WO2019144808A1 - Method and apparatus for determining false resource transfer, method and apparatus for determining false trading, and electronic device - Google Patents

Method and apparatus for determining false resource transfer, method and apparatus for determining false trading, and electronic device Download PDF

Info

Publication number
WO2019144808A1
WO2019144808A1 PCT/CN2019/071113 CN2019071113W WO2019144808A1 WO 2019144808 A1 WO2019144808 A1 WO 2019144808A1 CN 2019071113 W CN2019071113 W CN 2019071113W WO 2019144808 A1 WO2019144808 A1 WO 2019144808A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
transaction
resource transfer
historical
behavior
Prior art date
Application number
PCT/CN2019/071113
Other languages
French (fr)
Chinese (zh)
Inventor
程羽
陈弢
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2019144808A1 publication Critical patent/WO2019144808A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0623Item investigation

Definitions

  • the present application relates to the field of computer technologies, and in particular, to a method, device, and electronic device for determining a false resource transfer and a fraudulent transaction.
  • e-commerce platforms such as Jingdong and Taobao have gradually become an indispensable part of people's daily lives.
  • a buyer wants to purchase an item he can browse through the e-commerce platform to browse the item he wants to purchase, and select an item to complete the transaction.
  • Most buyers choose a certain product to compare a number of similar products, usually based on information from other buyers on the product, seller's business, and seller's credit points to determine whether a product is worth buying.
  • the embodiment of the present application provides a method, a device, and an electronic device for determining a false resource transfer and a false transaction, so as to solve the problem that the method for determining a false transaction in the prior art is not optimized.
  • a method for determining the transfer of false resources including:
  • the fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  • a method for determining a false transaction including:
  • the false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  • an apparatus for determining a false resource transfer including:
  • An acquiring unit acquiring historical resource transfer data of the resource transfer party within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transfer party within a second predetermined time period before the resource to be verified is transferred ;
  • the determining unit determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
  • the fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  • an apparatus for determining a fraudulent transaction comprising:
  • Obtaining a unit acquiring historical transaction data of a transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
  • a determining unit determining, according to the historical resource transfer data, the behavior data, and a fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction
  • the false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  • an electronic device comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • the fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  • a computer readable storage medium storing one or more programs, when the one or more programs are executed by an electronic device including a plurality of applications, The electronic device performs the following operations:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • the fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  • an electronic device comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • the false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  • a computer readable storage medium storing one or more programs that, when executed by an electronic device comprising a plurality of applications, cause The electronic device performs the following operations:
  • the false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  • the basis of the transfer improves the accuracy of discriminating the transfer of false resources and achieves the purpose of optimizing the identification of the transfer of false resources.
  • the false transaction model determines whether the transaction to be verified is a false transaction. It not only considers the historical transaction data of the transaction payer, that is, the buyer, but also uses the behavior data before the transaction as the basis for discriminating the false transaction, and improves the discrimination of the false transaction. The accuracy of the goal is to optimize the identification of false transactions.
  • FIG. 1 is a schematic flowchart of an implementation method for determining a false resource transfer according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of an implementation process of a method for determining a fake transaction according to an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of a data processing process of a method for determining a fake transaction according to an embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of a process of performing vectorization preprocessing of behavior data in a method for determining a false transaction according to an embodiment of the present disclosure
  • FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of another electronic device according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of an apparatus for determining a false resource transfer according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of an apparatus for determining a fake transaction according to an embodiment of the present disclosure.
  • the embodiment of the present specification provides a method for determining a false resource transfer.
  • the execution subject of the method for determining the false resource transfer provided by the embodiment of the present disclosure may be, but is not limited to, a server, a personal computer, or the like, which can be configured to perform at least one of the method terminals provided by the embodiments of the present invention.
  • FIG. 1 a schematic flowchart for implementing a method for determining a false resource transfer provided by one or more embodiments of the present disclosure is as shown in FIG. 1 , and includes:
  • Step 110 Obtain historical resource transfer data of the resource transfer party within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transfer party within a second predetermined time period before the resource to be verified is transferred;
  • the historical resource transfer data includes at least one of the following: the number of historical resource transfers, the historical resource transfer quota, and the number of resource recipients involved in the historical resource transfer.
  • the resource transfer may be, for example, a transaction
  • the historical resource transfer data may specifically include: a historical transaction number, a historical transaction amount, a transaction transaction involved in the historical transaction, that is, a seller or a merchant, and the single transaction is the largest.
  • Value, single transaction minimum, single transaction average, daily trading maximum, daily trading minimum, daily trading average, etc., can be used as the transaction payer, that is, the historical transaction data of the buyer before the transaction. .
  • the behavior data includes at least one of the following: the information of the resource receiver browsed by the resource transferee, the browsing duration, and the browsed resource information, and the information of the resource receiver includes at least the credit value, the resource category, and the resource value of the resource receiver. Distribution, health.
  • the behavior data may specifically include: information of the seller or the merchant that the buyer browsed before completing the transaction, and the length of time that each seller or merchant stays while browsing, and the products browsed in each merchant.
  • the seller or merchant's information includes the credit value of the seller or merchant, the category of the commodity in the merchant, the price distribution of the commodity, and the recent complaints of the merchant (such as within a month) The number of times, and so on.
  • the first predetermined time period may be a certain period of time before the resource transfer party, such as a period of three months, one month or one week before the resource transfer, the second reservation The time period may be a few days or a day or a few hours before the resource transfer party, and the first predetermined time period and the second predetermined time period may be set according to actual needs. The embodiment or embodiments do not specifically limit this.
  • one or more embodiments of the present specification not only consider the historical resource transfer data of the resource transfer party within the first predetermined time period before the resource transfer to be verified, but also the resource transfer party in the resource transfer to be verified. The behavior data in the first two predetermined time periods, thereby improving the accuracy of identifying the transfer of false resources, and further safeguarding the rights of other resource transfer parties, that is, buyers.
  • Step 120 Determine, according to the historical resource transfer data, the behavior data, and the false resource transfer model, whether the resource transfer to be verified is a false resource transfer; wherein the false resource transfer model is trained based on the historical resource transfer training data and the corresponding behavior training data.
  • the historical resource transfer characteristic data may be first determined according to the historical resource transfer data, and according to the behavior data, The behavior characteristic data is determined. Finally, the historical resource transfer characteristic data, the behavior characteristic data, and the false resource transfer model can be used to determine whether the resource transfer to be verified is a false resource transfer.
  • the historical resource transfer data, the behavior data, and the false resource transfer model determine whether the resource transfer to be verified is a schematic diagram of a false resource transfer process.
  • the historical resource transfer data includes the buyer information and the like data shown in FIG. 2, and the buyer information may include information such as the number of resource transfers and the resource transfer quota of the buyer within the first predetermined time period before the resource transfer. Since the historical resource transfer data is the resource transfer party, that is, the historical resource transfer data of the buyer before the resource transfer, it will not change with the change of the behavior of the resource transfer party, so the history may also be used.
  • the resource transfer data is called static data; the behavior data includes the business information shown in Figure 2, the trader's transaction history, and the browsing log. Since the behavior data changes with the buyer's behavior, the behavior data can also be used. Called dynamic data.
  • the historical resource transfer feature data may be determined according to the static data, and the behavior feature data is determined according to the dynamic data.
  • the dynamic data may include data that cannot be directly represented by a vector, such as a business address, when determining the behavior characteristic data according to the dynamic data, it is also necessary to encode the data in the dynamic data that cannot be directly represented by the vector. This is the vectorization preprocessing described below.
  • the two feature data can be spliced based on the two feature data and the fake resource transfer model, and the second classifier algorithm is used to determine whether the resource transfer is performed. Transfer for false resources.
  • the behavior characteristic data is determined.
  • Vectorization preprocessing of data in the behavior data that cannot be directly characterized by vectors can be performed first to convert non-vector data in the behavior data into vector data; and since the behavior data includes data of multiple feature dimensions, in order to unify these features Dimensional data is dimensioned, so the vectorized preprocessed behavior data is also normalized to obtain behavioral feature data.
  • the method of vectorizing the behavior data may adopt a tool for converting a string into a vector form such as a word2vector algorithm, an embedding algorithm, and the like.
  • FIG. 3 a schematic diagram of a process for processing behavior data provided by one or more embodiments of the present specification
  • data that cannot be directly represented by a vector in behavior data can be converted into a vectorized preprocessing to
  • the vector form as shown in the "Click to Browse ID” data in Figure 3, is the ID of a merchant that the resource transferee viewed before the resource transfer. Since the data is "00N5789Y218", that is, a string form, it cannot be directly represented by a vector.
  • the string can be converted into a vector form by the word2vector algorithm, and the obtained "browsing merchant information" and “browsing details” are represented by vectors, and these are
  • the behavior data characterized as a vector form is spliced into a multi-dimensional vector, and the unified dimension is processed by normalization.
  • the historical resource transfer training data is normalized to obtain the corresponding historical resource transfer feature data; then the data in the behavior training data that cannot be directly represented by the vector is vectorized and preprocessed; then, after vectorization preprocessing
  • the behavioral training data is normalized to obtain the corresponding behavioral feature data.
  • the historical resource transfer characteristic data, the behavioral feature data and the corresponding resource transfer type are input as inputs, and the false resource transfer model is trained, wherein the resource transfer type Includes non-fake resource transfers and non-fake resource transfers.
  • the historical resource transfer training data and the corresponding behavior training data include: a plurality of non-false resource transfer resource transfer party historical resources The transfer data and the corresponding behavior data, and the historical resource transfer data and the corresponding behavior data of the resource transfer party of the multiple false resource transfer; the false resource transfer model is trained based on the historical resource transfer training data and the corresponding behavior training data.
  • the process can include:
  • the historical resource transfer data of the resource transfer party of the non-fake resource transfer may be normalized to obtain the corresponding historical resource transfer feature data of the non-fake resource transfer, and the resources transferred to the multiple false resources
  • the historical resource transfer data of the transferee is normalized to obtain the corresponding historical resource transfer feature data of the multiple false resource transfer, wherein the historical resource transfer data of the resource transfer party of the multiple non-false resource transfer is the resource transfer
  • the historical resource transfer data of the first predetermined time period before the corresponding non-fake resource transfer, and the historical resource transfer data of the resource transfer party of the multiple false resource transfer are the resource transfer party before the corresponding false resource transfer Historical resource transfer data within a first predetermined time period;
  • Step ii performing vectorization preprocessing on data that cannot be directly represented by the vector in the corresponding behavior data in the multiple non-fake resource transitions; performing vector on the data that cannot be directly represented by the vector in the corresponding behavior data in the multiple false resource transitions
  • the pre-processing wherein the corresponding behavior data in the multiple non-fake resource transfers is the behavior data of the resource transfer party in the second predetermined time period before the corresponding non-fake resource transfer, and the corresponding behavior in the multiple false resource transfers
  • the data is behavior data of the resource transfer party within a second predetermined time period before the corresponding false resource transfer;
  • Step iii normalize the corresponding behavior data in the plurality of non-fake resource transitions after the vectorization pre-processing to obtain corresponding behavior characteristic data in the plurality of non-false resource transitions;
  • the corresponding behavior data in the multiple false resource transitions after processing is normalized to obtain corresponding behavior characteristic data in multiple false resource transitions;
  • Step iv training a false resource transfer model based on historical resource transfer feature data and corresponding behavior feature data of multiple non-fake resource transfers, and historical resource transfer feature data and corresponding behavior feature data of multiple false resource transfers.
  • the fake resource transfer module may be based on historical resource transfer feature data and corresponding behavior feature data of multiple non-false resource transfers, and historical resource transfer feature data and corresponding behavior feature data of multiple false resource transfers.
  • the classifier is trained, and the specific training method can refer to the related model training method in the prior art, and will not be described again.
  • the historical resource transfer training data is normalized to obtain the corresponding historical resource transfer feature data.
  • the data that can not be directly represented by the vector in the behavior training data is vectorized and preprocessed, and the vectorized preprocessed
