CN105844475A - Risk control method and risk control apparatus - Google Patents
Risk control method and risk control apparatus Download PDFInfo
- Publication number
- CN105844475A CN105844475A CN201610152288.3A CN201610152288A CN105844475A CN 105844475 A CN105844475 A CN 105844475A CN 201610152288 A CN201610152288 A CN 201610152288A CN 105844475 A CN105844475 A CN 105844475A
- Authority
- CN
- China
- Prior art keywords
- risk
- communication data
- data
- communication
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
Embodiments of the invention provide a risk control method and a risk control apparatus. The risk control method comprises the following steps of receiving communication data transmitted by a communication platform; decomposing the communication data transmitted by the communication platform according to a plurality of preset different data attributes to acquire a communication data component corresponding to each data attribute, and accumulating the communication data component corresponding to each data attribute respectively to acquire an accumulation amount of the communication data component corresponding to each data attribute; using a preset screening strategy to screen the accumulation amount of the communication data component corresponding to each data attribute so as to acquire risk communication data with a risk; calculating a risk value of the risk communication data, comparing the risk value to a preset risk threshold, and when the risk value is greater than the preset risk threshold, sending a risk message to a communication platform. In the prior art, entire knife cutting is used so that a risk monitoring effect is poor and risk monitoring is not comprehensive. By using the method and the apparatus of the invention, the above problems are solved, and the effect and comprehensiveness of the risk monitoring are increased.
Description
Technical field
The present invention relates to the relevant technical field of risk management and control, in particular to one
It is applied to telecom operators and risk is carried out risk control method and the risk control of management and control
Device.
Background technology
In prior art, in order to control the fraud loss of (such as telecommunications industry operator),
The method generally used is to formulate risk supervision rule, and by risk supervision rule
Online communication data is monitored.The existing method setting up risk supervision is the most logical
Cross risk supervision rule to the risk subjects finding out in business, such as, advise when risk supervision
Then it is defined as " if the odd-numbered day added up the duration of call more than 10 hours, then generate risk
Record ", then meet above-mentioned condition once user's communication behavior, then will feed back at once
To telecom operators and generate risk record.Therefore can effectively find in real time business
Risk, control the risk that is spoofed of telecom operators.
But, it is overall that the thresholding set in above-mentioned risk supervision rule is in accordance with business
Average level sets.Such as, the door restrictor of certain portfolio is set to the equal of all data
Value and 3 times of variance sums, consequently, it is possible to exceed this door by the user of only 0.13%
Limit, and only have these certain customers can be identified as abnormal user.And need exception
User be analyzed examining, but the actual user finding these exceptions is no lack of operation
The big customer of business, even some corporate clients, because this type of client traffic is very big,
The most there is not risk, easily produce mistake.Meanwhile, the use of remaining 99.87%
In family, though it is little but there is individual example persistently swindled to there is portfolio too, need
Now undiscovered, the most existing hit rate finding that user is abnormal is the highest, exists serious
The problem of missing inspection.
Meanwhile, existing most risk monitoring and controls can only find known risk, accomplishes afterwards
Then the rule analyzing risk formulates risk supervision rule.But along with pushing away of business comprehensively
OK, various leak may be there is and be spoofed molecule utilization, produce novel
Fraudulent mean, passive prevention and control can not really be retrieved a loss simply.
Summary of the invention
In view of the foregoing, the present invention the first preferred embodiment provides a kind of risk control
Method, is applied to and the server of communications platform communication connection.Described method includes:
Receive the communication data that described communications platform sends;
The communication data sent by described communications platform is according to default multiple different number
Carry out decomposing according to attribute and obtain the communication data component that each data attribute is corresponding, to often
The communication data component that individual data attribute is corresponding carries out being accumulated by each data respectively and belongs to
The cumulative amount of the communication data component that property is corresponding;
The cumulative amount of communication data component corresponding for described each data attribute is used pre-
The screening strategy first set screens, and obtains existing the risk communication data of risk;
And
Calculate the value-at-risk of described risk communication data, by described value-at-risk and default wind
Danger threshold value compares, and when described value-at-risk is more than described default risk threshold value, sends out
Air-supply danger message gives described communications platform.
The present invention the second preferred embodiment provides a kind of risk control method, is applied to phase
Communications platform, user terminal and the server of communication connection, described method bag between Hu
Include:
Described server receives the communication data that described communications platform sends;
The communication data that described communications platform is sent by described server is according to default many
Individual different data attribute carries out decomposing and obtains the communication data that each data attribute is corresponding
Component, is accumulated by respectively to the communication data component that each data attribute is corresponding
The cumulative amount of the communication data component that each data attribute is corresponding;
Described server tiring out communication data component corresponding for described each data attribute
Metering uses screening strategy set in advance to screen, and obtains existing the risk of risk
Communication data;
Described server calculates the value-at-risk of described risk communication data, by described risk
Value compares with default risk threshold value, when described value-at-risk is more than described default risk
During threshold value, send risk message to described communications platform;
Described communications platform controls the communication of described user terminal according to described risk message
State.
