CN110390445A - The recognition methods of operational risk, device and system - Google Patents
The recognition methods of operational risk, device and system Download PDFInfo
- Publication number
- CN110390445A CN110390445A CN201810338694.8A CN201810338694A CN110390445A CN 110390445 A CN110390445 A CN 110390445A CN 201810338694 A CN201810338694 A CN 201810338694A CN 110390445 A CN110390445 A CN 110390445A
- Authority
- CN
- China
- Prior art keywords
- behavior
- preset kind
- user
- identification condition
- object run
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 89
- 230000006399 behavior Effects 0.000 claims description 616
- 230000002265 prevention Effects 0.000 claims description 56
- 230000015654 memory Effects 0.000 claims description 28
- 238000012550 audit Methods 0.000 claims description 23
- 238000012545 processing Methods 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 16
- 238000012512 characterization method Methods 0.000 claims 2
- 238000011217 control strategy Methods 0.000 description 19
- 239000000463 material Substances 0.000 description 15
- 230000000694 effects Effects 0.000 description 8
- 230000009467 reduction Effects 0.000 description 8
- 235000013399 edible fruits Nutrition 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 5
- 230000003993 interaction Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 241000207961 Sesamum Species 0.000 description 1
- 235000003434 Sesamum indicum Nutrition 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This application discloses a kind of recognition methods of operational risk, device and system.Wherein, this method comprises: obtaining the preset kind behavior of object run, wherein preset kind behavior is generated during performance objective operates for characterizing, and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;Preset kind behavior is identified according to default identification condition, obtains recognition result, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.Present application addresses the recognition methods accuracy of operational risk in the prior art is low, and operate the high technical problem of threshold.
Description
Technical field
This application involves service security fields, in particular to a kind of recognition methods of operational risk, device and are
System.
Background technique
Class product is paid afterwards for first enjoying, and after first giving certain on probation or on probation of user, is carrying out charging and charge.This
In a product type, there can be a big chunk user elder generation Evaluation product, after coming out to metering period bill, branch is not paid
With abandoning account, change account and change an identity and continue to use;This kind of user can make first to enjoy the operation cost for paying class product afterwards by
Very big threat can also generate the service of normal users and bother.Based on such risk, for the generation for the user that controls risk,
Various credit scoring products are proposed, for example, sesame credit or the letter control service with shield.
But the threshold of product is also improved while credit scoring prevention and control risk, the new user of most of internet is special
It is not the elderly, there are no many data in big data, cause credit scoring very low, possibly can not enjoys this kind of clothes
Business;In addition, credit scoring often takes a kind of data to score, the credit grade of entire people can not be completely portrayed.
Recognition methods accuracy for operational risk in the prior art is low, and operates the high problem of threshold, at present not yet
It puts forward effective solutions.
Summary of the invention
The embodiment of the present application provides a kind of recognition methods of operational risk, device and system, at least to solve existing skill
The recognition methods accuracy of operational risk is low in art, and operates the high technical problem of threshold.
According to the one aspect of the embodiment of the present application, a kind of recognition methods of operational risk is provided, comprising: obtain target
The preset kind behavior of operation, wherein preset kind behavior is generated and right during performance objective operates for characterizing
There is the behavior influenced in operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to default identification condition pair
Preset kind behavior is identified, recognition result is obtained, wherein recognition result, which is used to characterize during performance objective operates, is
It is no that there are operational risks.
According to the another aspect of the embodiment of the present application, a kind of recognition methods of operational risk is additionally provided, comprising: showing
Operation display interface in interface, wherein operation interface is interface corresponding to the preset kind behavior of object run, preset kind
Behavior is generated during performance objective operates for characterizing, and there is the behavior influenced to operational risk;Display identification
As a result, wherein recognition result is to be identified according to the corresponding default identification condition of preset kind behavior to preset kind behavior
It obtains, recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of identification device of operational risk is additionally provided, comprising: first obtains
Modulus block, for obtaining the preset kind behavior of object run, wherein preset kind behavior is used to characterize performance objective operation
Caused by the process, and there is the behavior influenced to operational risk;Second obtains module, for obtaining preset kind behavior pair
The default identification condition answered;Identification module is identified for being identified according to default identification condition to preset kind behavior
As a result, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of identification device of operational risk is additionally provided, comprising: first is aobvious
Show module, for the operation display interface in display interface, wherein operation interface is right for the preset kind behavior of object run
The interface answered, preset kind behavior is generated during performance objective operates for characterizing, and there are shadows to operational risk
Loud behavior;Second display module, for showing recognition result, wherein recognition result is corresponding according to preset kind behavior
Default identification condition is identified, recognition result is used to characterize the process of performance objective operation to preset kind behavior
In whether there is operational risk.
According to the another aspect of the embodiment of the present application, a kind of storage medium is additionally provided, storage medium includes the journey of storage
Sequence, wherein equipment where control storage medium executes following steps in program operation: obtaining the preset kind row of object run
For, wherein preset kind behavior is generated behavior during performance objective operation;It is corresponding to obtain preset kind behavior
Default identification condition;Preset kind behavior is identified according to default identification condition, obtains recognition result, wherein identification knot
Fruit is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of processor is additionally provided, processor is used to run program,
In, program executes following steps when running: obtaining the preset kind behavior of object run, wherein preset kind behavior is to execute
Generated behavior during object run;Obtain the corresponding default identification condition of preset kind behavior;According to default identification
Condition identifies preset kind behavior, obtains recognition result, wherein recognition result is used to characterize the mistake of performance objective operation
It whether there is operational risk in journey.
According to the another aspect of the embodiment of the present application, a kind of identifying system of operational risk is additionally provided, comprising: processing
Device;And memory, it is connect with processor, for providing the instruction for handling following processing step for processor: obtaining target behaviour
The preset kind behavior of work, wherein preset kind behavior is generated behavior during performance objective operation;It obtains default
The corresponding default identification condition of type behavior;Preset kind behavior is identified according to default identification condition, obtains identification knot
Fruit, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of recognition methods of operational risk is additionally provided, comprising: obtain mesh
Mark the preset kind behavior of operation, wherein object run is the operation carried out when executing transaction business, and preset kind behavior is used for
Caused by characterizing during performance objective operation, and there is the behavior influenced to operational risk;Obtain preset kind behavior
Corresponding default identification condition, wherein default identification condition is used to determine risk prevention system strategy when transaction business operation;According to
Risk prevention system strategy identifies preset kind behavior, whether there is operational risk during determining transaction business operation.