  • the behavioral training data is normalized and the corresponding behavioral feature data is obtained.
  • the historical resource transfer characteristic data and behavioral feature data are taken as input, and the false resource transfer model is obtained by clustering training according to the two classifications.
  • the specific training method can be referred to.
  • the related model training methods in the prior art are not described again.
  • the basis of the transfer improves the accuracy of discriminating the transfer of false resources and achieves the purpose of optimizing the identification of the transfer of false resources.
  • FIG. 4 is a schematic flowchart of an implementation of a method for determining a fraudulent transaction provided by an embodiment of the present specification, including:
  • Step 210 Obtain historical transaction data of the transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
  • the historical transaction data includes at least one of the following: a historical transaction number, a historical transaction amount, and a number of transaction recipients involved in the historical transaction; and the behavior data includes at least one of the following: the transaction recipient's information of the transaction recipient browsing, The browsing time, the viewed product information, and the transaction recipient's information include at least the transaction recipient's credit value, product category, commodity price distribution, and health level.
  • Step 220 Determine whether the transaction to be verified is a false transaction based on historical resource transfer data, behavior data, and a false transaction model; the fake transaction model is trained based on historical transaction training data and corresponding behavior training data.
  • the historical transaction characteristic data may be first determined according to the historical transaction data; and then, the behavior characteristic data is determined according to the behavior data; Finally, based on historical transaction characteristic data, behavioral feature data and false transaction model, it is determined whether the transaction to be verified is a false transaction.
  • the behavior characteristic data is determined. Specifically, the data that cannot be directly represented by the vector in the behavior data may be subjected to vectorization preprocessing; then, the behavioral data after the vectorization preprocessing is normalized. Process to get behavioral feature data.
  • the false transaction model Before determining whether the transaction to be verified is a false transaction based on historical transaction data, behavior data and false transaction model, the false transaction model can be trained through two modes: supervised two-class training mode and unsupervised two-class training mode:
  • the historical transaction training data is normalized to obtain the corresponding historical transaction characteristic data; then the data in the behavior training data that cannot be directly represented by the vector is vectorized and preprocessed; then, the vectorized preprocessed behavior is performed.
  • the training data is normalized to obtain corresponding behavioral feature data.
  • historical transaction characteristic data, behavioral feature data and corresponding transaction types are input as inputs, and a false transaction model is trained, wherein the transaction types include non-false transactions and non-transactions.
  • the historical transaction training data is normalized to obtain the corresponding historical transaction feature data.
  • the data in the behavior training data that cannot be directly represented by the vector is vectorized and preprocessed, and the vectorized preconditioned behavior training is performed.
  • the data is normalized to obtain corresponding behavioral feature data; finally, historical transaction characteristic data and behavioral feature data are taken as inputs, and clustering training is performed according to the two classifications to obtain the false transaction model.
  • the false transaction model determines whether the transaction to be verified is a false transaction. It not only considers the historical transaction data of the transaction payer, that is, the buyer, but also uses the behavior data before the transaction as the basis for discriminating the false transaction, and improves the discrimination of the false transaction. The accuracy of the goal is to optimize the identification of false transactions.
  • FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present specification.
  • the electronic device includes a processor, optionally including an internal bus, a network interface, and a memory.
  • the memory may include a memory, such as a high-speed random access memory (RAM), and may also include a non-volatile memory, such as at least one disk memory.
  • RAM high-speed random access memory
  • non-volatile memory such as at least one disk memory.
  • the electronic device may also include hardware required for other services.
  • the processor, the network interface, and the memory may be interconnected by an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, or an EISA (Extended) Industry Standard Architecture, extending the industry standard structure) bus.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one double-headed arrow is shown in Figure 5, but it does not mean that there is only one bus or one type of bus.
  • the program can include program code, the program code including computer operating instructions.
  • the memory can include both memory and non-volatile memory and provides instructions and data to the processor.
  • the processor reads the corresponding computer program from the non-volatile memory into memory and then runs, forming a device at the logical level to determine the transfer of the fake resource.
  • the processor executes the program stored in the memory and is specifically used to perform the following operations:
  • the fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  • the method for determining a false resource transfer disclosed in the embodiment shown in FIG. 1 of the present specification may be applied to a processor or implemented by a processor.
  • the processor may be an integrated circuit chip with signal processing capabilities.
  • each step of the above method may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software.
  • the above processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP), etc.; or may be a digital signal processor (DSP), dedicated integration.
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • other programmable logic device discrete gate or transistor logic device, discrete hardware component.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the steps of a method disclosed in connection with one or more embodiments of the present specification can be directly embodied as a hardware decoding processor or a combination of hardware and software modules in a decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory, and the processor reads the information in the memory and combines the hardware to complete the steps of the above method.
  • the electronic device can also perform the method for determining the false resource transfer in FIG. 1 , and the description is not repeated herein.
  • the electronic device of the present specification does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit. It can also be hardware or logic.
  • FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present specification.
  • the electronic device includes a processor, optionally including an internal bus, a network interface, and a memory.
  • the memory may include a memory, such as a high-speed random access memory (RAM), and may also include a non-volatile memory, such as at least one disk memory.
  • RAM high-speed random access memory
  • non-volatile memory such as at least one disk memory.
  • the electronic device may also include hardware required for other services.
  • the processor, the network interface, and the memory may be interconnected by an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, or an EISA (Extended) Industry Standard Architecture, extending the industry standard structure) bus.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one double-headed arrow is shown in Figure 6, but it does not mean that there is only one bus or one type of bus.
  • the program can include program code, the program code including computer operating instructions.
  • the memory can include both memory and non-volatile memory and provides instructions and data to the processor.
  • the processor reads the corresponding computer program from the non-volatile memory into memory and then runs, forming a device at the logical level to determine the fraudulent transaction.
  • the processor executes the program stored in the memory and is specifically used to perform the following operations:
  • the false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  • the method for determining a fraudulent transaction as disclosed in the embodiment shown in FIG. 4 of the present specification may be applied to a processor or implemented by a processor.
  • the processor may be an integrated circuit chip with signal processing capabilities.
  • each step of the above method may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software.
  • the above processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP), etc.; or may be a digital signal processor (DSP), dedicated integration.
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • other programmable logic device discrete gate or transistor logic device, discrete hardware component.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the steps of a method disclosed in connection with one or more embodiments of the present specification can be directly embodied as a hardware decoding processor or a combination of hardware and software modules in a decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory, and the processor reads the information in the memory and combines the hardware to complete the steps of the above method.
  • the electronic device can also perform the method for determining a fraudulent transaction of FIG. 4, and the description is not repeated herein.
  • the electronic device of the present specification does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit. It can also be hardware or logic.
  • FIG. 7 is a schematic structural diagram of an apparatus 700 for determining a false resource transfer provided by the present specification.
  • the apparatus 700 for determining a false resource transfer may include an obtaining unit 701 and a determining unit 702, where:
  • the obtaining unit 701 is configured to acquire historical resource transfer data of the resource transfer party within a first predetermined time period before the resource to be verified is transferred, and behavior of the resource transfer party within a second predetermined time period before the resource to be verified is transferred. data;
  • the determining unit 702 determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
  • the fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  • the behavior data subjected to the vectorization preprocessing is normalized to obtain the behavior characteristic data.
  • the apparatus before the determining unit 702 determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer, the apparatus further includes :
  • the first processing unit 703 performs normalization processing on the historical resource transfer training data to obtain corresponding historical resource transfer feature data
  • the second processing unit 704 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data
  • the third processing unit 705 performs normalization processing on the behavior training data after the vectorization preprocessing to obtain corresponding behavior feature data
  • the first training unit 706, by using the historical resource transfer feature data, the behavior feature data, and the corresponding resource transfer type as an input, training the obtained false resource transfer model, wherein the resource transfer type includes a fake resource transfer and Non-false resource transfer.
  • the apparatus before the determining unit 702 determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer, the apparatus further includes :
  • the fourth processing unit 707 performs normalization processing on the historical resource transfer training data to obtain corresponding historical resource transfer feature data
  • the fifth processing unit 708 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data, and normalizes the behavior training data after the vectorization preprocessing to obtain a corresponding behavior.
  • Characteristic data
  • the second training unit 709 takes the historical resource transfer feature data and the behavior feature data as input, and performs cluster training according to the two classifications to obtain the false resource transfer model.
  • the historical resource transfer data includes at least one of the following:
  • the behavior data includes at least one of the following:
  • the information of the resource receiver of the resource transfer party, the browsing duration, and the browsed resource information, and the information of the resource receiver includes at least the credit value, resource category, resource value distribution, and health level of the resource receiver.
  • the device 700 for determining the virtual resource transfer can implement the method of the method embodiment of FIG. 1 to FIG. 3 .
  • the device 700 for determining the virtual resource transfer can implement the method of the method embodiment of FIG. 1 to FIG. 3 .
  • the method for determining the false resource transfer in the embodiment shown in FIG. 1 and details are not described herein again.
  • FIG. 8 is a schematic structural diagram of an apparatus 800 for determining a fraudulent transaction provided by the present specification.
  • the apparatus 800 for determining a fraudulent transaction may include an obtaining unit 801 and a determining unit 802, where:
  • Obtaining a unit acquiring historical transaction data of a transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
  • a determining unit determining, according to the historical resource transfer data, the behavior data, and a fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction
  • the false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  • the behavior data subjected to the vectorization preprocessing is normalized to obtain the behavior characteristic data.
  • the device before the determining unit 802 determines, according to the historical transaction data, the behavior data, and the fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction, the device further includes:
  • the first processing unit 803 performs normalization processing on the historical transaction training data to obtain corresponding historical transaction feature data
  • the second processing unit 804 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data
  • the third processing unit 805 normalizes the behavior training data after the vectorization preprocessing to obtain corresponding behavior feature data
  • the first training unit 806 receives the historical transaction feature data, the behavior feature data, and the corresponding transaction type as inputs, and trains the obtained false transaction model, wherein the transaction type includes a false transaction and a non-fake transaction.
  • the device before the determining unit 802 determines, according to the historical transaction data, the behavior data, and the fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction, the device further includes:
  • the fourth processing unit 807 performs normalization processing on the historical transaction training data to obtain corresponding historical transaction feature data
  • the fifth processing unit 808 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data, and normalizes the behavior training data after the vectorization preprocessing to obtain a corresponding behavior.
  • Characteristic data
  • the second training unit 809 takes the historical transaction feature data and the behavior feature data as input, and performs cluster training according to the two classifications to obtain the false transaction model.
  • the historical transaction data includes at least one of the following:
  • the number of historical transactions, the historical transaction amount, and the number of transaction recipients involved in historical transactions are the number of historical transactions, the historical transaction amount, and the number of transaction recipients involved in historical transactions.
  • the behavior data includes at least one of the following:
  • the device 800 for determining a fraudulent transaction can implement the method of the method embodiment of FIG. 4 .
  • the details refer to the method for determining a false transaction in the embodiment shown in FIG. 4 , and details are not described herein again.
  • the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
  • a typical implementation device is a computer.
  • the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A method and apparatus for determining a false resource transfer, a method and apparatus for determining false trading, and an electronic device, for use in solving the problem of optimization of method for determining false trading. The method comprises: obtaining past resource transfer data of a resource transferee within a first predetermined time period before a resource transfer to be verified, and behavior data of the resource transferee within a second predetermined time period before the resource transfer to be verified (110); and determining whether the resource transfer to be verified is a false resource transfer according to the past resource transfer data, the behavior data, and a false resource transfer model (120), wherein the false resource transfer model is trained on the basis of past resource transfer training data and corresponding behavior training data.