The present invention the 3rd preferred embodiment provides a kind of risk control device, be applied to
The server of communications platform communication connection.Described device includes:
Receiver module, for receiving the communication data that described communications platform sends;
Data are decomposed and accumulation module, for the communication number sent by described communications platform
Each data attribute is obtained according to carrying out decomposition according to default multiple different data attribute
Corresponding communication data component, divides the communication data component that each data attribute is corresponding
Do not carry out being accumulated by the cumulative amount of communication data component corresponding to each data attribute;
Screening module, for by communication data component corresponding for described each data attribute
Cumulative amount use screening strategy set in advance screen, obtain there is risk
Risk communication data;And
Calculate and sending module, for calculating the value-at-risk of described risk communication data,
Described value-at-risk is compared with default risk threshold value, when described value-at-risk is more than institute
When stating default risk threshold value, send risk message to described communications platform.
Compared with prior art, the risk control method that present pre-ferred embodiments provides
And risk control device.By the division that the communication data of reception is carried out is obtained each
The cumulative amount of single communication data component, adding up above-mentioned each communication data component
Amount is brought in default screening strategy the value-at-risk obtaining correspondence, and by this wind
The judgement of danger value judges whether real risk.Meanwhile, detection user is used
The abrupt climatic change of custom vestige makes up the control unknown risks that default screening strategy can't detect.
Thus it is poor to solve the monitoring effect that in prior art, whole cutter incisal guide causes, and monitors incomplete
Problem, improves the effect of monitoring with comprehensive.
For making the above-mentioned purpose of the present invention, feature and advantage to become apparent,
Preferred embodiment cited below particularly, and coordinate appended accompanying drawing, it is described in detail below.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to reality
Execute the required accompanying drawing used in example to be briefly described, it will be appreciated that the following drawings
Illustrate only certain embodiments of the present invention, be therefore not construed as the limit to scope
Fixed, for those of ordinary skill in the art, before not paying creative work
Put, it is also possible to obtain other relevant accompanying drawings according to these accompanying drawings.
Fig. 1 is user terminal, communications platform and the clothes that present pre-ferred embodiments provides
The mutual schematic diagram of business device.
Fig. 2 is the block diagram of the server shown in Fig. 1.
Fig. 3 be first embodiment of the invention provide be applied to server shown in Fig. 1
The flow chart of risk control method.
Fig. 4 be second embodiment of the invention provide be applied to user terminal shown in Fig. 1,
The flow chart of the risk control method of communications platform and server.
Fig. 5 is the structural representation of the risk control device that third embodiment of the invention provides
Block diagram.
Main element symbol description
Detailed description of the invention
Below in conjunction with accompanying drawing in the embodiment of the present invention, to the skill in the embodiment of the present invention
Art scheme is clearly and completely described, it is clear that described embodiment is only
The a part of embodiment of the present invention rather than whole embodiments.Generally at accompanying drawing herein
Described in and the assembly of the embodiment of the present invention that illustrates can come with various different configurations
Arrange and design.Therefore, below to the embodiments of the invention provided in the accompanying drawings
Describe the scope of claimed invention of being not intended to limit in detail, but only table
Show the selected embodiment of the present invention.Based on embodiments of the invention, people in the art
The every other embodiment that member is obtained on the premise of not making creative work,
Broadly fall into the scope of protection of the invention.
It should also be noted that similar label and letter represent similar terms in following accompanying drawing,
Therefore, the most a certain Xiang Yi accompanying drawing is defined, then in accompanying drawing subsequently not
Need it to be defined further and explains.Meanwhile, in describing the invention,
Term " first ", " second " etc. be only used for distinguish describe, and it is not intended that instruction or
Hint relative importance.
As it is shown in figure 1, be that the user terminal 100 that present pre-ferred embodiments provides leads to
Cross the mutual schematic diagram that communications platform 200 communicates with server 300.Described communication is put down
Platform 200 can set up described user terminal 100 and described server 300 by network
Between communication, to realize between described user terminal 100 and described server 300
Data communication and mutual.
In the present embodiment, communications platform 200 and server 300 be not it may be that but limit
In, computer installation or server.As in figure 2 it is shown, be the server shown in Fig. 1
The block diagram of 300.Described server 300 can include risk control device 310,
First memory 311, first processor 312 and the first communication unit 313.