In the embodiment of the present application, after getting the preset kind behavior of object run, available preset kind
The corresponding default identification condition of behavior, and preset kind behavior is identified by default identification condition, it whether there is
The recognition result of operational risk, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
As a result, scheme provided by the present application solve operational risk in the prior art recognition methods accuracy it is low, and grasp
Make the high technical problem of threshold.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 be according to the terminal of recognition methods for realizing operational risk of the embodiment of the present application a kind of (or
Mobile device) hardware block diagram;
Fig. 2 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 1;
Fig. 3 is the flow chart according to a kind of recognition methods of optional operational risk of the embodiment of the present application;
Fig. 4 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 2;
Fig. 5 is the schematic diagram according to a kind of identification device of operational risk of the embodiment of the present application 3;
Fig. 6 is the schematic diagram according to a kind of identification device of operational risk of the embodiment of the present application 4;
Fig. 7 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 6;And
Fig. 8 is the structural block diagram according to a kind of terminal of the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to
Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product
Or other step or units that equipment is intrinsic.
Firstly, the part noun or term that occur during the embodiment of the present application is described are suitable for following solution
It releases:
It first enjoys and paying afterwards: can be and first go out bill gathering using product or service, then charging.
Credit scoring: can be and obtain the credit score based on a user based on various algorithm models, according to different letters
It is given user with giving and is first enjoyed the product amount paid afterwards.
Risk identification behavior sequence: it can be and path, the abstract critical path that can be controlled risk, group are used based on user
It is sequence at risk identifying rows.
Fund bad debt risk: it can be first to enjoy and pay the corresponding fund that can not withdraw after the charging of class product afterwards, form product
Bad credit.
Embodiment 1
According to the embodiment of the present application, a kind of embodiment of the recognition methods of operational risk is provided, it should be noted that In
The step of process of attached drawing illustrates can execute in a computer system such as a set of computer executable instructions, also,
It, in some cases, can be to be different from shown in sequence execution herein although logical order is shown in flow charts
The step of out or describing.
Embodiment of the method provided by the embodiment of the present application one can be in mobile terminal, terminal or similar fortune
It calculates and is executed in device.Fig. 1 shows a kind of terminal (or mobile device) of recognition methods for realizing operational risk
Hardware block diagram.As shown in Figure 1, terminal 10 (or mobile device 10) may include one or more (adopts in figure
With 102a, 102b ... ..., 102n is shown) processor 102 (processor 102 can include but is not limited to Micro-processor MCV or
The processing unit of programmable logic device FPGA etc.), memory 104 for storing data and the biography for communication function
Defeated device 106.It in addition to this, can also include: display, input/output interface (I/O interface), universal serial bus (USB)
Port (a port that can be used as in the port of I/O interface is included), network interface, power supply and/or camera.This field is general
Logical technical staff is appreciated that structure shown in FIG. 1 is only to illustrate, and does not cause to limit to the structure of above-mentioned electronic device.
For example, terminal 10 may also include the more perhaps less component than shown in Fig. 1 or have different from shown in Fig. 1
Configuration.
It is to be noted that said one or multiple processors 102 and/or other data processing circuits lead to herein
Can often " data processing circuit " be referred to as.The data processing circuit all or part of can be presented as software, hardware, firmware
Or any other combination.In addition, data processing circuit for single independent processing module or all or part of can be integrated to meter
In any one in other elements in calculation machine terminal 10 (or mobile device).As involved in the embodiment of the present application,
The data processing circuit controls (such as the selection for the variable resistance end path connecting with interface) as a kind of processor.
Memory 104 can be used for storing the software program and module of application software, such as the operation in the embodiment of the present application
Corresponding program instruction/the data storage device of the recognition methods of risk, processor 102 are stored in memory 104 by operation
Software program and module realize the knowledge of above-mentioned operational risk thereby executing various function application and data processing
Other method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise
The memory remotely located relative to processor 102, these remote memories can pass through network connection to terminal 10.
The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include
The wireless network that the communication providers of terminal 10 provide.In an example, transmitting device 106 includes that a network is suitable
Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to
Internet is communicated.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module,
For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), the liquid crystal display aloow user with
The user interface of terminal 10 (or mobile device) interacts.
Herein it should be noted that in some embodiments, above-mentioned computer equipment (or mobile device) shown in FIG. 1 has
There is touch display (also referred to as " touch screen " or " touch display screen ").In some embodiments, above-mentioned calculating shown in FIG. 1
Machine equipment (or mobile device) has graphical user interface (GUI), and user can be contacted by the finger touched on touch sensitive surface
And/or gesture to carry out human-computer interaction with GUI, human-computer interaction function herein optionally includes following interaction: creation webpage is drawn
Figure word processing, production electronic document, game, video conference, instant messaging, sends and receive e-mail, call interface, plays number
Word video, playback digital music and/or web browsing etc. are matched for executing the executable instruction of above-mentioned human-computer interaction function
It sets/is stored in one or more processors executable computer program product or readable storage medium storing program for executing.
Under above-mentioned running environment, this application provides the recognition methods of operational risk as shown in Figure 2.Fig. 2 is basis
A kind of flow chart of the recognition methods of the operational risk of the embodiment of the present application 1.As shown in Fig. 2, this method may include walking as follows
It is rapid:
Step S22 obtains the preset kind behavior of object run, wherein preset kind behavior is for characterizing performance objective
Caused by during operation, and there is the behavior influenced to operational risk.
Specifically, above-mentioned object run can be first to enjoy pays class business corresponding operation afterwards, first enjoy pay class business afterwards can
To include first enjoying paying class products & services afterwards, above-mentioned operational risk can be the fund bad credit wind first enjoyed and paid in class business afterwards
Danger, can cause very big threat to the operation cost for paying class business afterwards is first enjoyed.
Class business is paid afterwards for first enjoying, user needs logon account, and it selects the product being desirable for or service and places an order, quotient
Corresponding product is sent to user or provides a user corresponding service by family, is used the product by the user or is serviced, works as billing period
When arrival, an order can be generated from the background, and user can pay according to the order of generation, complete the charging of product or service
It withholds.For example, user can select first to enjoy the iPhone8 mobile phone for paying class afterwards on electric business platform, user's logon account is being determined
Later, it can complete to place an order, user can be used 10 days (that is, metering period is 10 days) after receiving iPhone8 mobile phone,
User needs to complete the payment of corresponding fund in 10 days.