Description

判定虚假资源转移及虚假交易的方法、装置及电子设备Method, device and electronic device for determining false resource transfer and false transaction 技术领域Technical field
本申请涉及计算机技术领域,尤其涉及一种判定虚假资源转移及虚假交易的方法、装置及电子设备。The present application relates to the field of computer technologies, and in particular, to a method, device, and electronic device for determining a false resource transfer and a fraudulent transaction.
背景技术Background technique
目前,随着互联网技术的快速发展,诸如京东、淘宝等电商平台逐渐成为人们日常生活中不可缺少的一部分。当买家想要购买某件商品时,可以通过这些电商平台浏览想要购买的商品,并选择某件商品完成交易。大多数买家在选择某件商品时,往往会通过对多个类似的商品进行比较,通常依据其他买家对商品、卖家商户的评价、以及卖家商户的信用积分等信息来判断某个商品是否值得购买。At present, with the rapid development of Internet technology, e-commerce platforms such as Jingdong and Taobao have gradually become an indispensable part of people's daily lives. When a buyer wants to purchase an item, he can browse through the e-commerce platform to browse the item he wants to purchase, and select an item to complete the transaction. Most buyers choose a certain product to compare a number of similar products, usually based on information from other buyers on the product, seller's business, and seller's credit points to determine whether a product is worth buying.
然而,电商平台上的卖家为了获得对其商户或者某个商品较好的评价,往往会通过不正当方式(比如刷单等虚假交易的方式)获得商品销量、商户评分、信用积分等不当利益,使得买家在购买商品时做出错误的判断,进而妨害买家的权益。However, in order to obtain a good evaluation of their merchants or a certain commodity, sellers on the e-commerce platform often obtain improper sales such as merchandise sales, merchant ratings, credit scores, etc. through improper methods (such as flash transactions and other false transactions). In order to make the buyer make a wrong judgment when purchasing the goods, thereby hindering the buyer's rights.
因此,如何准确有效地识别虚假交易越来越成为电商平台亟需解决的重要问题之一。Therefore, how to accurately and effectively identify false transactions has become one of the most important issues to be solved in e-commerce platforms.
发明内容Summary of the invention
本申请实施例提供了一种判定虚假资源转移及虚假交易的方法、装置及电子设备,以解决现有技术中判定虚假交易的方法不够优化的问题。The embodiment of the present application provides a method, a device, and an electronic device for determining a false resource transfer and a false transaction, so as to solve the problem that the method for determining a false transaction in the prior art is not optimized.
为解决上述技术问题,本申请实施例是这样实现的:To solve the above technical problem, the embodiment of the present application is implemented as follows:
第一方面,提出了一种判定虚假资源转移的方法,包括:In the first aspect, a method for determining the transfer of false resources is proposed, including:
获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
第二方面,提出了一种判定虚假交易的方法,包括:In the second aspect, a method for determining a false transaction is proposed, including:
获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining historical transaction data of the transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;Determining whether the transaction to be verified is a fraudulent transaction based on the historical resource transfer data, the behavior data, and a fraudulent transaction model;
其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
第三方面,提出了一种判定虚假资源转移的装置,包括:In a third aspect, an apparatus for determining a false resource transfer is provided, including:
获取单元,获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;An acquiring unit, acquiring historical resource transfer data of the resource transfer party within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transfer party within a second predetermined time period before the resource to be verified is transferred ;
判定单元,基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;The determining unit determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
第四方面,提出了一种判定虚假交易的装置,包括:In a fourth aspect, an apparatus for determining a fraudulent transaction is provided, comprising:
获取单元,获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining a unit, acquiring historical transaction data of a transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
判定单元,基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;a determining unit, determining, according to the historical resource transfer data, the behavior data, and a fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction;
其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
第五方面,提出了一种电子设备,该电子设备包括:In a fifth aspect, an electronic device is provided, the electronic device comprising:
处理器;以及Processor;
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:A memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:A memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所 述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
第六方面,提出了一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电子设备执行以下操作:In a sixth aspect, a computer readable storage medium is provided, the computer readable storage medium storing one or more programs, when the one or more programs are executed by an electronic device including a plurality of applications, The electronic device performs the following operations:
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:A memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
第七方面,提出了一种电子设备,该电子设备包括:In a seventh aspect, an electronic device is provided, the electronic device comprising:
处理器;以及Processor;
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:A memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
第八方面,提出了一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电 子设备执行以下操作:In an eighth aspect, a computer readable storage medium is presented, the computer readable storage medium storing one or more programs that, when executed by an electronic device comprising a plurality of applications, cause The electronic device performs the following operations:
获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
本申请实施例采用上述技术方案至少可以达到下述技术效果:The foregoing technical solutions adopt the above technical solutions to achieve at least the following technical effects:
通过获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和资源转入方在待验证资源转移前第二预定时间段内的行为数据,基于获取的历史资源转移数据、行为数据和虚假资源转移模型,判定待验证资源转移是否为虚假资源转移,不仅考虑了资源转入方的历史资源转移数据,还将其在资源转移前的行为数据作为判别识别虚假资源转移的依据,提高了判别虚假资源转移的准确性,达到优化识别虚假资源转移的目的。Obtaining the historical resource transfer data in the first predetermined time period before the resource transfer party is transferred, and the behavior data in the second predetermined time period before the resource transfer party transfers the resource to be verified, based on the acquired historical resource Transfer data, behavioral data and false resource transfer model, determine whether the resource transfer to be verified is a false resource transfer, not only consider the historical resource transfer data of the resource transferee, but also use the behavior data before the resource transfer as the discriminant to identify the false resource. The basis of the transfer improves the accuracy of discriminating the transfer of false resources and achieves the purpose of optimizing the identification of the transfer of false resources.
通过获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和交易支付方在待验证交易前第二预定时间段内的行为数据,基于获取的历史交易数据、行为数据和虚假交易模型,判定待验证交易是否为虚假交易,不仅考虑了交易支付方也就是买家的历史交易数据,还将其在交易前的行为数据作为判别识别虚假交易的依据,提高了判别虚假交易的准确性,达到优化识别虚假交易的目的。Obtaining historical transaction data within a first predetermined time period before the transaction to be verified by the transaction payer and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified, based on the acquired historical transaction data, behavior data, and The false transaction model determines whether the transaction to be verified is a false transaction. It not only considers the historical transaction data of the transaction payer, that is, the buyer, but also uses the behavior data before the transaction as the basis for discriminating the false transaction, and improves the discrimination of the false transaction. The accuracy of the goal is to optimize the identification of false transactions.
附图说明DRAWINGS
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the present application, and are intended to be a part of this application. In the drawing:
图1为本说明书一个实施例提供的一种判定虚假资源转移的方法的实现流程示意图;FIG. 1 is a schematic flowchart of an implementation method for determining a false resource transfer according to an embodiment of the present disclosure;
图2为本说明书一个实施例提供的一种判定虚假交易的方法的实现流程示意图;2 is a schematic diagram of an implementation process of a method for determining a fake transaction according to an embodiment of the present disclosure;
图3为本说明书一个实施例提供的一种判定虚假交易的方法的数据处理过程示意图;FIG. 3 is a schematic diagram of a data processing process of a method for determining a fake transaction according to an embodiment of the present disclosure; FIG.
图4为本说明书一个实施例提供的一种判定虚假交易的方法中对行为数据进行向量 化预处理的过程示意图;4 is a schematic diagram of a process of performing vectorization preprocessing of behavior data in a method for determining a false transaction according to an embodiment of the present disclosure;
图5为本说明书一个实施例提供的一种电子设备的结构示意图;FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
图6为本说明书一个实施例提供的另一种电子设备的结构示意图;FIG. 6 is a schematic structural diagram of another electronic device according to an embodiment of the present disclosure;
图7为本说明书一个实施例提供的一种判定虚假资源转移的装置的结构示意图;FIG. 7 is a schematic structural diagram of an apparatus for determining a false resource transfer according to an embodiment of the present disclosure;
图8为本说明书一个实施例提供的一种判定虚假交易的装置的结构示意图。FIG. 8 is a schematic structural diagram of an apparatus for determining a fake transaction according to an embodiment of the present disclosure.
具体实施方式Detailed ways
为使本申请的目的、技术方案和优点更加清楚,下面将结合本申请具体实施例及相应的附图对本申请技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions of the present application will be clearly and completely described in the following with reference to the specific embodiments of the present application and the corresponding drawings. It is apparent that the described embodiments are only a part of the embodiments of the present application, and not all of them. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.
以下结合附图,详细说明本申请各实施例提供的技术方案。The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
为解决现有技术中判定虚假交易的方法不够优化的问题,本说明书实施例提供一种判定虚假资源转移的方法。本说明书实施例提供的判定虚假资源转移的方法的执行主体可以但不限于服务器、个人电脑等能够被配置为执行本发明实施例提供的该方法终端中的至少一种。In order to solve the problem that the method for determining a false transaction in the prior art is not optimized, the embodiment of the present specification provides a method for determining a false resource transfer. The execution subject of the method for determining the false resource transfer provided by the embodiment of the present disclosure may be, but is not limited to, a server, a personal computer, or the like, which can be configured to perform at least one of the method terminals provided by the embodiments of the present invention.
为便于描述,下文以该方法的执行主体为能够执行该方法的服务器为例,对该方法的实施方式进行介绍。可以理解,该方法的执行主体为服务器只是一种示例性的说明,并不应理解为对该方法的限定。For convenience of description, an embodiment of the method will be described below by taking an example of the execution of the method as a server capable of executing the method. It can be understood that the execution subject of the method is only an exemplary description of the server, and should not be construed as limiting the method.
具体地,本说明书一个或多个实施例提供的一种判定虚假资源转移的方法的实现流程示意图如图1所示,包括:Specifically, a schematic flowchart for implementing a method for determining a false resource transfer provided by one or more embodiments of the present disclosure is as shown in FIG. 1 , and includes:
步骤110,获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和资源转入方在待验证资源转移前第二预定时间段内的行为数据;Step 110: Obtain historical resource transfer data of the resource transfer party within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transfer party within a second predetermined time period before the resource to be verified is transferred;
其中,历史资源转移数据至少包括下述一种:历史资源转移次数,历史资源转移额度,历史资源转移涉及的资源接收方的数量。在实际应用中,该资源转移比如可以是交易,则历史资源转移数据具体可以包括:历史交易次数,历史交易额度,历史交易涉及的交易接收方也就是卖家或者是商户的数量,单笔交易最大值,单笔交易最小值,单笔交易平均值,日交易最大值,日交易最小值、日交易平均值等等,都可以作为交易支付 方也就是买家在此次交易之前的历史交易数据。The historical resource transfer data includes at least one of the following: the number of historical resource transfers, the historical resource transfer quota, and the number of resource recipients involved in the historical resource transfer. In practical applications, the resource transfer may be, for example, a transaction, and the historical resource transfer data may specifically include: a historical transaction number, a historical transaction amount, a transaction transaction involved in the historical transaction, that is, a seller or a merchant, and the single transaction is the largest. Value, single transaction minimum, single transaction average, daily trading maximum, daily trading minimum, daily trading average, etc., can be used as the transaction payer, that is, the historical transaction data of the buyer before the transaction. .
其中,行为数据至少包括下述一种:资源转入方浏览的资源接收方的信息、浏览时长、浏览的资源信息,资源接收方的信息至少包括资源接收方的信用值、资源类别、资源价值分布、健康程度。在实际应用中,该行为数据具体可以包括:买家在完成此次交易之前所浏览过的卖家或者商户的信息,以及在各个卖家或者商户浏览时停留的时长,在各个商户中浏览过的商品信息(比如商品的名称、价格等信息),其中卖家或者商户的信息包括卖家或者商户的信用值、商户中的商品类别、商品的价格分布、以及商户近期(比如近一个月内)被投诉的次数,等等。The behavior data includes at least one of the following: the information of the resource receiver browsed by the resource transferee, the browsing duration, and the browsed resource information, and the information of the resource receiver includes at least the credit value, the resource category, and the resource value of the resource receiver. Distribution, health. In practical applications, the behavior data may specifically include: information of the seller or the merchant that the buyer browsed before completing the transaction, and the length of time that each seller or merchant stays while browsing, and the products browsed in each merchant. Information (such as the name of the product, price, etc.), where the seller or merchant's information includes the credit value of the seller or merchant, the category of the commodity in the merchant, the price distribution of the commodity, and the recent complaints of the merchant (such as within a month) The number of times, and so on.
此外,第一预定时间段可以是资源转入方在此次资源转移之前的某一时间段,比如在此次资源转移之前的三个月、一个月或者一个星期内的一段时间,第二预定时间段可以是资源转入方在此次资源转移之前的几天或者一天或者几个小时的一段时间,该第一预定时间段和第二预定时间段可以根据实际需求来设定,本说明书一个或多个实施例对此不作具体限定。In addition, the first predetermined time period may be a certain period of time before the resource transfer party, such as a period of three months, one month or one week before the resource transfer, the second reservation The time period may be a few days or a day or a few hours before the resource transfer party, and the first predetermined time period and the second predetermined time period may be set according to actual needs. The embodiment or embodiments do not specifically limit this.