Described first memory 311, first processor 312 and the first communication unit
313 each elements are electrically connected with the most directly or indirectly, to realize the biography of data
Defeated or mutual.Such as, these elements each other can be total by one or more communication
Line or holding wire realize being electrically connected with.Described risk control is pretended 310 and is included at least one
Individual can be stored in described first memory with the form of software or firmware (firmware)
In 311 or be solidificated in described server 300 operating system (operating system,
OS) software function module in.Described first processor 312 is used for performing described
The executable module of storage, the most described risk control device 310 in one memorizer 311
Included software function module and computer program etc..
Wherein, described first memory 311 may be, but not limited to, random access memory
Memorizer (Random Access Memory, RAM), read only memory (Read
Only Memory, ROM), programmable read only memory (Programmable
Read-Only Memory, PROM), erasable read-only memory (Erasable
Programmable Read-Only Memory, EPROM), electric erasable is read-only
Memorizer (Electric Erasable Programmable Read-Only Memory,
EEPROM) etc..Wherein, first memory 311 is used for storing program, and described
One processor 312, after receiving execution instruction, performs described program.Described first
Communication unit 313 is for setting up described communications platform 200 and user by described network
Communication connection between terminal 100 and server 300, and for by described network
Transceiving data.
First embodiment
Refer to Fig. 3, be first embodiment of the invention provide be applied to communicate flat
The flow chart of the risk control method of the server 300 that platform 200 connects.Below by right
Idiographic flow and the step of Fig. 3 are described in detail.
Step S401, receives the communication data that described communications platform 200 sends.
In this specific embodiment, described server 300 receives described communications platform 200
The user that (such as: telecom operators, mobile operator and operator of UNICOM etc.) sends
Communication data.Wherein, described communication data may include that communication serial number, user
Mark, calling number, called number, initial time, the end time, the duration of call,
Call character (long-distance or short distance), rate, expense and discount etc..
Step S402, the communication data sent by described communications platform 200 is according to presetting
Multiple different data attributes carry out decomposing and obtain the communication that each data attribute is corresponding
Data component, adds up respectively to the communication data component that each data attribute is corresponding
Obtain the cumulative amount of communication data component corresponding to each data attribute.
In this specific embodiment, the communication data that described server 300 will receive
Decompose according to different pieces of information attribute.Described data attribute can include but not limited to
The content that above-mentioned communication data includes, such as: the duration of call, air time, call
Place, call character (long-distance or short distance), the pass between cost of the phone call and calling user
System etc..
Specifically, when described server 300 receives a communication data, described clothes
This communication data is carried out decomposition according to different data attributes and obtains different pieces of information by business device
The corresponding communication data component of attribute, by different user or user group (individual
User group or enterprise customer colony) the communication data component of different pieces of information attribute enter
Row is accumulative to be added, and obtains the tired of communication data component corresponding to corresponding each data attribute
Metering.
Illustrate, when for individual consumer (such as: user Zhang San), from logical
Letter data obtains the communication data that each data attribute relevant to user Zhang San is corresponding
Component (such as: the air time), by being somebody's turn to do before this communication data component and Zhang San
Communication data component carries out being accumulated by Zhang San within a period of time (such as one month)
The cumulative amount (cumulative amount of air time) of communication data component.When for user group
Time, it is thus achieved that the mode of the cumulative amount of each communication data component and the mode of above-mentioned individual
Identical.
Step S403, tiring out communication data component corresponding for described each data attribute
Metering uses screening strategy set in advance to screen, and obtains existing the risk of risk
Communication data.
In this specific embodiment, described screening strategy set in advance is according to user class
The difference of type can include but not limited to, for the strategy that different user is corresponding, for
The strategy that the user that differs of custom is corresponding, for the plan that user in zones of different is corresponding
Slightly, for the relative strategy of all ages and classes user and for dissimilar (individual or enterprise
Industry) strategy corresponding to user.By relative for different user strategy association so that
Screening strategy has more specific aim.Specific algorithm according to screening strategy is different, described
Screening strategy can include three classes, i.e. fixed class strategy, increment class strategy and score class
Strategy.Wherein, fixed class strategy can include the requirement of single attribute data or multiple
The requirement of attribute data, such as, user's amount of money of conversing the same day more than 1000 yuan, or
User's odd-numbered day converses more than 500 yuan and talk times is more than 50 times.Described increment class plan
Slightly can also include increment or the increment of multiple attribute data of single attribute data,
If user's amount of money of conversing the same day is beyond history a period of time call 3 times of the amount of money, or use
The family amount of money of conversing the same day exceedes 2 times of history a period of time call amount of money and user same day
Air time exceedes 2 times of air time history a period of time.Described meter classification policy
The all properties data of user are carried out incremental detection, and obtains value-at-risk, concrete wind
The computational methods of danger value refer to the content that step S404 is relevant.