From the foregoing, it will be observed that user needs to carry out multi-pass operation, and then generate more during enjoyment first enjoys and pays class business afterwards
Kind operation behavior, that is, object run can generate a variety of operation behaviors in the process of implementation, and some of them are related to account peace
Entirely, the behavior for the items such as order is submitted and payment is withholdd, causes shadow to the fund bad debt risk for paying class business afterwards is entirely first enjoyed
It rings, if user carries out illegal operation in certain operating process, for example, user's not payment, then will lead to first to enjoy and pay afterwards
There is fund bad debt risk in class business, that is, leading to object run, there are operational risks.Therefore, operational risk will can be deposited
It is determined as preset kind behavior in the behavior of influence, and by carrying out discriminance analysis to preset kind behavior, to obtain entire
The recognition result of object run.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior,
Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards,
The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes
For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset
Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make
It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment
Behavior).
Step S24 obtains the corresponding default identification condition of preset kind behavior.
Specifically, above-mentioned default identification condition can be in advance as the different risks of different preset kind behaviors deployment
Prevention and control strategy system, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, off-line strategy body
System, wherein intercepting strategy system in advance can be before user begins to use product or service, intercept to illegal act
Strategy, thus by the strategy may determine that user execute behavior whether be illegal act, need to intercept;Wholesale is bright in advance
Bottom strategy system can be before user begins to use product or service, the plan confirmed to the wholesale ability to pay of user
Slightly, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system, which can be, judges user
It is whether offline, that is, the strategy of client can not be related to, used to may determine that whether user is sincere by the strategy.
Step S26 identifies preset kind behavior according to default identification condition, obtains recognition result, wherein identification
As a result for characterizing during performance objective operates with the presence or absence of operational risk.
Specifically, if corresponding prevention and control strategy system is hit in the preset kind behavior of user, for example, user carries out illegally
Registration, then can determine that the credit grade of user is lower, has the operational risk for not paying expense, may thereby determine that after first enjoying
Paying class business, there are fund bad debt risks, that is, determining object run, there are operational risks;If the preset kind behavior of user
The corresponding prevention and control strategy system of miss can then determine that the credit grade of user is higher, and there is no the operations for not paying expense
Risk may thereby determine that first to enjoy and pay class business afterwards there is no fund bad debt risk, that is, determining object run, there is no operations
Risk.
It, can be to the operation of user during user's enjoyment first enjoys and pays class business afterwards in a kind of optional scheme
Behavior is monitored in real time, can be according to corresponding prevention and control when the behavior for detecting that user executes belongs to preset kind behavior
Strategy system identifies the behavior of user, to judge the credit grade of user, further determines that first to enjoy and pays class business afterwards
With the presence or absence of fund bad debt risk, a closed loop prevention and control system is formed, the development of business is more bonded.
Fig. 3 be according to a kind of flow chart of the recognition methods of optional operational risk of the embodiment of the present application, below with reference to
Fig. 3 is described in detail a kind of preferred embodiment of the application for first enjoying the business scenario for paying class business afterwards.Such as Fig. 3 institute
Show, can determine that preset kind behavior includes: user's registration, user logs in, user is on probation or use, user's use in (in figure
It is not shown), user's payment is withholdd, wherein user's registration, user log in and user is on probation or there are two types of prevention and control strategies using corresponding to
System is to intercept strategy system in advance and wholesale is put one's cards on the table strategy system in advance respectively;All preset kind behaviors are corresponding with offline
Strategy system.After detecting the preset kind behavior of user, need to judge preset kind behavior, and get
Corresponding prevention and control strategy system, and preset kind behavior is identified by prevention and control strategy system, by all default classes
Type behavior identified, available final recognition result.
Scheme provided by the above embodiments of the present application 1 can be with after getting the preset kind behavior of object run
The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition,
The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 1 provided by the present application solves the recognition methods of operational risk in the prior art as a result,
Accuracy is low, and operates the high technical problem of threshold.
In the above embodiments of the present application, in the case where preset kind behavior includes: registration behavior, step S24 is obtained pre-
If the corresponding default identification condition of type behavior, comprising:
Whether step S2412 judges the behavior of registering as illegal registration behavior.
Specifically, above-mentioned illegal registration behavior can refer to malicious registration behavior, for example, user uses same IP address
In the interior multiple accounts of registration on the same day, by judging whether the user of current register account number carries out malicious registration, it can be determined that should
Whether user registers a large amount of accounts, if it is determined that a large amount of accounts of the user's registration can then determine that the user first enjoys in the presence of enjoyment
After pay class business, but do not pay the operational risk of expense.
Step S2414 obtains the first identification condition, obtains default identification if registration behavior is illegal registration behavior
Condition.
Specifically, the first above-mentioned identification condition can be the prevention and control strategy system being arranged in advance for illegal registration behavior,
For example, it may be intercepting strategy system in advance.
In a kind of optional scheme, judging that user's registration belongs to illegal registration, for example, user is using same IP
Location can determine that the credit grade of user is lower, there are bad credit record, users after the interior multiple accounts of registration on the same day
Enjoyment is first enjoyed pays class business there are fund bad debt risk afterwards, that is, object run there are operational risk, needs further to obtain in advance
The strategy system of interception in advance first disposed identifies user's registration.
Step S2416 continues to execute object run if registration behavior is not illegal registration behavior.
In a kind of optional scheme, after judging that user's registration belongs to lawful registration, the letter of user can be determined
With higher ranked, it being not present bad credit record, user enjoys first to enjoy and pays class business afterwards fund bad debt risk is not present, that is,
Operational risk is not present in current object run, then can continue to execute subsequent operation.
For example, as shown in figure 3, user can carry out Account Registration in register interface, in the row for detecting user's registration
Later, to first determine whether user carries out malicious registration, if it is judged that user carries out malicious registration, then available correspondence
Interception strategy system in advance, and by advance intercept strategy system the behavior of user's registration is identified;If it is judged that
User does not carry out malicious registration, then user can be logged on login interface by the account and password registered.
In the above embodiments of the present application, in the case where preset kind behavior includes: login behavior, step S24 is obtained pre-
If the corresponding default identification condition of type behavior, comprising:
Step S2422 judges login behavior with the presence or absence of batch operation risk.
Specifically, above-mentioned batch operation risk can refer to that user carries out batch register, by judging that user is
No progress batch register, it can be determined that whether the user currently logged in possesses a large amount of accounts, if it is determined that the user possesses
A large amount of accounts can then determine that the user first enjoys the operational risk paid class business afterwards, but do not pay expense in the presence of enjoyment.