应理解,在实际应用中,非虚假资源转移中,大部分买家准备在电商平台购买某一类商品时,往往会浏览与该类商品相关的卖家或者商户,其在浏览这些商品并决定是否要购买时,往往会查看该类商品的价格、对该商品的介绍、其他买家对该商品的评价、以及销售该类商品的卖家或商户的信用值,等等信息。而虚假资源转移中,资源转入方往往是为了一些不当利益为资源接收方也就是一些卖家或者商户刷单并给好评,来提高这些卖家或者商户的信用值,其在完成某一虚假资源转移时,往往不会提前浏览与该类商品相关的卖家或者商户,或者为了隐藏虚假交易的目的,而故意浏览一些与该商品相关的卖家或商户。It should be understood that in practical applications, in the non-fake resource transfer, most buyers are prepared to browse a certain type of goods on the e-commerce platform, often browsing the sellers or merchants related to the goods, and browsing these products and determining When you want to buy, you will often check the price of the item, the introduction of the item, the evaluation of the item by other buyers, and the credit value of the seller or merchant who sells the item, and so on. In the case of false resource transfer, the resource transfer party often raises the credit value of the seller or the merchant for the improper reception of the resource recipients, that is, some sellers or merchants, to complete the transfer of a certain false resource. At the same time, it is often not possible to browse the sellers or merchants associated with the goods in advance, or deliberately browse some sellers or merchants related to the goods for the purpose of hiding the false transactions.
尽管虚假资源转移也有这些类似的行为数据,但究其动机与非虚假资源转移在本质上并不相同,这便可以体现在资源转入方在资源转移之前的一系列行为数据中,比如虚假资源转移和非虚假资源转移中的资源转入方在浏览各个卖家或商户中的商品时的浏览时长、查看的卖家或商品的信息内容上就会有较大的差异。本说明书一个或多个实施例基于这一点,不仅考虑了资源转入方在待验证资源转移前的第一预定时间段内的历史资源转移数据,还深究了资源转入方在待验证资源转移前第二预定时间段内的行为数据,从而提高了识别虚假资源转移的准确性,进一步维护了其他资源转入方也就是买家的权益。Although there are similar behavioral data in the transfer of false resources, the motivation and non-fake resource transfer are not the same in essence. This can be reflected in a series of behavior data before the resource transfer party, such as false resources. There is a big difference in the browsing time of the resource transferee in the transfer and non-fake resource transfer when browsing the products in each seller or merchant, and the information content of the viewed seller or the product. Based on this point, one or more embodiments of the present specification not only consider the historical resource transfer data of the resource transfer party within the first predetermined time period before the resource transfer to be verified, but also the resource transfer party in the resource transfer to be verified. The behavior data in the first two predetermined time periods, thereby improving the accuracy of identifying the transfer of false resources, and further safeguarding the rights of other resource transfer parties, that is, buyers.
步骤120,基于历史资源转移数据、行为数据和虚假资源转移模型,判定待验证资源转移是否为虚假资源转移;其中,虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。Step 120: Determine, according to the historical resource transfer data, the behavior data, and the false resource transfer model, whether the resource transfer to be verified is a false resource transfer; wherein the false resource transfer model is trained based on the historical resource transfer training data and the corresponding behavior training data.
具体来说,基于历史资源转移数据、行为数据和虚假资源转移模型,判定待验证资源转移是否为虚假资源转移,则可以首先根据历史资源转移数据,确定历史资源转移特征数据,并根据行为数据,确定行为特征数据,最后,便可以根据历史资源转移特征数据、行为特征数据和虚假资源转移模型,判定待验证资源转移是否为虚假资源转移。Specifically, based on the historical resource transfer data, the behavior data, and the false resource transfer model, determining whether the resource transfer to be verified is a false resource transfer, the historical resource transfer characteristic data may be first determined according to the historical resource transfer data, and according to the behavior data, The behavior characteristic data is determined. Finally, the historical resource transfer characteristic data, the behavior characteristic data, and the false resource transfer model can be used to determine whether the resource transfer to be verified is a false resource transfer.
如图2所示,为本说明书一个或多个实施例所提供的基于历史资源转移数据、行为数据和虚假资源转移模型,判定待验证资源转移是否为虚假资源转移过程示意图。其中,历史资源转移数据包括图2所示的买家信息等数据,该买家信息可以包括买家在此次资源转移之前的第一预定时间段内的资源转移次数、资源转移额度等信息,由于该历史资源转移数据是资源转入方也就是买家在此次资源转移之前的历史资源转移数据,不会再随该资源转入方的行为的变化而变化,因此可以也可以将该历史资源转移数据称为静态数据;行为数据包括图2所示的商户信息、买卖家交易历史和浏览日志等数据,由于该行为数据会随买家行为的变化而变化,因此也可以将该行为数据称为动态数据。As shown in FIG. 2 , the historical resource transfer data, the behavior data, and the false resource transfer model provided by one or more embodiments of the present specification determine whether the resource transfer to be verified is a schematic diagram of a false resource transfer process. The historical resource transfer data includes the buyer information and the like data shown in FIG. 2, and the buyer information may include information such as the number of resource transfers and the resource transfer quota of the buyer within the first predetermined time period before the resource transfer. Since the historical resource transfer data is the resource transfer party, that is, the historical resource transfer data of the buyer before the resource transfer, it will not change with the change of the behavior of the resource transfer party, so the history may also be used. The resource transfer data is called static data; the behavior data includes the business information shown in Figure 2, the trader's transaction history, and the browsing log. Since the behavior data changes with the buyer's behavior, the behavior data can also be used. Called dynamic data.
在获取了上述静态数据和动态数据之后,便可以根据该静态数据确定历史资源转移特征数据,根据该动态数据,确定行为特征数据。由于动态数据中可能会包括不能直接用向量表征的数据比如商户地址等数据,因此在根据动态数据,确定行为特征数据时,还需要将动态数据中不能直接用向量表征的数据进行序列数据编码,也就是下文所述的向量化预处理。在分别确定了静态数据和动态数据的特征数据之后,便可以基于这两个特征数据和虚假资源转移模型,将这两个特征数据进行拼接,通过二分类器算法,确定此次的资源转移是否为虚假资源转移。After the static data and the dynamic data are acquired, the historical resource transfer feature data may be determined according to the static data, and the behavior feature data is determined according to the dynamic data. Since the dynamic data may include data that cannot be directly represented by a vector, such as a business address, when determining the behavior characteristic data according to the dynamic data, it is also necessary to encode the data in the dynamic data that cannot be directly represented by the vector. This is the vectorization preprocessing described below. After the feature data of the static data and the dynamic data are respectively determined, the two feature data can be spliced based on the two feature data and the fake resource transfer model, and the second classifier algorithm is used to determine whether the resource transfer is performed. Transfer for false resources.
应理解,由于上述行为数据中可能会包括资源接收方也就是卖家或者商户的ID等不能用向量直接表征的数据,为了便于对行为数据的处理,因此,根据行为数据,确定行为特征数据,则可以首先对行为数据中不能用向量直接表征的数据进行向量化预处理,以将行为数据中的非向量数据转换为向量数据;而由于行为数据中包括多个特征维度的数据,为了统一这些特征维度的数据的量纲,因此还要将经过向量化预处理后的行为数据进行归一化处理,以得到行为特征数据。其中,对行为数据进行向量化预处理的方式可以采用将字符串转换成向量形式的工具比如word2vector算法、embedding算法 等。It should be understood that, since the above behavior data may include data that the resource receiver, that is, the ID of the seller or the merchant, cannot directly represent by the vector, in order to facilitate the processing of the behavior data, according to the behavior data, the behavior characteristic data is determined. Vectorization preprocessing of data in the behavior data that cannot be directly characterized by vectors can be performed first to convert non-vector data in the behavior data into vector data; and since the behavior data includes data of multiple feature dimensions, in order to unify these features Dimensional data is dimensioned, so the vectorized preprocessed behavior data is also normalized to obtain behavioral feature data. Among them, the method of vectorizing the behavior data may adopt a tool for converting a string into a vector form such as a word2vector algorithm, an embedding algorithm, and the like.
如图3所示,为本说明书一个或多个实施例提供的对行为数据进行处理的过程示意图,在图3中,可以将行为数据中不能直接用向量表征的数据通过向量化预处理转换为向量形式,如图3中的“点击浏览ID”数据即资源转入方在资源转移前浏览过的某一个商户的ID,由于该数据为“00N5789Y218”即字符串形式,不能直接用向量来表征,为了便于对该行为数据的处理,可以通过word2vector算法将该字符串转换为向量的形式,再将获取的“本次浏览商户信息”和“浏览详情信息”通过向量的形式表征,并将这些表征为向量形式的行为数据拼接为一个多维向量,再通过归一化处理统一量纲。As shown in FIG. 3, a schematic diagram of a process for processing behavior data provided by one or more embodiments of the present specification, in FIG. 3, data that cannot be directly represented by a vector in behavior data can be converted into a vectorized preprocessing to The vector form, as shown in the "Click to Browse ID" data in Figure 3, is the ID of a merchant that the resource transferee viewed before the resource transfer. Since the data is "00N5789Y218", that is, a string form, it cannot be directly represented by a vector. In order to facilitate the processing of the behavior data, the string can be converted into a vector form by the word2vector algorithm, and the obtained "browsing merchant information" and "browsing details" are represented by vectors, and these are The behavior data characterized as a vector form is spliced into a multi-dimensional vector, and the unified dimension is processed by normalization.
在基于历史资源转移数据、行为数据和虚假资源转移模型,判定待验证资源转移是否为虚假资源转移之前,可以通过有监督的二分类训练方式和无监督的二分类训练方式两种方式来训练得到虚假资源转移模型:Before deciding whether the resource transfer to be verified is a false resource transfer based on historical resource transfer data, behavior data and false resource transfer model, it can be trained through two modes: supervised two-class training mode and unsupervised two-class training mode. False resource transfer model:
(1)有监督的二分类训练方式(1) Supervised two-class training method
首先,对历史资源转移训练数据进行归一化处理得到对应的历史资源转移特征数据;再对行为训练数据中不能用向量直接表征的数据进行向量化预处理;然后,将经过向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;最后,将历史资源转移特征数据、行为特征数据及对应的资源转移类型作为输入,训练得到虚假资源转移模型,其中,资源转移类型包括非虚假资源转移和非虚假资源转移。Firstly, the historical resource transfer training data is normalized to obtain the corresponding historical resource transfer feature data; then the data in the behavior training data that cannot be directly represented by the vector is vectorized and preprocessed; then, after vectorization preprocessing The behavioral training data is normalized to obtain the corresponding behavioral feature data. Finally, the historical resource transfer characteristic data, the behavioral feature data and the corresponding resource transfer type are input as inputs, and the false resource transfer model is trained, wherein the resource transfer type Includes non-fake resource transfers and non-fake resource transfers.
在这种方式中,由于资源转移类型包括非虚假资源转移和非虚假资源转移,因此,历史资源转移训练数据和对应的行为训练数据包括:多个非虚假资源转移的资源转入方的历史资源转移数据和对应的行为数据、以及多个虚假资源转移的资源转入方的历史资源转移数据和对应的行为数据;则虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到的过程,则可以包括:In this manner, since the resource transfer type includes non-false resource transfer and non-false resource transfer, the historical resource transfer training data and the corresponding behavior training data include: a plurality of non-false resource transfer resource transfer party historical resources The transfer data and the corresponding behavior data, and the historical resource transfer data and the corresponding behavior data of the resource transfer party of the multiple false resource transfer; the false resource transfer model is trained based on the historical resource transfer training data and the corresponding behavior training data. The process can include:
步骤i,可以对多个非虚假资源转移的资源转入方的历史资源转移数据进行归一化处理得到对应的多个非虚假资源转移的历史资源转移特征数据,对多个虚假资源转移的资源转入方的历史资源转移数据进行归一化处理得到对应的多个虚假资源转移的历史资源转移特征数据,其中,多个非虚假资源转移的资源转入方的历史资源转移数据为资源转入方在相应的非虚假资源转移前的第一预定时间段内的历史资源转移数据,多个虚假资源转移的资源转入方的历史资源转移数据为资源转入方在相应的虚假资源转移前的第一预定时间段内的历史资源转移数据;In step i, the historical resource transfer data of the resource transfer party of the non-fake resource transfer may be normalized to obtain the corresponding historical resource transfer feature data of the non-fake resource transfer, and the resources transferred to the multiple false resources The historical resource transfer data of the transferee is normalized to obtain the corresponding historical resource transfer feature data of the multiple false resource transfer, wherein the historical resource transfer data of the resource transfer party of the multiple non-false resource transfer is the resource transfer The historical resource transfer data of the first predetermined time period before the corresponding non-fake resource transfer, and the historical resource transfer data of the resource transfer party of the multiple false resource transfer are the resource transfer party before the corresponding false resource transfer Historical resource transfer data within a first predetermined time period;
步骤ii,对多个非虚假资源转移中对应的行为数据中不能用向量直接表征的数据进行向量化预处理;对多个虚假资源转移中对应的行为数据中不能用向量直接表征的数据进行向量化预处理,其中,多个非虚假资源转移中对应的行为数据为资源转入方在相应的非虚假资源转移前的第二预定时间段内的行为数据,多个虚假资源转移中对应的行为数据为资源转入方在相应的虚假资源转移前的第二预定时间段内的行为数据;Step ii: performing vectorization preprocessing on data that cannot be directly represented by the vector in the corresponding behavior data in the multiple non-fake resource transitions; performing vector on the data that cannot be directly represented by the vector in the corresponding behavior data in the multiple false resource transitions The pre-processing, wherein the corresponding behavior data in the multiple non-fake resource transfers is the behavior data of the resource transfer party in the second predetermined time period before the corresponding non-fake resource transfer, and the corresponding behavior in the multiple false resource transfers The data is behavior data of the resource transfer party within a second predetermined time period before the corresponding false resource transfer;
步骤iii,将经过向量化预处理后的所述多个非虚假资源转移中对应的行为数据进行归一化处理,以得到多个非虚假资源转移中对应的行为特征数据;将经过向量化预处理后的多个虚假资源转移中对应的行为数据进行归一化处理,以得到多个虚假资源转移中对应的行为特征数据;Step iii: normalize the corresponding behavior data in the plurality of non-fake resource transitions after the vectorization pre-processing to obtain corresponding behavior characteristic data in the plurality of non-false resource transitions; The corresponding behavior data in the multiple false resource transitions after processing is normalized to obtain corresponding behavior characteristic data in multiple false resource transitions;