In a kind of better embodiment of this specific embodiment, step S403 is all right
Control unknown risks is identified, according to the communication data that described each data attribute is corresponding
Whether the cumulative amount of component judges the use habit of the user corresponding to described communication data
Change, when described user's use habit changes, calculate described every number
According to the value-at-risk corresponding to the communication data that attribute is corresponding.
Specifically, such as, lead to conventional in Shenzhen and user of the number attribution of user
The call caller ground of words custom display user is all in Shenzhen, when leading to of this user some day
When being changed to Shanghai to words caller, the call caller of this user is become by described server
The event changed carries out record, and described server detects this user by described communications platform
Follow-up paying behaviors, if user completes normally to pay the fees, described server should by adjustment
The strategy of consumer's risk detection reduces the significance level of strange land communicating data attribute (i.e. to be weighed
Weight), user occurs that number of times that above-mentioned strange land is called is the most and follow-up just all completes
Often payment, then the significance level of strange land communicating data attribute is the least, such that it is able to subtract
Few misinformation probability.If user occurs that arrearage is broken a contract, described server is by this user of adjustment
The strategy of risk supervision increases the significance level of strange land communicating data attribute, when user goes out
After the call of existing strange land, the number of times of telephone expenses promise breaking is the most, and corresponding this client that do not allows is carried out
The probability that strange land is called is the biggest.Meanwhile, server can also be by individual
Colony carries out above-mentioned behavior monitoring, when individual colony in more than a predetermined number people (as
1%) occur in that when use habit changes arrearage is broken a contract, then server should
Use habit changes and adds described default screening strategy to as new risk supervision strategy
In for individual colony carry out risk supervision.
Step S404, calculates the value-at-risk of described risk communication data, by described risk
Value compares with default risk threshold value, when described value-at-risk is more than described default risk
During threshold value, send risk message to described communications platform 200.
When for fixed class strategy, the requirement of individual data or multiple data demand meet
During strategy, the value-at-risk of corresponding risk communication data is judged as exceeding predetermined threshold value.
When multiple data demands exist a situation being unsatisfactory for strategy, corresponding risk communication
The value-at-risk of data is judged as being not above predetermined threshold value.
When for increment class strategy and meter classification policy, the computational algorithm of described value-at-risk
Below equation can be used: Y=k1a1+k2a2+k3a3+……+knan, wherein k1、k2、
k3... knIt is respectively the coefficient preset, for representing each data attribute above-mentioned
Significance level, a1、a2、a3... anRepresent the variable of each data attribute respectively.
When for increment class strategy, each data attribute not contained in risk communication data is corresponding
Coefficient k be 0.When for meter classification policy, because this strategy is to own user
Data attribute carries out incremental detection, wherein k1、k2、k3... knAccording to each number
Relative set is carried out according to the significance level of attribute.
In this specific embodiment, when by the value-at-risk obtained calculated above with preset
Risk threshold value is compared, when calculated value-at-risk is more than described default risk
During threshold value, send risk information to described communications platform 200.
In a kind of better embodiment of this specific embodiment, described server 300
The described risk communication data also described value-at-risk exceeding described default risk threshold value are entered
Row storage.And be trained obtaining new screening to the described risk communication data of storage
Strategy, adds to described new screening strategy in described screening strategy set in advance.
Described server 300 is follow-up according to the user that the described risk communication data of storage are corresponding
Payment situation judge the credit of this user, when there is payment promise breaking in this user, will
The described risk communication data of this storage are as the reference data of new screening strategy and use
In new screening strategy is trained.
Specifically, described server is to corresponding follow-up of described storage risk communication data
Situation is tracked, and changes described predetermined threshold value according to following the tracks of result.Hereinafter lift
Example illustrates.Such as, in set risk policy, when user Dan Tian calls
Duration constantly risk information will be sent to communications platform 200 little more than 10, but use
There is repeatedly Dan Tian and call duration more than 10 hours in family, but this user does not occur
The behavior of arrearage promise breaking, described server 300 can be automatically by sieve corresponding for this user
Choosing strategy threshold settings be this repeatedly call the time in clock the longest once time
Between or the set of time get Geng Gao that will call.
Second embodiment
Refer to Fig. 4, be being applied to each other of second embodiment of the invention offer
Communications platform 200, user terminal 100 and the risk of server 300 of communication connection
The flow chart of control method.Idiographic flow and the step of Fig. 4 will be carried out in detail below
Illustrate.