Step S2424 obtains the first identification condition, obtains default knowledge if there are batch operation risks for the behavior of login
Other condition.
In a kind of optional scheme, judging user's login, there are batch operation risks, for example, user logs in simultaneously
After multiple accounts, it can determine that the credit grade of user is lower, there are bad credit record, user enjoys first to enjoy pays class industry afterwards
There are fund bad debt risks for business, that is, object run there are operational risk, needs further to obtain the interception in advance disposed in advance
Strategy system identifies user's registration.
Step S2426 continues to execute object run if batch operation risk is not present in the behavior of login.
In a kind of optional scheme, after judging that batch operation risk is not present in user's login, use can be determined
The credit grade at family is higher, be not present bad credit record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk,
That is, operational risk is not present in current object run, then subsequent operation can be continued to execute.
For example, as shown in figure 3, user can pass through the account of registration on login interface after user completes to log in
It is logged in password, after detecting the behavior that user logs in, first determines whether user has batch operation risk, if
Judge that user has batch operation risk, then it is available it is corresponding intercept strategy system in advance, and by intercepting strategy in advance
The behavior that system logs in user identifies;If it is judged that user does not have batch operation risk, then user can be in business
Class product or service are paid in first enjoying for selecting to need to try out or use in selection interface afterwards.
In the above embodiments of the present application, in the case where preset kind behavior includes: order behavior, step S24 is obtained pre-
If the corresponding default identification condition of type behavior, comprising:
Step S2432 obtains the target object for executing order behavior.
Specifically, above-mentioned target object can be the user for having registered login, which needs on probation or use first
Class product or service are paid after enjoying, and product or service have been chosen on service selection interface.
Step S2434 matches target object with white list.
Specifically, above-mentioned white list can be the pre- big data that first passes through and be analyzed to obtain to user's history operation behavior
White list, for the user in white list in first enjoying the operating process for paying class business afterwards before, credit grade is higher, and there is no not
Good credit record, that is, operational risk is not present in the object run that the user in white list executes, by that current will try out or make
It is matched with the user for paying class business afterwards is first enjoyed with white list, it can be determined that whether the user is user in white list, such as
Fruit determines the user not and is the user in white list, it is determined that the user pays class business in the presence of enjoying first to enjoy afterwards, but not branch payment
Operational risk.
Step S2436, if target object is with white list, it fails to match, obtains the first identification condition, obtains default knowledge
Other condition.
In a kind of optional scheme, is judging on probation or matched using the user for paying class business afterwards is first enjoyed with white list
After failure, the credit grade before can determining user is lower, and there are bad credit record, user enjoys first to enjoy pays class industry afterwards
Business there are fund bad debt risk, need further exist for obtaining the strategy system of interception in advance disposed in advance is on probation to user or use into
Row identification.
Step S2438 obtains the second identification condition, obtains default knowledge if target object and white list successful match
Other condition.
Specifically, the second above-mentioned identification condition can be determining user after white list, tries out or uses with user
Corresponding prevention and control strategy system, for example, it may be wholesale is put one's cards on the table strategy system in advance.
It should be noted that bad letter is not present since the user in white list is that credit grade is higher in historical operation
With the user of record, fund bad debt risk is not present in order to ensure user this time operates, needs strategy of putting one's cards on the table by wholesale in advance
System is on probation to user or use identifies.
In a kind of optional scheme, judge it is on probation or using first enjoying the user for paying class afterwards and white list successful match
Later, the level of signal before can determining user is higher, and bad credit record is not present, and user enjoys first to enjoy pays class business afterwards
There is no fund bad debt risk, it is on probation to user or make to need further exist for obtaining the wholesale in advance disposed in advance strategy system of putting one's cards on the table
With being identified.
For example, as shown in figure 3, user log in after, user can select on service selection interface need try out or
Class product or service are paid in first enjoying for using afterwards, after the behavior for detecting that user is on probation or using, whether first determine whether user
White list user, if it is judged that user is not white list user, then it is available it is corresponding intercept strategy system in advance, and
The behavior that user is on probation or uses is identified by intercepting strategy system in advance;If it is judged that user fails, name is applied alone
Family, then available corresponding wholesale in advance is put one's cards on the table strategy system, and on probation to user by the strategy system of putting one's cards on the table of wholesale in advance
Or the behavior used is identified.
In the above embodiments of the present application, step S26 identifies preset kind behavior according to default identification condition, obtains
To recognition result, comprising:
Step S2612, judges whether preset kind behavior meets default identification condition.
Step S2614, if preset kind behavior is unsatisfactory for default identification condition, obtaining recognition result is that there is no behaviour
Make risk, and starts to execute usage behavior.
Step S2616 obtains recognition result if preset kind behavior meets default identification condition to there is operation wind
Danger.
In a kind of optional scheme, for user's registration, the behavior that user logs in and user tries out or uses, above-mentioned row
To be the behavior paid before class business begins to use after formerly enjoying, different behaviors are corresponding with different prevention and control strategy systems, when need
When being identified with corresponding prevention and control strategy system, it can be determined that whether behavior hits corresponding prevention and control strategy system, if
Hit, then can determine that the credit grade of user is lower, and there are bad credit record, user enjoys first to enjoy pays the presence of class business afterwards
Fund bad debt risk needs further to carry out identification judgement by manually trial;If miss, the letter of user can be determined
With higher ranked, it is not present bad credit record, user enjoys first to enjoy and pays class business afterwards fund bad debt risk is not present, then can be with
Start to execute usage behavior.
It should be noted that due to the behavior that user successively registers, logs in and tries out or uses, when determining that user infuses
Volume miss intercepts strategy system in advance when, then the behavior of user's login can be continued to execute;When determine user log in miss
When intercepting strategy system in advance, then the behavior that user is on probation or uses can be continued to execute;When determining that user is on probation or using not
Hit intercepts strategy system in advance when, then it can start first to enjoy the use for paying class business afterwards operation, that is, starting in user's use
Behavior.
For example, as shown in figure 3, when determining needing that user's registration, user are logged in or used by intercepting strategy system in advance
When the behavior that family is tried out or used is identified, it can be determined that user's registration, the behavior that user logs in or user tries out or uses
Whether hit and intercept strategy system in advance, if hit, need further to log in user's registration, user or user it is on probation or
The behavior used is identified;If miss, first enjoys and pay the use of class business afterwards and can start.When needs pass through wholesale in advance
When strategy system of putting one's cards on the table is on probation to user or use identifies, it can be determined that whether the behavior that user tries out or uses hits thing
Preceding wholesale is put one's cards on the table strategy system, if hit, needs further to identify the behavior that user is on probation or uses;If not
Hit then first enjoys and pays the use of class business afterwards and can start.