步骤iv,基于多个非虚假资源转移的历史资源转移特征数据和对应的行为特征数据,以及多个虚假资源转移的历史资源转移特征数据和对应的行为特征数据,训练得到虚假资源转移模型。在实际应用中,虚假资源转移模块可以基于多个非虚假资源转移的历史资源转移特征数据和对应的行为特征数据,以及多个虚假资源转移的历史资源转移特征数据和对应的行为特征数据通过二分类器训练得到,具体训练方式可参考现有技术中相关模型训练方法,不再赘述。Step iv: training a false resource transfer model based on historical resource transfer feature data and corresponding behavior feature data of multiple non-fake resource transfers, and historical resource transfer feature data and corresponding behavior feature data of multiple false resource transfers. In practical applications, the fake resource transfer module may be based on historical resource transfer feature data and corresponding behavior feature data of multiple non-false resource transfers, and historical resource transfer feature data and corresponding behavior feature data of multiple false resource transfers. The classifier is trained, and the specific training method can refer to the related model training method in the prior art, and will not be described again.
(2)无监督的二分类训练方式(2) Unsupervised two-class training method
首先对历史资源转移训练数据进行归一化处理得到对应的历史资源转移特征数据;然后,对行为训练数据中不能用向量直接表征的数据进行向量化预处理,并将经过向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;最后将历史资源转移特征数据、行为特征数据作为输入,按二分类进行聚类训练得到所述虚假资源转移模型,具体训练方式可参考现有技术中相关模型训练方法,不再赘述。Firstly, the historical resource transfer training data is normalized to obtain the corresponding historical resource transfer feature data. Then, the data that can not be directly represented by the vector in the behavior training data is vectorized and preprocessed, and the vectorized preprocessed The behavioral training data is normalized and the corresponding behavioral feature data is obtained. Finally, the historical resource transfer characteristic data and behavioral feature data are taken as input, and the false resource transfer model is obtained by clustering training according to the two classifications. The specific training method can be referred to. The related model training methods in the prior art are not described again.
通过获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和资源转入方在待验证资源转移前第二预定时间段内的行为数据,基于获取的历史资源转移数据、行为数据和虚假资源转移模型,判定待验证资源转移是否为虚假资源转移,不仅考虑了资源转入方的历史资源转移数据,还将其在资源转移前的行为数据作为判别识别虚假资源转移的依据,提高了判别虚假资源转移的准确性,达到优化识别虚假资源转移的目的。Obtaining the historical resource transfer data in the first predetermined time period before the resource transfer party is transferred, and the behavior data in the second predetermined time period before the resource transfer party transfers the resource to be verified, based on the acquired historical resource Transfer data, behavioral data and false resource transfer model, determine whether the resource transfer to be verified is a false resource transfer, not only consider the historical resource transfer data of the resource transferee, but also use the behavior data before the resource transfer as the discriminant to identify the false resource. The basis of the transfer improves the accuracy of discriminating the transfer of false resources and achieves the purpose of optimizing the identification of the transfer of false resources.
图4是本说明书的一个实施例提供的判定虚假交易的方法的实施流程示意图,包括:4 is a schematic flowchart of an implementation of a method for determining a fraudulent transaction provided by an embodiment of the present specification, including:
步骤210,获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和 交易支付方在待验证交易前第二预定时间段内的行为数据;Step 210: Obtain historical transaction data of the transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
其中,历史交易数据至少包括下述一种:历史交易次数,历史交易额度,历史交易涉及的交易接收方的数量;行为数据至少包括下述一种:交易支付方浏览的交易接收方的信息、浏览时长、浏览的商品信息,交易接收方的信息至少包括交易接收方的信用值、商品类别、商品价格分布、健康程度。The historical transaction data includes at least one of the following: a historical transaction number, a historical transaction amount, and a number of transaction recipients involved in the historical transaction; and the behavior data includes at least one of the following: the transaction recipient's information of the transaction recipient browsing, The browsing time, the viewed product information, and the transaction recipient's information include at least the transaction recipient's credit value, product category, commodity price distribution, and health level.
步骤220,基于历史资源转移数据、行为数据和虚假交易模型,判定待验证交易是否为虚假交易;虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。Step 220: Determine whether the transaction to be verified is a false transaction based on historical resource transfer data, behavior data, and a false transaction model; the fake transaction model is trained based on historical transaction training data and corresponding behavior training data.
具体来说,基于历史交易数据、行为数据和虚假交易模型,判定待验证交易是否为虚假交易,则可以首先根据历史交易数据,确定历史交易特征数据;然后,根据行为数据,确定行为特征数据;最后,基于历史交易特征数据、行为特征数据和虚假交易模型,判定待验证交易是否为虚假交易。Specifically, based on the historical transaction data, the behavior data, and the false transaction model, determining whether the transaction to be verified is a fraudulent transaction, the historical transaction characteristic data may be first determined according to the historical transaction data; and then, the behavior characteristic data is determined according to the behavior data; Finally, based on historical transaction characteristic data, behavioral feature data and false transaction model, it is determined whether the transaction to be verified is a false transaction.
可选的,根据行为数据,确定行为特征数据,具体则可以首先,对行为数据中不能用向量直接表征的数据进行向量化预处理;然后,将经过向量化预处理后的行为数据进行归一化处理,以得到行为特征数据。Optionally, according to the behavior data, the behavior characteristic data is determined. Specifically, the data that cannot be directly represented by the vector in the behavior data may be subjected to vectorization preprocessing; then, the behavioral data after the vectorization preprocessing is normalized. Process to get behavioral feature data.
在基于历史交易数据、行为数据和虚假交易模型,判定待验证交易是否为虚假交易之前,可以通过有监督的二分类训练方式和无监督的二分类训练方式两种方式来训练得到虚假交易模型:Before determining whether the transaction to be verified is a false transaction based on historical transaction data, behavior data and false transaction model, the false transaction model can be trained through two modes: supervised two-class training mode and unsupervised two-class training mode:
(1)有监督的二分类训练方式(1) Supervised two-class training method
首先,对历史交易训练数据进行归一化处理得到对应的历史交易特征数据;再对行为训练数据中不能用向量直接表征的数据进行向量化预处理;然后,将经过向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;最后,将历史交易特征数据、行为特征数据及对应的交易类型作为输入,训练得到虚假交易模型,其中,交易类型包括非虚假交易和非虚假交易。Firstly, the historical transaction training data is normalized to obtain the corresponding historical transaction characteristic data; then the data in the behavior training data that cannot be directly represented by the vector is vectorized and preprocessed; then, the vectorized preprocessed behavior is performed. The training data is normalized to obtain corresponding behavioral feature data. Finally, historical transaction characteristic data, behavioral feature data and corresponding transaction types are input as inputs, and a false transaction model is trained, wherein the transaction types include non-false transactions and non-transactions. a.
(2)无监督的二分类训练方式(2) Unsupervised two-class training method
首先对历史交易训练数据进行归一化处理得到对应的历史交易特征数据;然后,对行为训练数据中不能用向量直接表征的数据进行向量化预处理,并将经过向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;最后将历史交易特征数据、行为特征数据作为输入,按二分类进行聚类训练得到所述虚假交易模型。Firstly, the historical transaction training data is normalized to obtain the corresponding historical transaction feature data. Then, the data in the behavior training data that cannot be directly represented by the vector is vectorized and preprocessed, and the vectorized preconditioned behavior training is performed. The data is normalized to obtain corresponding behavioral feature data; finally, historical transaction characteristic data and behavioral feature data are taken as inputs, and clustering training is performed according to the two classifications to obtain the false transaction model.
图4所示实施例相关步骤的具体实现可参考图1~图3所示实施例中对应的步骤的具体实现,本说明书一个或多个实施例在此不再赘述。For a specific implementation of the steps related to the embodiment shown in FIG. 4, reference may be made to the specific implementation of the corresponding steps in the embodiment shown in FIG. 1 to FIG. 3. One or more embodiments of the present specification are not described herein again.
通过获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和交易支付方在待验证交易前第二预定时间段内的行为数据,基于获取的历史交易数据、行为数据和虚假交易模型,判定待验证交易是否为虚假交易,不仅考虑了交易支付方也就是买家的历史交易数据,还将其在交易前的行为数据作为判别识别虚假交易的依据,提高了判别虚假交易的准确性,达到优化识别虚假交易的目的。Obtaining historical transaction data within a first predetermined time period before the transaction to be verified by the transaction payer and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified, based on the acquired historical transaction data, behavior data, and The false transaction model determines whether the transaction to be verified is a false transaction. It not only considers the historical transaction data of the transaction payer, that is, the buyer, but also uses the behavior data before the transaction as the basis for discriminating the false transaction, and improves the discrimination of the false transaction. The accuracy of the goal is to optimize the identification of false transactions.
图5是本说明书的一个实施例提供的电子设备的结构示意图。请参考图5,在硬件层面,该电子设备包括处理器,可选地还包括内部总线、网络接口、存储器。其中,存储器可能包含内存,例如高速随机存取存储器(Random-Access Memory,RAM),也可能还包括非易失性存储器(non-volatile memory),例如至少1个磁盘存储器等。当然,该电子设备还可能包括其他业务所需要的硬件。FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Referring to FIG. 5, at the hardware level, the electronic device includes a processor, optionally including an internal bus, a network interface, and a memory. The memory may include a memory, such as a high-speed random access memory (RAM), and may also include a non-volatile memory, such as at least one disk memory. Of course, the electronic device may also include hardware required for other services.
处理器、网络接口和存储器可以通过内部总线相互连接,该内部总线可以是ISA(Industry Standard Architecture,工业标准体系结构)总线、PCI(Peripheral Component Interconnect,外设部件互连标准)总线或EISA(Extended Industry Standard Architecture,扩展工业标准结构)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图5中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。The processor, the network interface, and the memory may be interconnected by an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, or an EISA (Extended) Industry Standard Architecture, extending the industry standard structure) bus. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one double-headed arrow is shown in Figure 5, but it does not mean that there is only one bus or one type of bus.
存储器,用于存放程序。具体地,程序可以包括程序代码,所述程序代码包括计算机操作指令。存储器可以包括内存和非易失性存储器,并向处理器提供指令和数据。Memory for storing programs. In particular, the program can include program code, the program code including computer operating instructions. The memory can include both memory and non-volatile memory and provides instructions and data to the processor.
处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成判定虚假资源转移的装置。处理器,执行存储器所存放的程序,并具体用于执行以下操作:The processor reads the corresponding computer program from the non-volatile memory into memory and then runs, forming a device at the logical level to determine the transfer of the fake resource. The processor executes the program stored in the memory and is specifically used to perform the following operations:
获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
上述如本说明书图1所示实施例揭示的判定虚假资源转移的方法可以应用于处理器中,或者由处理器实现。处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本说明书一个或多个实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本说明书一个或多个实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。The method for determining a false resource transfer disclosed in the embodiment shown in FIG. 1 of the present specification may be applied to a processor or implemented by a processor. The processor may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software. The above processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP), etc.; or may be a digital signal processor (DSP), dedicated integration. Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component. The methods, steps, and logic blocks disclosed in one or more embodiments of the specification can be implemented or executed. The general purpose processor may be a microprocessor or the processor or any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present specification can be directly embodied as a hardware decoding processor or a combination of hardware and software modules in a decoding processor. The software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like. The storage medium is located in the memory, and the processor reads the information in the memory and combines the hardware to complete the steps of the above method.
该电子设备还可执行图1的判定虚假资源转移的方法,本说明书在此不再赘述。The electronic device can also perform the method for determining the false resource transfer in FIG. 1 , and the description is not repeated herein.
当然,除了软件实现方式之外,本说明书的电子设备并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。Of course, in addition to the software implementation, the electronic device of the present specification does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit. It can also be hardware or logic.
图6是本说明书的一个实施例电子设备的结构示意图。请参考图6,在硬件层面,该电子设备包括处理器,可选地还包括内部总线、网络接口、存储器。其中,存储器可能包含内存,例如高速随机存取存储器(Random-Access Memory,RAM),也可能还包括非易失性存储器(non-volatile memory),例如至少1个磁盘存储器等。当然,该电子设备还可能包括其他业务所需要的硬件。FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Referring to FIG. 6, at the hardware level, the electronic device includes a processor, optionally including an internal bus, a network interface, and a memory. The memory may include a memory, such as a high-speed random access memory (RAM), and may also include a non-volatile memory, such as at least one disk memory. Of course, the electronic device may also include hardware required for other services.
处理器、网络接口和存储器可以通过内部总线相互连接,该内部总线可以是ISA(Industry Standard Architecture,工业标准体系结构)总线、PCI(Peripheral Component Interconnect,外设部件互连标准)总线或EISA(Extended Industry Standard Architecture,扩展工业标准结构)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图6中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。The processor, the network interface, and the memory may be interconnected by an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, or an EISA (Extended) Industry Standard Architecture, extending the industry standard structure) bus. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one double-headed arrow is shown in Figure 6, but it does not mean that there is only one bus or one type of bus.
存储器,用于存放程序。具体地,程序可以包括程序代码,所述程序代码包括 计算机操作指令。存储器可以包括内存和非易失性存储器,并向处理器提供指令和数据。Memory for storing programs. In particular, the program can include program code, the program code including computer operating instructions. The memory can include both memory and non-volatile memory and provides instructions and data to the processor.
处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成判定虚假交易的装置。处理器,执行存储器所存放的程序,并具体用于执行以下操作:The processor reads the corresponding computer program from the non-volatile memory into memory and then runs, forming a device at the logical level to determine the fraudulent transaction. The processor executes the program stored in the memory and is specifically used to perform the following operations:
获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining historical transaction data of the transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;Determining whether the transaction to be verified is a fraudulent transaction based on the historical resource transfer data, the behavior data, and a fraudulent transaction model;
其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
上述如本说明书图4所示实施例揭示的判定虚假交易的方法可以应用于处理器中,或者由处理器实现。处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本说明书一个或多个实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本说明书一个或多个实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。The method for determining a fraudulent transaction as disclosed in the embodiment shown in FIG. 4 of the present specification may be applied to a processor or implemented by a processor. The processor may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software. The above processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP), etc.; or may be a digital signal processor (DSP), dedicated integration. Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component. The methods, steps, and logic blocks disclosed in one or more embodiments of the specification can be implemented or executed. The general purpose processor may be a microprocessor or the processor or any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present specification can be directly embodied as a hardware decoding processor or a combination of hardware and software modules in a decoding processor. The software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like. The storage medium is located in the memory, and the processor reads the information in the memory and combines the hardware to complete the steps of the above method.
该电子设备还可执行图4的判定虚假交易的方法,本说明书在此不再赘述。The electronic device can also perform the method for determining a fraudulent transaction of FIG. 4, and the description is not repeated herein.
当然,除了软件实现方式之外,本说明书的电子设备并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。Of course, in addition to the software implementation, the electronic device of the present specification does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit. It can also be hardware or logic.
图7是本说明书提供的判定虚假资源转移的装置700的结构示意图。请参考图7,在一种软件实施方式中,判定虚假资源转移的装置700可包括获取单元701、判定单元702,其中:FIG. 7 is a schematic structural diagram of an apparatus 700 for determining a false resource transfer provided by the present specification. Referring to FIG. 7, in a software implementation, the apparatus 700 for determining a false resource transfer may include an obtaining unit 701 and a determining unit 702, where:
获取单元701,获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;The obtaining unit 701 is configured to acquire historical resource transfer data of the resource transfer party within a first predetermined time period before the resource to be verified is transferred, and behavior of the resource transfer party within a second predetermined time period before the resource to be verified is transferred. data;
判定单元702,基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;The determining unit 702 determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
在一种实施方式中,所述判定单元702,In an embodiment, the determining unit 702,
根据所述历史资源转移数据,确定历史资源转移特征数据;Determining historical resource transfer characteristic data according to the historical resource transfer data;
根据所述行为数据,确定行为特征数据;Determining behavior characteristic data according to the behavior data;
基于所述历史资源转移特征数据、所述行为特征数据和所述虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移。And determining, according to the historical resource transfer feature data, the behavior feature data, and the fake resource transfer model, whether the resource transfer to be verified is a fake resource transfer.
在一种实施方式中,所述判定单元702,In an embodiment, the determining unit 702,
对所述行为数据中不能用向量直接表征的数据进行向量化预处理;Performing vectorization preprocessing on data in the behavior data that cannot be directly characterized by vectors;
将经过所述向量化预处理后的行为数据进行归一化处理,以得到所述行为特征数据。The behavior data subjected to the vectorization preprocessing is normalized to obtain the behavior characteristic data.
在一种实施方式中,在所述判定单元702基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移之前,所述装置还包括:In an implementation manner, before the determining unit 702 determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer, the apparatus further includes :
第一处理单元703,对所述历史资源转移训练数据进行归一化处理得到对应的历史资源转移特征数据;The first processing unit 703 performs normalization processing on the historical resource transfer training data to obtain corresponding historical resource transfer feature data;
第二处理单元704,对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理;The second processing unit 704 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data;
第三处理单元705,将经过所述向量化预处理后的行为训练数据进行归一化处 理,得到对应的行为特征数据;The third processing unit 705 performs normalization processing on the behavior training data after the vectorization preprocessing to obtain corresponding behavior feature data;
第一训练单元706,将所述历史资源转移特征数据、所述行为特征数据及对应的资源转移类型作为输入,训练得到所述虚假资源转移模型,其中,所述资源转移类型包括虚假资源转移和非虚假资源转移。The first training unit 706, by using the historical resource transfer feature data, the behavior feature data, and the corresponding resource transfer type as an input, training the obtained false resource transfer model, wherein the resource transfer type includes a fake resource transfer and Non-false resource transfer.
在一种实施方式中,在所述判定单元702基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移之前,所述装置还包括:In an implementation manner, before the determining unit 702 determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer, the apparatus further includes :
第四处理单元707,对所述历史资源转移训练数据进行归一化处理得到对应的历史资源转移特征数据;The fourth processing unit 707 performs normalization processing on the historical resource transfer training data to obtain corresponding historical resource transfer feature data;
第五处理单元708,对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理,并将经过所述向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;The fifth processing unit 708 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data, and normalizes the behavior training data after the vectorization preprocessing to obtain a corresponding behavior. Characteristic data
第二训练单元709,将所述历史资源转移特征数据、所述行为特征数据作为输入,按二分类进行聚类训练得到所述虚假资源转移模型。The second training unit 709 takes the historical resource transfer feature data and the behavior feature data as input, and performs cluster training according to the two classifications to obtain the false resource transfer model.
在一种实施方式中,所述历史资源转移数据至少包括下述一种:In an embodiment, the historical resource transfer data includes at least one of the following:
历史资源转移次数,历史资源转移额度,历史资源转移涉及的资源接收方的数量。The number of historical resource transfers, historical resource transfer quotas, and the number of resource recipients involved in historical resource transfers.
在一种实施方式中,所述行为数据至少包括下述一种:In an embodiment, the behavior data includes at least one of the following:
所述资源转入方浏览的资源接收方的信息、浏览时长、浏览的资源信息,所述资源接收方的信息至少包括所述资源接收方的信用值、资源类别、资源价值分布、健康程度。The information of the resource receiver of the resource transfer party, the browsing duration, and the browsed resource information, and the information of the resource receiver includes at least the credit value, resource category, resource value distribution, and health level of the resource receiver.
判定虚假资源转移的装置700能够实现图1~图3的方法实施例的方法,具体可参考图1所示实施例的判定虚假资源转移的方法,不再赘述。The device 700 for determining the virtual resource transfer can implement the method of the method embodiment of FIG. 1 to FIG. 3 . For details, refer to the method for determining the false resource transfer in the embodiment shown in FIG. 1 , and details are not described herein again.
图8是本说明书提供的判定虚假交易的装置800的结构示意图。请参考图8,在一种软件实施方式中,判定虚假交易的装置800可包括获取单元801、判定单元802,其中:FIG. 8 is a schematic structural diagram of an apparatus 800 for determining a fraudulent transaction provided by the present specification. Referring to FIG. 8, in a software implementation, the apparatus 800 for determining a fraudulent transaction may include an obtaining unit 801 and a determining unit 802, where:
获取单元,获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、 和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining a unit, acquiring historical transaction data of a transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
判定单元,基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;a determining unit, determining, according to the historical resource transfer data, the behavior data, and a fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction;
其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
在一种实施方式中,所述判定单元802,In an embodiment, the determining unit 802,
基于所述历史交易数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易,包括:Determining whether the transaction to be verified is a fraudulent transaction based on the historical transaction data, the behavior data, and a fraudulent transaction model, including:
根据所述历史交易数据,确定历史交易特征数据;Determining historical transaction characteristic data according to the historical transaction data;
根据所述行为数据,确定行为特征数据;Determining behavior characteristic data according to the behavior data;
基于所述历史交易特征数据、所述行为特征数据和所述虚假交易模型,判定所述待验证交易是否为虚假交易。Determining whether the transaction to be verified is a fraudulent transaction based on the historical transaction feature data, the behavior feature data, and the fraudulent transaction model.
在一种实施方式中,所述判定单元802,In an embodiment, the determining unit 802,
对所述行为数据中不能用向量直接表征的数据进行向量化预处理;Performing vectorization preprocessing on data in the behavior data that cannot be directly characterized by vectors;
将经过所述向量化预处理后的行为数据进行归一化处理,以得到所述行为特征数据。The behavior data subjected to the vectorization preprocessing is normalized to obtain the behavior characteristic data.
在一种实施方式中,在所述判定单元802基于所述历史交易数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易之前,所述装置还包括:In an embodiment, before the determining unit 802 determines, according to the historical transaction data, the behavior data, and the fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction, the device further includes:
第一处理单元803,对所述历史交易训练数据进行归一化处理得到对应的历史交易特征数据;The first processing unit 803 performs normalization processing on the historical transaction training data to obtain corresponding historical transaction feature data;
第二处理单元804,对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理;The second processing unit 804 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data;
第三处理单元805,将经过所述向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;The third processing unit 805 normalizes the behavior training data after the vectorization preprocessing to obtain corresponding behavior feature data;
第一训练单元806,将所述历史交易特征数据、所述行为特征数据及对应的交易类型作为输入,训练得到所述虚假交易模型,其中,所述交易类型包括虚假交易和非虚假交易。The first training unit 806 receives the historical transaction feature data, the behavior feature data, and the corresponding transaction type as inputs, and trains the obtained false transaction model, wherein the transaction type includes a false transaction and a non-fake transaction.
在一种实施方式中,在所述判定单元802基于所述历史交易数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易之前,所述装置还包括:In an embodiment, before the determining unit 802 determines, according to the historical transaction data, the behavior data, and the fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction, the device further includes:
第四处理单元807,对所述历史交易训练数据进行归一化处理得到对应的历史交易特征数据;The fourth processing unit 807 performs normalization processing on the historical transaction training data to obtain corresponding historical transaction feature data;
第五处理单元808,对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理,并将经过所述向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;The fifth processing unit 808 performs vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data, and normalizes the behavior training data after the vectorization preprocessing to obtain a corresponding behavior. Characteristic data
第二训练单元809,将所述历史交易特征数据、所述行为特征数据作为输入,按二分类进行聚类训练得到所述虚假交易模型。The second training unit 809 takes the historical transaction feature data and the behavior feature data as input, and performs cluster training according to the two classifications to obtain the false transaction model.
在一种实施方式中,所述历史交易数据至少包括下述一种:In one embodiment, the historical transaction data includes at least one of the following:
历史交易次数,历史交易额度,历史交易涉及的交易接收方的数量。The number of historical transactions, the historical transaction amount, and the number of transaction recipients involved in historical transactions.
在一种实施方式中,所述行为数据至少包括下述一种:In an embodiment, the behavior data includes at least one of the following:
所述交易支付方浏览的交易接收方的信息、浏览时长、浏览的资源信息,所述交易接收方的信息至少包括所述交易接收方的信用值、商品类别、商品价值分布、健康程度。The transaction recipient's information, browsing duration, and browsed resource information browsed by the transaction payer, and the transaction recipient's information includes at least the transaction recipient's credit value, product category, commodity value distribution, and health level.
判定虚假交易的装置800能够实现图4的方法实施例的方法,具体可参考图4所示实施例的判定虚假交易的方法,不再赘述。The device 800 for determining a fraudulent transaction can implement the method of the method embodiment of FIG. 4 . For details, refer to the method for determining a false transaction in the embodiment shown in FIG. 4 , and details are not described herein again.
总之,以上所述仅为本说明书的较佳实施例而已,并非用于限定本说明书的保护范围。凡在本说明书一个或多个实施例的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本说明书一个或多个实施例的保护范围之内。In conclusion, the above description is only the preferred embodiment of the present specification, and is not intended to limit the scope of the present specification. Any modifications, equivalent substitutions, improvements, etc. within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储 器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer readable media includes both permanent and non-persistent, removable and non-removable media. Information storage can be implemented by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It is also to be understood that the terms "comprises" or "comprising" or "comprising" or any other variations are intended to encompass a non-exclusive inclusion, such that a process, method, article, Other elements not explicitly listed, or elements that are inherent to such a process, method, commodity, or equipment. An element defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device including the element.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。The various embodiments in the specification are described in a progressive manner, and the same or similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.