Step S501, described server 300 receives what described communications platform 200 sent
Communication data.
Step S502, it is logical that described communications platform 200 is sent by described server 300
Letter data carries out decomposition according to default multiple different data attribute and obtains each data
The communication data component that attribute is corresponding, divides the communication data that each data attribute is corresponding
Amount carries out being accumulated by the accumulative of communication data component corresponding to each data attribute respectively
Amount.
Step S503, corresponding for described each data attribute is led to by described server 300
The cumulative amount of letter data component uses screening strategy set in advance to screen, and obtains
There are the risk communication data of risk.
Step S504, described server 300 calculates the risk of described risk communication data
Value, compares described value-at-risk with default risk threshold value, when described value-at-risk is big
When described default risk threshold value, send risk message to described communications platform 200.
In this specific embodiment, step S501~the specific implementation of step S504
Identical with step S401 in first embodiment~step S404, detailed content sees first
Embodiment just repeats no more at this.
Step S505, described communications platform 200 controls described according to described risk message
The communications status of user terminal 100.
In a kind of better embodiment of this specific embodiment, step S505 is specially
Described communications platform 200 sends communication data indicating risk information to described user terminal
100, described user terminal 100 shows described communication data indicating risk information;Receive
The confirmation of described communication data indicating risk information is operated by user;Behaviour is confirmed when described
When being triggered, described communications platform 200 is by the communication of described user terminal 100
Disconnected.
Specifically, as a example by user behavior custom changes.The number attribution of user exists
Shenzhen and user conventional call custom display user call caller ground all in Shenzhen,
When some day this user call caller be changed to Shanghai time, described communications platform will
Can using user habit trail change as an indicating risk information (such as: PLSCONFM this
Strange land (Shanghai) call is effectively) it is sent on user terminal, it should be appreciated that
Indicating risk information can be sent to the user terminal 100 of this user correspondence customer manager
On (such as: mobile phone, computer), it is also possible to be sent to and abnormal communication behavior occurs
User terminal 100 corresponding to the telephone number that telephone number is associated.When risk carries
When showing the user terminal 100 that information can be sent to this user correspondence customer manager, visitor
Family manager confirm above-mentioned indicating risk information, when customer manager selects to ignore this
During indicating risk information, this user can be normally carried out call.When customer manager selects
When confirming indicating risk information, communications platform 200 can assert that this call is for abnormal logical
Words can be pointed out user to hang up or directly cut off the call of user.Work as indicating risk
Information is sent to and the telephone number institute occurring that abnormal communication behavior telephone number is associated
During corresponding user terminal 100, by the user of the user terminal holding this associated numbers
Perform the operation of above-mentioned customer manager.In actual life, increasing user uses
Multiple mobile phones, can run into the situation that mobile phone is lost or card number is replicated by people unavoidably,
Occur, during abnormal communication behavior, indicating risk information is sent to mobile phone associated there
User or the loss of communications platform 200 can be reduced.
3rd embodiment
The structure of the risk control device 310 that Fig. 5 provides for third embodiment of the invention
Schematic block diagram, refer to Fig. 5, and the risk control device 310 that the present embodiment provides can
For realizing the risk control method that first embodiment proposes, described in the present embodiment
Risk control device may include that receiver module 3101, data are decomposed and accumulation module
3102, screen module 3103 and calculate and sending module 3104, described risk control
Device 310 is applied to server 300.
Described receiver module 3101, for receiving the logical of described communications platform 200 transmission
Letter data.
Described data are decomposed and accumulation module 3102, for by described communications platform 200
The communication data sent carries out decomposition according to default multiple different data attribute and obtains
The communication data component that each data attribute is corresponding, to corresponding the leading to of each data attribute
The communication data that letter data component carries out being accumulated by each data attribute corresponding respectively divides
The cumulative amount of amount.
Described screening module 3103, for by communication corresponding for described each data attribute
The cumulative amount of data component uses screening strategy set in advance to screen, and is deposited
Risk communication data in risk.
In the present embodiment, described screening module 3103 is additionally operable to according to described every number
Judge corresponding to described communication data according to the cumulative amount of communication data component corresponding to attribute
The use habit of user whether change, become in described user's use habit
During change, calculate the value-at-risk corresponding to communication data that described each data attribute is corresponding.
Described calculating and sending module 3104, for calculating described risk communication data
Value-at-risk, compares described value-at-risk with default risk threshold value, when described risk
When value is more than described default risk threshold value, send risk message to described communications platform.