In the above embodiments of the present application, in step S2616, obtaining recognition result is this method there are after operational risk
Further include following steps:
Step S28 audits preset kind behavior, obtains the first auditing result.
In a kind of optional scheme, if user's registration, the behavior hit thing that user logs in or user tries out or uses
Preceding interception strategy system or user be on probation or the behavior hit that uses wholesale is put one's cards on the table strategy system in advance, then can be by artificial
The behavior that the mode of trial logs in user's registration, user or user is on probation or uses is audited, and judges the credit etc. of user
Grade, and whether there is bad credit record, so that judge that user enjoys first to enjoy pays class business with the presence or absence of fund bad credit afterwards
Risk.
It is corresponding to judge whether there is preset kind behavior if the first auditing result is that the audit fails by step S210
Query information.
Specifically, above-mentioned query information refers to whether user seeks advice from.
In a kind of optional scheme, it can further judge whether user consults if artificial trial does not pass through
It askes.
Step S212, if it is determined that there are query informations, then judge whether to need to obtain the corresponding letter of preset kind behavior
Breath.
Specifically, the above-mentioned corresponding information of preset kind behavior can be user's materials to be submitted.
In a kind of optional scheme, if user carried out consulting, it can further judge whether user needs to mention
Hand over material.
Step S214, if it is determined that need to obtain the corresponding information of preset kind behavior, then obtain preset kind behavior pair
The information answered, and the corresponding information of preset kind behavior is audited, obtain the second auditing result.
In a kind of optional scheme, if it is determined that user needs to submit material, then can further submit to user
Material is audited.
Step S216, if the first auditing result or the second auditing result are that audit passes through, return re-executes acquisition
The step of order behavior corresponding default identification condition.
It, can be with if the material audit that artificial trial passes through or user submits passes through in a kind of optional scheme
The corresponding prevention and control strategy system of behavior that user is on probation or uses is obtained, that is, judging whether user is white list user, specifically
Judgment method such as foregoing description, this will not be repeated here.
Step S218, if it is determined that query information is not present, does not need to obtain the corresponding information of preset kind behavior or the
Two auditing results are that the audit fails, then start to execute usage behavior.
In a kind of optional scheme, if user does not seek advice from perhaps user and does not need to submit material or user
The material of submission does not pass through audit, then can determine that the credit grade of user is higher, and bad credit record is not present, and user enjoys
It first enjoys and pays class business afterwards there is no fund bad debt risk, then can start to execute usage behavior.
It should be noted that due to the behavior that user successively registers, logs in and tries out or uses, for user's registration
Behavior, if user do not seek advice from the material that perhaps user does not need that material or user is submitted to submit do not pass through it is careful
Core can then continue to execute the behavior of user's login;For the behavior that user logs in, if user does not seek advice from, Huo Zheyong
The material that family does not need that material or user is submitted to submit does not pass through audit, then can continue to execute what user tried out or used
Behavior;For the behavior that user is on probation or uses, if user do not seek advice from perhaps user do not need to submit material or
The material that user submits does not pass through audit, then can start first to enjoy the use for paying class business afterwards operation, use that is, starting user
In behavior.
For example, as shown in figure 3, the behavior hit in user intercepts strategy system in advance or wholesale is put one's cards on the table strategy system in advance
Later, it needs manually to be tried, and judges whether to pass through, if passed through, judge whether user is white list user, if
Do not pass through, then continue to judge whether user seeks advice from, if do not seeked advice from, first enjoy and pay the use of class business afterwards and can start, if consulted
It askes, then further determines whether to need to submit material, can start if it is not required, then first enjoying and paying the use of class business afterwards, if
It needs, then whether further judgement material is audited and passed through, if passed through, judges whether user is white list user, if not
Pass through, then first enjoys and pay the use of class business afterwards and can start.As shown in figure 3, user's registration, user are logged in and user it is on probation or
It three behaviors such as uses, forms a closed loop prevention and control system, be more bonded the development of business.
In the above embodiments of the present application, step S24 obtains the corresponding default identification condition of preset kind behavior, comprising:
Step S2442 obtains third and identifies condition, obtains default identification condition.
Specifically, above-mentioned third identification condition, which can be, observes user's totality behavior, pre-set prevention and control
Strategy system, for example, it may be off-line strategy system.
In a kind of optional scheme, during user operates, can preset kind behavior to user into
Row totality behavior observation, obtains off-line strategy system, and know to the preset kind behavior of user by off-line strategy system
Not.
Step S26 identifies preset kind behavior according to default identification condition, obtains recognition result, comprising:
Step S2622, judges whether preset kind behavior meets third identification condition.
S2624, if it is determined that preset kind behavior is unsatisfactory for third identification condition, then obtaining recognition result is that there is no behaviour
Make risk, and continues to execute object run.
S2626, if it is determined that preset kind behavior meets third identification condition, then obtains recognition result to there is operation wind
Danger.
In a kind of optional scheme, when needing to identify to the preset kind behavior of user by off-line strategy system
When, it can be determined that whether preset kind behavior hits off-line strategy system, if miss, can determine the credit etc. of user
Grade it is higher, be not present bad credit record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk, then can be with user
It can be used normally first to enjoy and pay class business afterwards;If miss, it can determine that the credit grade of user is lower, there are bad letters
With record, user enjoys first to enjoy pays class business there are fund bad debt risk afterwards, needs further to know preset kind behavior
Do not judge.
For example, as shown in figure 3, can carry out overall behavior to the behavior of user after user starts to operate and see
It examines, and judges whether the behavior of user hits strategy system, if miss, user be can be used normally;If hit,
It needs further to judge whether product has malicious act.
In the above embodiments of the present application, in step S2614 or step S218, starts to execute usage behavior or S2626, determine
After preset kind behavior meets third identification condition, this method further includes following steps:
Step S222, judges whether usage behavior belongs to malicious act.
Specifically, above-mentioned malicious act can refer to that user illegally uses product or service, for example, user is not deliberately true
Recognize to receive first to enjoy and pays class product afterwards.The use of class business is paid after formerly enjoying to start, or by overall behavior observation, judges user
Behavior miss off-line strategy system after, by judging in user's use with the presence or absence of malicious act, it can be determined that current
User first enjoys the operational risk paid class business afterwards, but do not pay expense with the presence or absence of enjoyment.
