levels, the left end of the duration interval corresponding to the higher risk level Value is greater than the right end value of the duration interval corresponding to the lower risk level; According to the target risk level, determine the delay time, which specifically includes: According to the target risk level, determine the duration interval corresponding to the target risk level as the target duration interval; Based on the target duration interval, the delay duration is determined. 如請求項3所述的方法,提示所述用戶觸發延時轉帳功能,具體包括: 將所述目標時長區間展示給所述用戶,以提示所述用戶基於所述目標時長區間指定延時時長; 確定所述延時轉帳功能被觸發,具體包括: 確定獲取到所述用戶指定的延時時長。The method described in claim 3, prompting the user to trigger the delayed transfer function, specifically includes: Displaying the target duration interval to the user to prompt the user to specify the delay duration based on the target duration interval; It is determined that the delayed transfer function is triggered, which specifically includes: It is determined that the delay time specified by the user is obtained. 如請求項3或4所述的方法,基於所述目標時長區間,確定延時時長,具體包括: 獲取所述用戶基於所述目標時長區間指定的延時時長。According to the method described in claim 3 or 4, based on the target time interval, determining the delay time includes: Acquire the delay time specified by the user based on the target time interval. 如請求項1至3中任一項所述的方法,根據所述辨識結果,確定延時時長,具體包括: 若確定所述延時轉帳功能被觸發,則根據所述辨識結果,確定延時時長。According to the method described in any one of claims 1 to 3, determining the delay time according to the identification result includes: If it is determined that the delayed transfer function is triggered, the delay time is determined according to the identification result. 一種基於風險辨識的轉帳請求處理裝置,包括: 接收模組,接收用戶發起的轉帳請求; 風險辨識模組,基於預設的詐欺風險辨識模型,針對所述轉帳請求進行風險辨識; 提示模組,若辨識結果表徵具有詐欺風險,則提示所述用戶觸發延時轉帳功能; 延時時長確定模組,若辨識結果表徵具有詐欺風險,則根據所述辨識結果,確定延時時長;其中,所述延時時長越長,表明所述辨識結果表徵的詐欺風險越高; 執行模組,若確定所述延時轉帳功能被觸發,則基於所述延時時長,進行延時轉帳。A transfer request processing device based on risk identification, including: The receiving module receives the transfer request initiated by the user; The risk identification module, based on a preset fraud risk identification model, performs risk identification for the transfer request; The prompt module, if the identification result indicates a fraud risk, prompt the user to trigger the delayed transfer function; The delay time determination module, if the identification result indicates a risk of fraud, determine the delay time according to the identification result; wherein, the longer the delay time, the higher the fraud risk represented by the identification result; The execution module, if it is determined that the delayed transfer function is triggered, performs delayed transfer based on the delayed time. 如請求項7所述的裝置,所述延時時長確定模組,根據所述辨識結果,從預設的至少兩個風險等級中確定所述辨識結果對應的風險等級,作為目標風險等級;其中,所述目標風險等級越高,表明所述辨識結果表徵的詐欺風險越高;根據所述目標風險等級,確定延時時長;其中,所述延時時長越長,表明所述目標風險等級越高。According to the device of claim 7, the delay time determination module determines the risk level corresponding to the identification result from at least two preset risk levels according to the identification result, as the target risk level; wherein , The higher the target risk level is, the higher the fraud risk represented by the identification result is; the delay time is determined according to the target risk level; wherein, the longer the delay time is, the higher the target risk level is high. 如請求項8所述的裝置,針對預設的每個風險等級,預設該風險等級對應的時長區間;針對任意兩個風險等級,較高的風險等級所對應的時長區間的左端點值大於較低的風險等級所對應的時長區間的右端點值; 所述延時時長確定模組,根據所述目標風險等級,確定所述目標風險等級對應的時長區間,作為目標時長區間;基於所述目標時長區間,確定延時時長。The device according to claim 8, for each preset risk level, preset the duration interval corresponding to the risk level; for any two risk levels, the left end of the duration interval corresponding to the higher risk level Value is greater than the right end value of the duration interval corresponding to the lower risk level; The delay duration determination module determines the duration interval corresponding to the target risk level according to the target risk level as the target duration interval; and determines the delay duration based on the target duration interval. 如請求項9所述的裝置,所述提示模組,將所述目標時長區間展示給所述用戶,以提示所述用戶基於所述目標時長區間指定延時時長; 所述執行模組,若確定獲取到所述用戶指定的延時時長,則確定所述延時轉帳功能被觸發。According to the device according to claim 9, the prompt module displays the target duration interval to the user to prompt the user to specify the delay duration based on the target duration interval; The execution module determines that the delayed transfer function is triggered if it is determined that the delay time specified by the user is acquired. 如請求項9或10所述的裝置,所述延時時長確定模組,獲取所述用戶基於所述目標時長區間指定的延時時長。For the device according to claim 9 or 10, the delay time determination module acquires the delay time specified by the user based on the target time interval. 如請求項7至9中任一項所述的裝置,所述延時時長確定模組,若確定所述延時轉帳功能被觸發,則根據所述辨識結果,確定延時時長。For the device according to any one of Claims 7 to 9, the delay time determination module determines the delay time according to the identification result if it is determined that the delayed transfer function is triggered. 一種電腦設備,包括儲存器、處理器及儲存在儲存器上並可在處理器上運行的電腦程式,其中,所述處理器執行所述程式時實現如請求項1至6中任一項所述的方法。A computer device includes a memory, a processor, and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program as described in any one of claim items 1 to 6 The method described.
TW108129630A 2018-11-14 2019-08-20 Risk identification-based account transfer request processing method and device TW202032454A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811352286.4A CN109858912A (en) 2018-11-14 2018-11-14 A kind of transfer request processing method and processing device based on risk identification
CN201811352286.4 2018-11-14