In the present embodiment, described risk control device 310 can also include: storage
Module 3105 and training module 3106.Wherein, described memory module 3105 is for inciting somebody to action
Described value-at-risk exceedes the described risk communication data of described default risk threshold value and deposits
Storage.Described training module 3106, for carrying out the described risk communication data of storage
Training obtain new screening strategy, described new screening strategy is added to described in advance
In the screening strategy set.
In several embodiments provided herein, it should be understood that disclosed
Apparatus and method, it is also possible to realize by another way.Device described above
Embodiment is only that schematically such as, flow chart and block diagram in accompanying drawing show
The device of multiple embodiments according to the present invention, method and computer program product can
Architectural framework, function and the operation that can realize.In this, in flow chart or block diagram
Each square frame can represent a module, program segment or a part for code, described
A part for module, program segment or code comprises one or more for realizing regulation
The executable instruction of logic function.It should also be noted that at some as the realization replaced
In mode, the function that marked in square frame can also be marked in accompanying drawing to be different from
Order occurs.Such as, two continuous print square frames can essentially perform substantially in parallel,
They can also perform sometimes in the opposite order, and this is depending on involved function.
It is also noted that each square frame in block diagram and/or flow chart and block diagram and/
Or the combination of the square frame in flow chart, can be with performing the function of regulation or the special of action
Hardware based system realize, or can refer to computer with specialized hardware
The combination of order realizes.
It addition, each functional module in each embodiment of the present invention can be integrated in one
Rise and form an independent part, it is also possible to be modules individualism, it is also possible to
Two or more modules are integrated to form an independent part.
If described function realizes and as independent product using the form of software function module
When product are sold or use, can be stored in a computer read/write memory medium.
Based on such understanding, technical scheme is the most in other words to prior art
The part of the part contributed or this technical scheme can be with the form of software product
Embodying, this computer software product is stored in a storage medium, if including
Dry instruction with so that computer equipment (can be personal computer, server,
Or the network equipment etc.) perform the whole or portion of method described in each embodiment of the present invention
Step by step.And aforesaid storage medium includes: USB flash disk, portable hard drive, read-only storage
Device (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), magnetic disc or CD etc. are various can store program
The medium of code.It should be noted that in this article, such as the first and second grades it
The relational terms of class is used merely to an entity or operates and another entity or behaviour
Make a distinction, and not necessarily require or imply existence between these entities or operation
The relation of any this reality or order.And, term " includes ", " comprising " or
Its any other variant of person is intended to comprising of nonexcludability, so that include one
The process of list of elements, method, article or equipment not only include those key elements, and
And also include other key elements being not expressly set out, or also include for this process,
The key element that method, article or equipment are intrinsic.In the case of there is no more restriction,
The key element limited by statement " including ... ", it is not excluded that including described key element
Process, method, article or equipment in there is also other identical element.
The foregoing is only the preferred embodiments of the present invention, be not limited to this
Invention, for a person skilled in the art, the present invention can have various change and
Change.All within the spirit and principles in the present invention, any amendment of being made, equivalent
Replacement, improvement etc., should be included within the scope of the present invention.It should also be noted that
Similar label and letter in following accompanying drawing represent similar terms, therefore, once certain
One is defined in an accompanying drawing, then need not carry out it in accompanying drawing subsequently
Definition and explanation further.
The above, the only detailed description of the invention of the present invention, but the protection of the present invention
Scope is not limited thereto, and any those familiar with the art is in the present invention
In the technical scope disclosed, change can be readily occurred in or replace, all should contain at this
Within bright protection domain.Therefore, protection scope of the present invention should described be wanted with right
The protection domain asked is as the criterion.
Claims (10)
1. a risk control method, is applied to and the service of communications platform communication connection
Device, it is characterised in that described method includes:
Receive the communication data that described communications platform sends;
The communication data sent by described communications platform is according to default multiple different number
Carry out decomposing according to attribute and obtain the communication data component that each data attribute is corresponding, to often
The communication data component that individual data attribute is corresponding carries out being accumulated by each data respectively and belongs to
The cumulative amount of the communication data component that property is corresponding;
The cumulative amount of communication data component corresponding for described each data attribute is used pre-
The screening strategy first set screens, and obtains existing the risk communication data of risk;
And
Calculate the value-at-risk of described risk communication data, by described value-at-risk and default wind
Danger threshold value compares, and when described value-at-risk is more than described default risk threshold value, sends out
Air-supply danger message gives described communications platform.
2. risk control method as claimed in claim 1, it is characterised in that described
Method also includes:
Described value-at-risk is exceeded the described risk communication data of described default risk threshold value
Store;
It is trained obtaining new screening strategy to the described risk communication data of storage,
Described new screening strategy is added in described screening strategy set in advance.