Step S224, if it is determined that usage behavior belongs to malicious act, then is immediately performed order and generates behavior and paying bank
For.
In a kind of optional scheme, there are in the case where malicious act in determining user's use, user can be determined
Credit grade it is lower, there are bad credit record, user enjoys first to enjoy and pays class business afterwards there are fund bad debt risks, in order to keep away
Exempt from fund bad debt risk, charging can be shifted to an earlier date, generate corresponding order, and reminds that user pays the bill namely user holds in advance
Row order generates and delivery operation.
Step S226, if it is determined that usage behavior is not belonging to malicious act, then execution of order generates behavior after preset time
And payment behavior.
Specifically, above-mentioned preset time can be first enjoying and paying class business corresponding metering period afterwards for user's selection.
In a kind of optional scheme, in the case where malicious act is not present in determining user's use, use can be determined
The credit grade at family is higher, be not present bad credit record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk,
Then user can be used normally, and can produce corresponding order when metering period reaches, and user is reminded to pay the bill,
That is, user's execution of order after metering period arrival generates and delivery operation.
For example, as shown in figure 3, sentencing after a pair class business use can start after formerly enjoying, and after overall behavior observation
It is disconnected to go out to hit off-line strategy system, then it may determine that product using whether having malicious act, if so, then shifting to an earlier date charging, is gone forward side by side
Row is withholdd;If it is not, metering period expense generates, and withhold.
In the above embodiments of the present application, in step S224 or step S226, after executing payment behavior, this method further includes
Following steps:
Step S228, judges whether payment behavior runs succeeded.
Step S230, if it is determined that payment behavior runs succeeded, then continues to execute object run, and performance objective is operated
Target object typing white list.
Step S232, if it is determined that payment behavior executes failure, then stops performance objective operation, and by target object typing
Blacklist.
In a kind of optional scheme, after detecting that charging is withholdd, it can be determined that it withholds and whether succeeds, if at
Function, it is determined that user has paid corresponding expense, then can determine that the credit grade of user is higher, and there is no bad credits to remember
Record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk, further, user can be used normally first to enjoy and pay afterwards
Class business, and white list is added in user;If it fails, then determining that user does not pay corresponding expense, can determine user
Credit grade it is lower, there are bad credit record, user enjoys first to enjoy and pays class business afterwards there are fund bad debt risks, further
Ground terminates user using first enjoying and pays class business afterwards, and blacklist is added in user.
For example, as shown in figure 3, after being withholdd, it can be determined that withhold and whether succeed, used if it succeeds, determining
Family has paid corresponding expense, so that it is determined that user can be used normally and record white list;If it fails, then determining user not
Corresponding expense is paid, uses so that it is determined that user terminates and records blacklist.
Through the above scheme, it is fought by the preset kind behavior higher slice prevention and control used in user, rather than being directed to is
No can be used carrys out prevention and control, is the layering closed loop prevention and control principle of more architecture, the development of business is more bonded, so that realizing will provide
Golden bad debt risk is controlled to minimum.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because
According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application
It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much
In the case of the former be more preferably embodiment.Based on this understanding, the technical solution of the application is substantially in other words to existing
The part that technology contributes can be embodied in the form of software products, which is stored in a storage
In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate
Machine, server or network equipment etc.) execute method described in each embodiment of the application.
Embodiment 2
According to the embodiment of the present application, a kind of embodiment of the recognition methods of operational risk is additionally provided, it should be noted that
Step shown in the flowchart of the accompanying drawings can execute in a computer system such as a set of computer executable instructions, and
It, in some cases, can be to be different from sequence execution institute herein and although logical order is shown in flow charts
The step of showing or describing.
Fig. 4 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 2.As shown in figure 4, the party
Method may include steps of:
Step S42 shows in display interface and executes interface, wherein operation interface is the preset kind row of object run
For corresponding interface, preset kind behavior is generated during performance objective operates for characterizing, and to operational risk
There are the behaviors of influence.
Specifically, above-mentioned display interface can be display circle on the display screen of mobile terminal or terminal
Face, mobile terminal may include: smart phone (including Android phone and IOS mobile phone), IPAD, tablet computer, palm PC
Etc. equipment, but be not limited only to this, the application is not especially limited this;Above-mentioned operation interface can be user and execute default class
The interface of type behavior, for example, user carries out the register interface of account registration, user carries out the login interface etc. of account login, leads to
It crosses the operation for executing user in operation interface to detect, can detecte the preset kind behavior of user;Above-mentioned target
Operation can be first to enjoy pays class business corresponding operation afterwards, and first enjoying and paying class business afterwards may include first enjoying paying class product kimonos afterwards
Business, above-mentioned operational risk can be the fund bad debt risk first enjoyed and paid in class business afterwards, can be to first enjoying the fortune for paying class business afterwards
Battalion's cost causes very big threat.
Class business is paid afterwards for first enjoying, user needs logon account, and it selects the product being desirable for or service and places an order, quotient
Corresponding product is sent to user or provides a user corresponding service by family, is used the product by the user or is serviced, works as billing period
When arrival, an order can be generated from the background, and user can pay according to the order of generation, complete the charging of product or service
It withholds.For example, user can select first to enjoy the iPhone8 mobile phone for paying class afterwards on electric business platform, user's logon account is being determined
Later, it can complete to place an order, user can be used 10 days (that is, metering period is 10 days) after receiving iPhone8 mobile phone,
User needs to complete the payment of corresponding fund in 10 days.
From the foregoing, it will be observed that user needs to carry out multi-pass operation, and then generate more during enjoyment first enjoys and pays class business afterwards
Kind operation behavior, that is, object run can generate a variety of operation behaviors in the process of implementation, and some of them are related to account peace
Entirely, the behavior for the items such as order is submitted and payment is withholdd, causes shadow to the fund bad debt risk for paying class business afterwards is entirely first enjoyed
It rings, if user carries out illegal operation in certain operating process, for example, user's not payment, then will lead to first to enjoy and pay afterwards
There is fund bad debt risk in class business, that is, leading to object run, there are operational risks.Therefore, operational risk will can be deposited
It is determined as preset kind behavior in the behavior of influence, and by carrying out discriminance analysis to preset kind behavior, to obtain entire
The recognition result of object run.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior,
Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards,
The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes
For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset
Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make
It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment
Behavior).
It should be noted that user needs to carry out multi-pass operation, grasp every time during enjoyment first enjoys and pays class business afterwards
It requires to carry out in corresponding operation interface, by detecting user's operation, so that it is determined that the behavior that user is current
It whether is preset kind behavior.