Claims (20)

  1. 一种判定虚假资源转移的方法,包括:A method for determining the transfer of a false resource, comprising:
    获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
    基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
    其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  2. 如权利要求1所述的方法,The method of claim 1
    基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移,包括:And determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer, including:
    根据所述历史资源转移数据,确定历史资源转移特征数据;Determining historical resource transfer characteristic data according to the historical resource transfer data;
    根据所述行为数据,确定行为特征数据;Determining behavior characteristic data according to the behavior data;
    基于所述历史资源转移特征数据、所述行为特征数据和所述虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移。And determining, according to the historical resource transfer feature data, the behavior feature data, and the fake resource transfer model, whether the resource transfer to be verified is a fake resource transfer.
  3. 如权利要求2所述的方法,根据所述行为数据,确定行为特征数据,包括:The method of claim 2, determining behavior characteristic data based on the behavior data, comprising:
    对所述行为数据中不能用向量直接表征的数据进行向量化预处理;Performing vectorization preprocessing on data in the behavior data that cannot be directly characterized by vectors;
    将经过所述向量化预处理后的行为数据进行归一化处理,以得到所述行为特征数据。The behavior data subjected to the vectorization preprocessing is normalized to obtain the behavior characteristic data.
  4. 如权利要求1所述的方法,在基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移之前,所述方法还包括:The method of claim 1, before the determining whether the resource to be verified is a fake resource transfer based on the historical resource transfer data, the behavior data, and the fake resource transfer model, the method further includes:
    对所述历史资源转移训练数据进行归一化处理得到对应的历史资源转移特征数据;Normalizing the historical resource transfer training data to obtain corresponding historical resource transfer feature data;
    对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理;Performing vectorization preprocessing on data that cannot be directly characterized by vectors in the behavior training data;
    将经过所述向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;Normalizing the behavior training data after the vectorization preprocessing to obtain corresponding behavior characteristic data;
    将所述历史资源转移特征数据、所述行为特征数据及对应的资源转移类型作为输入,训练得到所述虚假资源转移模型,其中,所述资源转移类型包括虚假资源转移和非虚假资源转移。The historical resource transfer feature data, the behavior feature data, and the corresponding resource transfer type are input as inputs, and the fake resource transfer model is trained, wherein the resource transfer type includes a fake resource transfer and a non-fake resource transfer.
  5. 如权利要求1所述的方法,在基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移之前,所述方法还包括:The method of claim 1, before the determining whether the resource to be verified is a fake resource transfer based on the historical resource transfer data, the behavior data, and the fake resource transfer model, the method further includes:
    对所述历史资源转移训练数据进行归一化处理得到对应的历史资源转移特征数据;Normalizing the historical resource transfer training data to obtain corresponding historical resource transfer feature data;
    对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理,并将经过所述向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;Performing vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data, and normalizing the behavior training data after the vectorization preprocessing to obtain corresponding behavior characteristic data;
    将所述历史资源转移特征数据、所述行为特征数据作为输入,按二分类进行聚类训练得到所述虚假资源转移模型。Taking the historical resource transfer feature data and the behavior feature data as input, performing cluster training according to the two classifications to obtain the false resource transfer model.
  6. 如权利要求1-5中任一项所述的方法,A method according to any one of claims 1 to 5,
    所述历史资源转移数据至少包括下述一种:The historical resource transfer data includes at least one of the following:
    历史资源转移次数,历史资源转移额度,历史资源转移涉及的资源接收方的数量。The number of historical resource transfers, historical resource transfer quotas, and the number of resource recipients involved in historical resource transfers.
  7. 如权利要求1-5中任一项所述的方法,A method according to any one of claims 1 to 5,
    所述行为数据至少包括下述一种:The behavior data includes at least one of the following:
    所述资源转入方浏览的资源接收方的信息、浏览时长、浏览的资源信息,所述资源接收方的信息至少包括所述资源接收方的信用值、资源类别、资源价值分布、健康程度。The information of the resource receiver of the resource transfer party, the browsing duration, and the browsed resource information, and the information of the resource receiver includes at least the credit value, resource category, resource value distribution, and health level of the resource receiver.
  8. 一种判定虚假交易的方法,包括:A method of determining a fraudulent transaction, including:
    获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining historical transaction data of the transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
    基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;Determining whether the transaction to be verified is a fraudulent transaction based on the historical resource transfer data, the behavior data, and a fraudulent transaction model;
    其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  9. 如权利要求8所述的方法,基于所述历史交易数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易,包括:The method of claim 8, determining whether the transaction to be verified is a fraudulent transaction based on the historical transaction data, the behavior data, and a fraudulent transaction model, comprising:
    根据所述历史交易数据,确定历史交易特征数据;Determining historical transaction characteristic data according to the historical transaction data;
    根据所述行为数据,确定行为特征数据;Determining behavior characteristic data according to the behavior data;
    基于所述历史交易特征数据、所述行为特征数据和所述虚假交易模型,判定所述待验证交易是否为虚假交易。Determining whether the transaction to be verified is a fraudulent transaction based on the historical transaction feature data, the behavior feature data, and the fraudulent transaction model.
  10. 如权利要求9所述的方法,根据所述行为数据,确定行为特征数据,包括:The method of claim 9, determining behavior characteristic data based on the behavior data, comprising:
    对所述行为数据中不能用向量直接表征的数据进行向量化预处理;Performing vectorization preprocessing on data in the behavior data that cannot be directly characterized by vectors;
    将经过所述向量化预处理后的行为数据进行归一化处理,以得到所述行为特征数据。The behavior data subjected to the vectorization preprocessing is normalized to obtain the behavior characteristic data.
  11. 如权利要求8所述的方法,在基于所述历史交易数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易之前,所述方法还包括:The method of claim 8, before determining whether the transaction to be verified is a fraudulent transaction, based on the historical transaction data, the behavior data, and the fraudulent transaction model, the method further comprising:
    对所述历史交易训练数据进行归一化处理得到对应的历史交易特征数据;Normalizing the historical transaction training data to obtain corresponding historical transaction feature data;
    对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理;Performing vectorization preprocessing on data that cannot be directly characterized by vectors in the behavior training data;
    将经过所述向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;Normalizing the behavior training data after the vectorization preprocessing to obtain corresponding behavior characteristic data;
    将所述历史交易特征数据、所述行为特征数据及对应的交易类型作为输入,训练得到所述虚假交易模型,其中,所述交易类型包括虚假交易和非虚假交易。The historical transaction characteristic data, the behavior characteristic data, and the corresponding transaction type are input as inputs, and the false transaction model is trained, wherein the transaction type includes a false transaction and a non-false transaction.
  12. 如权利要求8所述的方法,在基于所述历史交易数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易之前,所述方法还包括:The method of claim 8, before determining whether the transaction to be verified is a fraudulent transaction, based on the historical transaction data, the behavior data, and the fraudulent transaction model, the method further comprising:
    对所述历史交易训练数据进行归一化处理得到对应的历史交易特征数据;Normalizing the historical transaction training data to obtain corresponding historical transaction feature data;
    对所述行为训练数据中不能用向量直接表征的数据进行向量化预处理,并将经过所述向量化预处理后的行为训练数据进行归一化处理,得到对应的行为特征数据;Performing vectorization preprocessing on the data that cannot be directly represented by the vector in the behavior training data, and normalizing the behavior training data after the vectorization preprocessing to obtain corresponding behavior characteristic data;
    将所述历史交易特征数据、所述行为特征数据作为输入,按二分类进行聚类训练得到所述虚假交易模型。Taking the historical transaction feature data and the behavior feature data as input, performing cluster training according to the two classifications to obtain the false transaction model.
  13. 如权利要求8-12任一项所述的方法,A method according to any of claims 8-12,
    所述历史交易数据至少包括下述一种:The historical transaction data includes at least one of the following:
    历史交易次数,历史交易额度,历史交易涉及的交易接收方的数量。The number of historical transactions, the historical transaction amount, and the number of transaction recipients involved in historical transactions.
  14. 如权利要求8-12任一项所述的方法,A method according to any of claims 8-12,
    所述行为数据至少包括下述一种:The behavior data includes at least one of the following:
    所述交易支付方浏览的交易接收方的信息、浏览时长、浏览的资源信息,所述交易接收方的信息至少包括所述交易接收方的信用值、商品类别、商品价值分布、健康程度。The transaction recipient's information, browsing duration, and browsed resource information browsed by the transaction payer, and the transaction recipient's information includes at least the transaction recipient's credit value, product category, commodity value distribution, and health level.
  15. 一种判定虚假资源转移的装置,包括:A device for determining the transfer of a false resource, comprising:
    获取单元,获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;An acquiring unit, acquiring historical resource transfer data of the resource transfer party within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transfer party within a second predetermined time period before the resource to be verified is transferred ;
    判定单元,基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;The determining unit determines, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
    其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  16. 一种判定虚假交易的装置,包括:A device for determining a fraudulent transaction, comprising:
    获取单元,获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining a unit, acquiring historical transaction data of a transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
    判定单元,基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;a determining unit, determining, according to the historical resource transfer data, the behavior data, and a fraudulent transaction model, whether the transaction to be verified is a fraudulent transaction;
    其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  17. 一种电子设备,包括:An electronic device comprising:
    处理器;以及Processor;
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:A memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
    获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
    基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
    其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  18. 一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电子设备执行以下操作:A computer readable storage medium storing one or more programs, the one or more programs, when executed by an electronic device including a plurality of applications, causing the electronic device to perform the following operations :
    获取资源转入方在待验证资源转移前第一预定时间段内的历史资源转移数据、和所述资源转入方在所述待验证资源转移前第二预定时间段内的行为数据;Obtaining, by the resource transferee, historical resource transfer data within a first predetermined time period before the resource to be verified is transferred, and behavior data of the resource transferee within a second predetermined time period before the resource to be verified is transferred;
    基于所述历史资源转移数据、所述行为数据和虚假资源转移模型,判定所述待验证资源转移是否为虚假资源转移;Determining, according to the historical resource transfer data, the behavior data, and the fake resource transfer model, whether the resource transfer to be verified is a false resource transfer;
    其中,所述虚假资源转移模型基于历史资源转移训练数据和对应的行为训练数据训练得到。The fake resource transfer model is trained based on historical resource transfer training data and corresponding behavior training data.
  19. 一种电子设备,包括:An electronic device comprising:
    处理器;以及Processor;
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:A memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
    获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining historical transaction data of the transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
    基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;Determining whether the transaction to be verified is a fraudulent transaction based on the historical resource transfer data, the behavior data, and a fraudulent transaction model;
    其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
  20. 一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电子设备执行以下操作:A computer readable storage medium storing one or more programs, the one or more programs, when executed by an electronic device including a plurality of applications, causing the electronic device to perform the following operations :
    获取交易支付方在待验证交易前第一预定时间段内的历史交易数据、和所述交易支付方在所述待验证交易前第二预定时间段内的行为数据;Obtaining historical transaction data of the transaction payer within a first predetermined time period before the transaction to be verified, and behavior data of the transaction payer within a second predetermined time period before the transaction to be verified;
    基于所述历史资源转移数据、所述行为数据和虚假交易模型,判定所述待验证交易是否为虚假交易;Determining whether the transaction to be verified is a fraudulent transaction based on the historical resource transfer data, the behavior data, and a fraudulent transaction model;
    其中,所述虚假交易模型基于历史交易训练数据和对应的行为训练数据训练得到。The false transaction model is trained based on historical transaction training data and corresponding behavioral training data.
PCT/CN2019/071113 2018-01-23 2019-01-10 Method and apparatus for determining false resource transfer, method and apparatus for determining false trading, and electronic device WO2019144808A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810063623.1 2018-01-23
CN201810063623.1A CN108492112B (en) 2018-01-23 2018-01-23 Method and device for judging false resource transfer and false transaction and electronic equipment