3. risk control method as claimed in claim 2, it is characterised in that described
The described risk communication data of storage are trained obtaining the step of new screening strategy
Including:
According to the payment situation that the user that the described risk communication data stored are corresponding is follow-up
Judge the credit of this user, when payment promise breaking occurs in this user, by the institute of this storage
State risk communication data as the reference data of new screening strategy and for new sieve
Strategy is selected to be trained.
4. risk control method as claimed in claim 1 or 2, it is characterised in that
Described by pre-for the cumulative amount use of communication data component corresponding for described each data attribute
The step that the screening strategy first set carries out screening includes:
Cumulative amount according to communication data component corresponding to described each data attribute judges
Whether the use habit of the user corresponding to described communication data changes, described
When user's use habit changes, calculate the communication that described each data attribute is corresponding
Value-at-risk corresponding to data.
5. risk control method as claimed in claim 1, it is characterised in that described
The step of the value-at-risk calculating described risk communication data includes:
According to formula Y=k1a1+k2a2+k3a3+……+knanCalculate described risk communication
The value-at-risk of data, wherein k1、k2、k3... knIt is respectively the coefficient preset,
For representing the significance level of each data attribute above-mentioned, a1、a2、a3... anPoint
Not representing the variable of each data attribute, Y represents value-at-risk.
6. a risk control method, the communication being applied to communicate to connect each other is put down
Platform, user terminal and server, it is characterised in that described method includes:
Described server receives the communication data that described communications platform sends;
The communication data that described communications platform is sent by described server is according to default many
Individual different data attribute carries out decomposing and obtains the communication data that each data attribute is corresponding
Component, is accumulated by respectively to the communication data component that each data attribute is corresponding
The cumulative amount of the communication data component that each data attribute is corresponding;
Described server tiring out communication data component corresponding for described each data attribute
Metering uses screening strategy set in advance to screen, and obtains existing the risk of risk
Communication data;
Described server calculates the value-at-risk of described risk communication data, by described risk
Value compares with default risk threshold value, when described value-at-risk is more than described default risk
During threshold value, send risk message to described communications platform;And
Described communications platform controls the communication of described user terminal according to described risk message
State.
7. risk control method as claimed in claim 6, it is characterised in that: described
Communications platform controls the step of the communications status of described user terminal according to described risk message
In Zhou,
Described communications platform sends communication data indicating risk information to described user terminal;
Communication data indicating risk information described in described user terminal displays, receives institute
State the confirmation operation of communication data indicating risk information;
When described confirmation operation is triggered, described communications platform is by described user terminal
Communication disruption.
8. a risk control device, is applied to and the service of communications platform communication connection
Device, it is characterised in that described device includes:
Receiver module, for receiving the communication data that described communications platform sends;
Data are decomposed and accumulation module, for the communication number sent by described communications platform
Each data attribute is obtained according to carrying out decomposition according to default multiple different data attribute
Corresponding communication data component, divides the communication data component that each data attribute is corresponding
Do not carry out being accumulated by the cumulative amount of communication data component corresponding to each data attribute;
Screening module, for by communication data component corresponding for described each data attribute
Cumulative amount use screening strategy set in advance screen, obtain there is risk
Risk communication data;And
Calculate and sending module, for calculating the value-at-risk of described risk communication data,
Described value-at-risk is compared with default risk threshold value, when described value-at-risk is more than institute
When stating default risk threshold value, send risk message to described communications platform.
9. risk control device as claimed in claim 8, it is characterised in that described
Device also includes:
Memory module, for exceeding the institute of described default risk threshold value by described value-at-risk
State risk communication data to store;And
Training module, for being trained obtaining to the described risk communication data of storage
New screening strategy, adds described new screening strategy to described sieve set in advance
Select in strategy.