Step S44 shows recognition result, wherein recognition result is according to the corresponding default identification item of preset kind behavior
Part is identified that recognition result whether there is for characterizing during performance objective operates to preset kind behavior
Operational risk.
Specifically, above-mentioned default identification condition can be in advance for different preset kind behaviors dispose in advance it is different
Risk prevention system strategy system, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, off-line strategy
System, wherein intercepting strategy system in advance can be before user begins to use product or service, block to illegal act
Whether the strategy cut needs to intercept to be illegal act by the behavior that the strategy may determine that user executes;Wholesale in advance
Strategy system of putting one's cards on the table can be before user begins to use product or service, be confirmed to the wholesale ability to pay of user
Strategy, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system can be judgement and use
Whether family is offline, that is, the strategy of client can not be related to, uses to may determine that whether user is sincere by the strategy.
If the preset kind behavior of user is hit corresponding prevention and control strategy system and can then be determined for example, user is illegally registered
The credit grade of user is lower, there is the operational risk for not paying expense, may thereby determine that first to enjoy and pays class business afterwards in the presence of money
Golden bad debt risk, that is, determining object run, there are operational risks;If the preset kind behavior miss of user is corresponding anti-
Strategy system is controlled, then can determine that the credit grade of user is higher, there is no the operational risks for not paying expense, so as to true
Fixed first enjoy pays class business afterwards there is no fund bad debt risk, that is, determining that operational risk is not present in object run.
It, can be to the operation of user during user's enjoyment first enjoys and pays class business afterwards in a kind of optional scheme
Behavior is monitored in real time, can be according to corresponding prevention and control when the behavior for detecting that user executes belongs to preset kind behavior
Strategy system identifies the behavior of user, to judge the credit grade of user, further determines that first to enjoy and pays class business afterwards
With the presence or absence of fund bad debt risk, a closed loop prevention and control system is formed, the development of business is more bonded.
As shown in figure 3, can determine that preset kind behavior includes: user's registration, user logs in, user is on probation or use,
User is in use, user's payment is withholdd, wherein user's registration, user log in and user is on probation or there are two types of prevention and control using corresponding to
Strategy system is to intercept strategy system in advance and wholesale is put one's cards on the table strategy system in advance respectively;All preset kind behaviors are corresponding with
Off-line strategy system.After detecting the preset kind behavior of user, need to judge preset kind behavior, and obtain
Corresponding prevention and control strategy system is got, and preset kind behavior is identified by prevention and control strategy system, by all pre-
If type behavior is identified, available final recognition result.
Scheme provided by the above embodiments of the present application 2 can be by pre- in display interface after operation display interface
If the corresponding default identification condition of type behavior identifies preset kind behavior, the identification with the presence or absence of operational risk is obtained
As a result, and show recognition result, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 2 provided by the present application solves the recognition methods of operational risk in the prior art as a result,
Accuracy is low, and operates the high technical problem of threshold.
Embodiment 3
According to the embodiment of the present application, additionally provide a kind of for implementing the operational risk of the recognition methods of aforesaid operations risk
Identification device, as shown in figure 5, the device 500 includes: that the first acquisition module 502, second obtains module 504 and identification module
506。
Wherein, the first acquisition module 502 is used to obtain the preset kind behavior of object run, wherein preset kind behavior
Caused by during for characterizing performance objective operation, and there is the behavior influenced to operational risk;Second obtains module
504 for obtaining the corresponding default identification condition of preset kind behavior;Identification module 506 is used for according to default identification condition to pre-
If type behavior is identified, obtain recognition result, wherein recognition result for characterize performance objective operation during whether
There are operational risks.
Specifically, above-mentioned object run can be first to enjoy pays class business corresponding operation afterwards, first enjoy pay class business afterwards can
To include first enjoying paying class products & services afterwards, above-mentioned operational risk can be the fund bad credit wind first enjoyed and paid in class business afterwards
Danger, can cause very big threat to the operation cost for paying class business afterwards is first enjoyed.Above-mentioned default identification condition can be is in advance
The different risk prevention system strategy systems that different preset kind behaviors are disposed in advance, for example, may include: to intercept tactful body in advance
System, wholesale is put one's cards on the table strategy system in advance, off-line strategy system, wherein is intercepted strategy system in advance and be can be and starts to make in user
Before product or service, to the strategy that illegal act is intercepted, to may determine that the row that user executes by the strategy
Whether to be illegal act, need to intercept;Wholesale strategy system of putting one's cards on the table can be and begin to use product or service in user in advance
Before, the strategy wholesale ability to pay of user confirmed, to may determine that whether user has greatly by the strategy
Volume ability to pay;Off-line strategy system can be judge whether user is offline, that is, the strategy of client can not be related to, thus
It may determine that whether user is sincere by the strategy to use.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior,
Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards,
The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes
For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset
Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make
It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment
Behavior).
Herein it should be noted that above-mentioned first acquisition module 502, second obtains module 504 and identification module 506 is corresponding
Step S22 to step S26 in embodiment 1, three modules are identical as example and application scenarios that corresponding step is realized,
But it is not limited to the above embodiments 1 disclosure of that.It should be noted that above-mentioned module can be run as a part of of device
In the terminal 10 that embodiment 1 provides.
Scheme provided by the above embodiments of the present application 3 can be with after getting the preset kind behavior of object run
The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition,
The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 3 provided by the present application solves the recognition methods of operational risk in the prior art as a result,
Accuracy is low, and operates the high technical problem of threshold.
In the above embodiments of the present application, the second acquisition module includes: the first judging submodule, the first acquisition submodule and the
One implementation sub-module.
Wherein, the first judging submodule is used in the case where preset kind behavior includes: registration behavior, judges registration row
Whether to be illegal registration behavior;If the first acquisition submodule is illegal registration behavior for registering behavior, first is obtained
Identification condition obtains default identification condition;If the first implementation sub-module is not illegal registration behavior for registering behavior, after
Continuous performance objective operation.
In the above embodiments of the present application, the second acquisition module includes: second judgment submodule, the second acquisition submodule and the
Two implementation sub-modules.
Wherein, second judgment submodule is used in the case where preset kind behavior includes: login behavior, judges to log in row
For with the presence or absence of batch operation risk;If the second acquisition submodule is obtained for logging in behavior there are batch operation risk
First identification condition, obtains default identification condition;If batch operation wind is not present for logging in behavior in the second implementation sub-module
Danger, then continue to execute object run.