Publications (1)

Publication Number Publication Date
TW202032454A true TW202032454A (en) 2020-09-01

Family

ID=66889999

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108129630A TW202032454A (en) 2018-11-14 2019-08-20 Risk identification-based account transfer request processing method and device

Country Status (3)

Country Link
CN (1) CN109858912A (en)
TW (1) TW202032454A (en)
WO (1) WO2020098375A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858912A (en) * 2018-11-14 2019-06-07 阿里巴巴集团控股有限公司 A kind of transfer request processing method and processing device based on risk identification

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110225076A1 (en) * 2010-03-09 2011-09-15 Google Inc. Method and system for detecting fraudulent internet merchants
CN102194177A (en) * 2011-05-13 2011-09-21 南京柯富锐软件科技有限公司 System for risk control over online payment
CN106408282A (en) * 2016-08-25 2017-02-15 深圳怡化电脑股份有限公司 Transfer service processing method and system of self-service terminal
CN106548302B (en) * 2016-12-01 2020-08-14 携程旅游信息技术(上海)有限公司 Risk identification method and system for internet transaction
CN108256842B (en) * 2018-01-11 2021-10-01 杭州复杂美科技有限公司 Address authority management method for block chain associated wallet
CN108510257A (en) * 2018-04-23 2018-09-07 孙峰 A kind of electronic payment mode
CN109858912A (en) * 2018-11-14 2019-06-07 阿里巴巴集团控股有限公司 A kind of transfer request processing method and processing device based on risk identification

Also Published As

Publication number Publication date
WO2020098375A1 (en) 2020-05-22
CN109858912A (en) 2019-06-07

Similar Documents

Publication Publication Date Title
US11526889B2 (en) Resource transferring monitoring method and device
EP3780541B1 (en) Identity information identification method and device
US10282728B2 (en) Detecting fraudulent mobile payments
JP2020522040A (en) Methods and devices for offline payment, service processing, and payment processing
CN110163612B (en) Payment wind control method and device
KR20190121777A (en) Service execution method and device
CN108960839B (en) Payment method and device
US20160314292A1 (en) Security verification method and apparatus
CN104392350A (en) Virtual resource data processing method, device and system
US20160335611A1 (en) User attribute value transfer method and terminal
KR20150100623A (en) Method and apparatus for using sensors on a portable electronic device to verify transactions
US20200372511A1 (en) Information Reminding Method and Apparatus, and Electronic Device
US11170188B2 (en) Method and apparatus for presenting graphic codes
CN110020846B (en) Transfer service processing method and system
CN117522411A (en) Secure payment method, apparatus, device and readable medium
CN104683104B (en) The method, apparatus and system of authentication
WO2020114113A1 (en) Payment code generation method, apparatus and device, and mobile payment method, apparatus and device
CN109003071B (en) Payment method, device and equipment
CN111126623A (en) Model updating method, device and equipment
CN106127463A (en) One is transferred accounts control method and terminal unit
CN107924514B (en) Apparatus and method for performing payment transactions using dynamic MST configuration
WO2019221713A1 (en) Data security method utilizing mesh network dynamic scoring
CN111353784A (en) Transfer processing method, system, device and equipment
TW202032454A (en) Risk identification-based account transfer request processing method and device
CN111553697A (en) Risk processing method, device, equipment and storage medium