Publications (1)

Publication Number Publication Date
WO2019144808A1 true WO2019144808A1 (en) 2019-08-01

Family

ID=63343713

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/071113 WO2019144808A1 (en) 2018-01-23 2019-01-10 Method and apparatus for determining false resource transfer, method and apparatus for determining false trading, and electronic device

Country Status (3)

Country Link
CN (1) CN108492112B (en)
TW (1) TW201933226A (en)
WO (1) WO2019144808A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108492112B (en) * 2018-01-23 2020-06-23 阿里巴巴集团控股有限公司 Method and device for judging false resource transfer and false transaction and electronic equipment
CN109242499A (en) * 2018-09-19 2019-01-18 中国银行股份有限公司 A kind of processing method of transaction risk prediction, apparatus and system
CN110198310B (en) * 2019-05-20 2021-09-14 腾讯科技(深圳)有限公司 Network behavior anti-cheating method and device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310353A (en) * 2013-07-05 2013-09-18 重庆大学 Anti-attack data filtering optimization system and method
CN107169499A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 A kind of Risk Identification Method and device
CN107346463A (en) * 2016-05-04 2017-11-14 阿里巴巴集团控股有限公司 Training, mode input data determination method and the device of risk control model
CN107368936A (en) * 2016-05-12 2017-11-21 阿里巴巴集团控股有限公司 Air control model training method and device
CN108492112A (en) * 2018-01-23 2018-09-04 阿里巴巴集团控股有限公司 The method, apparatus and electronic equipment of the false resource transfers of judgement and wash sale

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563757B (en) * 2016-07-01 2020-09-22 阿里巴巴集团控股有限公司 Data risk identification method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310353A (en) * 2013-07-05 2013-09-18 重庆大学 Anti-attack data filtering optimization system and method
CN107169499A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 A kind of Risk Identification Method and device
CN107346463A (en) * 2016-05-04 2017-11-14 阿里巴巴集团控股有限公司 Training, mode input data determination method and the device of risk control model
CN107368936A (en) * 2016-05-12 2017-11-21 阿里巴巴集团控股有限公司 Air control model training method and device
CN108492112A (en) * 2018-01-23 2018-09-04 阿里巴巴集团控股有限公司 The method, apparatus and electronic equipment of the false resource transfers of judgement and wash sale

Also Published As

Publication number Publication date
TW201933226A (en) 2019-08-16
CN108492112B (en) 2020-06-23
CN108492112A (en) 2018-09-04

Similar Documents

Publication Publication Date Title
CN109978538B (en) Method and device for determining fraudulent user, training model and identifying fraudulent risk
WO2018001195A1 (en) Method and device for controlling data risk
WO2019223379A1 (en) Product recommendation method and device
US20130117154A1 (en) Method and System of Evaluating Credibility of Online Trading User
US11379845B2 (en) Method and device for identifying a risk merchant
US8626535B2 (en) System and method for providing shipping insurance as a service
US11907867B2 (en) Identification and suggestion of rules using machine learning
CN110874491B (en) Privacy data processing method and device based on machine learning and electronic equipment
WO2019144808A1 (en) Method and apparatus for determining false resource transfer, method and apparatus for determining false trading, and electronic device
CA2781326C (en) System, method and computer program product for parcel assessment
CN108885762B (en) Method and system for allocating price discovery mechanism in data market
US20150058151A1 (en) Systems and methods for buying and selling one or more vehicles
JP2023546849A (en) Machine learning to predict, recommend, and buy and sell securities in currency markets
CN107679916A (en) For obtaining the method and device of user interest degree
Zhao et al. Anatomy of a web-scale resale market: a data mining approach
CN110874786B (en) False transaction group identification method, device and computer readable medium
WO2020177477A1 (en) Credit service recommendation method, apparatus, and device
CN111582872A (en) Abnormal account detection model training method, abnormal account detection device and abnormal account detection equipment
JP2019185595A (en) Information processor, method for processing information, information processing program, determination device, method for determination, and determination program
CN110008986B (en) Batch risk case identification method and device and electronic equipment
US20160343051A1 (en) Network computer system to predict contingency outcomes
US11188917B2 (en) Systems and methods for compressing behavior data using semi-parametric or non-parametric models
WO2019100867A1 (en) Processing method based on resources appreciation objects and resources objects, and apparatus
US20220180388A1 (en) Methods and systems of an automated deals evaluation and management platform
US20240037620A1 (en) Systems and Methods for Verifying Transaction Authenticity Using Securitized Token-Based System

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19744343

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19744343

Country of ref document: EP

Kind code of ref document: A1