10. risk control device as claimed in claim 8 or 9, it is characterised in that:
The communication data that described screening module is additionally operable to according to described each data attribute is corresponding divides
The cumulative amount of amount judges whether the use habit of the user corresponding to described communication data is sent out
Changing, when described user's use habit changes, calculates described each data
The value-at-risk corresponding to communication data that attribute is corresponding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610152288.3A CN105844475A (en) | 2016-03-17 | 2016-03-17 | Risk control method and risk control apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610152288.3A CN105844475A (en) | 2016-03-17 | 2016-03-17 | Risk control method and risk control apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105844475A true CN105844475A (en) | 2016-08-10 |
Family
ID=56587228
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610152288.3A Pending CN105844475A (en) | 2016-03-17 | 2016-03-17 | Risk control method and risk control apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844475A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790560A (en) * | 2016-12-26 | 2017-05-31 | 北京五八信息技术有限公司 | A kind of risk control method and device of electronics notice information |
CN108805725A (en) * | 2018-05-28 | 2018-11-13 | 平安科技(深圳)有限公司 | Risk case confirmation method, server and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722814A (en) * | 2012-06-01 | 2012-10-10 | 汪德嘉 | Self-adaption controllable management system for cheat risk of online transaction |
CN104113626A (en) * | 2014-06-26 | 2014-10-22 | 北京奇虎科技有限公司 | Communication processing method and system |
CN104469025A (en) * | 2014-11-26 | 2015-03-25 | 杭州东信北邮信息技术有限公司 | Clustering-algorithm-based method and system for intercepting fraud phone in real time |
CN104965844A (en) * | 2014-12-29 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Information processing method and apparatus |
CN105243566A (en) * | 2015-10-28 | 2016-01-13 | 联动优势科技有限公司 | Method and apparatus for evaluating credit of users through different mobile phone number information from operators |
-
2016
- 2016-03-17 CN CN201610152288.3A patent/CN105844475A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722814A (en) * | 2012-06-01 | 2012-10-10 | 汪德嘉 | Self-adaption controllable management system for cheat risk of online transaction |
CN104113626A (en) * | 2014-06-26 | 2014-10-22 | 北京奇虎科技有限公司 | Communication processing method and system |
CN104469025A (en) * | 2014-11-26 | 2015-03-25 | 杭州东信北邮信息技术有限公司 | Clustering-algorithm-based method and system for intercepting fraud phone in real time |
CN104965844A (en) * | 2014-12-29 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Information processing method and apparatus |
CN105243566A (en) * | 2015-10-28 | 2016-01-13 | 联动优势科技有限公司 | Method and apparatus for evaluating credit of users through different mobile phone number information from operators |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790560A (en) * | 2016-12-26 | 2017-05-31 | 北京五八信息技术有限公司 | A kind of risk control method and device of electronics notice information |
CN106790560B (en) * | 2016-12-26 | 2020-12-15 | 北京五八信息技术有限公司 | Risk control method and device for electronic notice information |
CN108805725A (en) * | 2018-05-28 | 2018-11-13 | 平安科技(深圳)有限公司 | Risk case confirmation method, server and computer readable storage medium |
CN108805725B (en) * | 2018-05-28 | 2023-04-07 | 平安科技(深圳)有限公司 | Risk event confirmation method, server, and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Becker et al. | Fraud detection in telecommunications: History and lessons learned | |
US9774460B2 (en) | Determining usage predictions and detecting anomalous user activity through traffic patterns | |
US10686681B2 (en) | Systems and methods for measuring effective customer impact of network problems in real-time using streaming analytics | |
US10021251B2 (en) | Methods, systems, and products for monitoring service usage | |
Kou et al. | Survey of fraud detection techniques | |
CN102802133B (en) | Junk information identification method, device and system | |
EP1629617B1 (en) | Method and system for providing fraud detection for remote access services | |
US20120054136A1 (en) | System And Method For An Auto-Configurable Architecture For Managing Business Operations Favoring Optimizing Hardware Resources | |
EP2648145A1 (en) | System and method for filtering spam messages based on user reputation | |
CN104704524A (en) | Information disclosure system, information disclosure server, communication terminal, information disclosure method, and non-temporary computer-readable medium | |
US20110106579A1 (en) | System and Method of Management and Reduction of Subscriber Churn in Telecommunications Networks | |
US20060269050A1 (en) | Adaptive fraud management systems and methods for telecommunications | |
CN111917574A (en) | Social network topology model and construction method thereof, user confidence degree and intimacy degree calculation method and telecommunication fraud intelligent interception system | |
CN105844475A (en) | Risk control method and risk control apparatus | |
CN101198091A (en) | Method for control user arrearages | |
Tarmazakov et al. | Modern approaches to prevent fraud in mobile communications networks | |
KR20130083286A (en) | System for processing spam for mobile phone | |
Panigrahi et al. | Use of dempster-shafer theory and Bayesian inferencing for fraud detection in mobile communication networks | |
CN111752932B (en) | Client data processing system and method based on knowledge management | |
CN115037836A (en) | Terminal shutdown processing method and device and electronic equipment | |
Bisogni et al. | The European perspective of telecommunications as a critical infrastructure | |
Human et al. | Surprise fraudsters before they surprise you: A South African telecommunications case study | |
CA2625757A1 (en) | An intelligence system for the processing of electronic billing data | |
Mamčenko et al. | Data mining process for fraud detection in mobile communication | |
CN107707776A (en) | For intercepting the method and device of Inbound Calls |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160810 |