In the above embodiments of the present application, the second acquisition module includes: third acquisition submodule, matched sub-block, the 4th obtains
Take submodule and the 5th acquisition submodule.
Wherein, third acquisition submodule is used in the case where preset kind behavior includes: order behavior, is obtained to execute and be ordered
The target object of purchase behavior;Matched sub-block is for matching target object with white list;4th acquisition submodule is used for
If target object is with white list, it fails to match, obtains the first identification condition, obtains default identification condition;5th obtains submodule
If block obtains the second identification condition, obtains default identification condition for target object and white list successful match.
In the above embodiments of the present application, identification module include: third judging submodule, first processing submodule and second at
Manage submodule.
Wherein, third judging submodule is for judging whether preset kind behavior meets default identification condition;First processing
If submodule is unsatisfactory for default identification condition for preset kind behavior, obtain recognition result be there is no operational risk,
And start to execute usage behavior;If second processing submodule meets default identification condition for preset kind behavior, obtain
Recognition result is that there are operational risks.
In the above embodiments of the present application, the device further include: the first auditing module, first judgment module, second judge mould
Block, the second auditing module and the first execution module.
Wherein, the first auditing module obtains the first auditing result for auditing to preset kind behavior;First judgement
If module is that the audit fails for the first auditing result, the corresponding inquiry letter of preset kind behavior is judged whether there is
Breath;Second judgment module is used for if it is determined that there are query information, then judges whether to need to obtain preset kind behavior corresponding
Information;Second auditing module is used to then obtain preset kind row if it is determined that need to obtain the corresponding information of preset kind behavior
For corresponding information, and the corresponding information of preset kind behavior is audited, obtains the second auditing result;Second obtains module
If being also that audit passes through with the first auditing result or the second auditing result, it is corresponding that return re-executes acquisition order behavior
The step of default identification condition;First execution module is used to not need to obtain preset kind if it is determined that there is no query information
The corresponding information of behavior or the second auditing result are that the audit fails, then start to execute usage behavior.
In the above embodiments of the present application, the second acquisition module includes: the 6th acquisition submodule, and identification module includes: the 4th
Judging submodule, third processing module and fourth processing module.
Wherein, the 6th acquisition submodule obtains default identification condition for obtaining third identification condition;4th judges submodule
Block is for judging whether preset kind behavior meets third identification condition;Third processing module is used for if it is determined that preset kind row
Condition is identified to be unsatisfactory for third, then obtaining recognition result is that there is no operational risks, and continue to execute object run;Everywhere
Reason module is used for if it is determined that preset kind behavior meets third identification condition, then obtaining recognition result is that there are operational risks.
In the above embodiments of the present application, the device further include: third judgment module, the second execution module and third execute mould
Block.
Wherein, third judgment module is for judging whether usage behavior belongs to malicious act;Second execution module is for such as
Fruit determines that usage behavior belongs to malicious act, then is immediately performed order and generates behavior and payment behavior;Third execution module is used for
If it is determined that usage behavior is not belonging to malicious act, then execution of order generates behavior and payment behavior after preset time.
In the above embodiments of the present application, the device further include: the 4th judgment module, the 4th execution module and the 5th execute mould
Block.
Wherein, the 4th judgment module is for judging whether payment behavior runs succeeded;If the 4th execution module is for true
Determine payment behavior to run succeeded, then continues to execute object run, and the target object typing white list that performance objective is operated;The
Five execution modules are used to then stop performance objective and operate, and target object typing is black if it is determined that payment behavior executes failure
List.
Embodiment 4
According to the embodiment of the present application, additionally provide a kind of for implementing the operational risk of the recognition methods of aforesaid operations risk
Identification device, as shown in fig. 6, the device 600 includes: the first display module 602 and the second display module 604.
Wherein, the first display module 602 is used for the operation display interface in display interface, wherein operation interface is target
Interface corresponding to the preset kind behavior of operation, produced by preset kind behavior is for characterizing during performance objective operates
, and there is the behavior influenced to operational risk;Second display module 604 is for showing recognition result, wherein recognition result is
According to the corresponding default identification condition of preset kind behavior, preset kind behavior is identified, recognition result is used for
It whether there is operational risk during characterizing performance objective operation.
Specifically, above-mentioned display interface can be display circle on the display screen of mobile terminal or terminal
Face, mobile terminal may include: smart phone (including Android phone and IOS mobile phone), IPAD, tablet computer, palm PC
Etc. equipment, but be not limited only to this, the application is not especially limited this;Above-mentioned operation interface can be user and execute default class
The interface of type behavior, for example, user carries out the register interface of account registration, user carries out the login interface etc. of account login, leads to
It crosses the operation for executing user in operation interface to detect, can detecte the preset kind behavior of user;Above-mentioned target
Operation can be first to enjoy pays class business corresponding operation afterwards, and first enjoying and paying class business afterwards may include first enjoying paying class product kimonos afterwards
Business, above-mentioned operational risk can be the fund bad debt risk first enjoyed and paid in class business afterwards, can be to first enjoying the fortune for paying class business afterwards
Battalion's cost causes very big threat.Above-mentioned default identification condition can be different preset kind behaviors in advance and dispose in advance
Different risk prevention system strategy systems, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, from
Line strategy system, wherein intercepting strategy system in advance can be before user begins to use product or service, to illegal act
Whether the strategy intercepted needs to intercept to be illegal act by the behavior that the strategy may determine that user executes;Thing
Preceding wholesale strategy system of putting one's cards on the table can be before user begins to use product or service, carry out to the wholesale ability to pay of user
The strategy of confirmation, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system can be
Judge whether user is offline, that is, the strategy of client can not be related to, to may determine that whether user is sincere by the strategy
It uses.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior,
Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards,
The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes
For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset
Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make
It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment
Behavior).
Herein it should be noted that above-mentioned first display module 602 and the second display module 604 correspond in embodiment 2
Step S42 to step S44, two modules are identical as example and application scenarios that corresponding step is realized, but are not limited to
State 2 disclosure of that of embodiment.It should be noted that above-mentioned module may operate in embodiment 1 as a part of device
In the terminal 10 of offer.
Scheme provided by the above embodiments of the present application 4 can be by pre- in display interface after operation display interface
If the corresponding default identification condition of type behavior identifies preset kind behavior, the identification with the presence or absence of operational risk is obtained
As a result, and show recognition result, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 4 provided by the present application solves the recognition methods of operational risk in the prior art as a result,
Accuracy is low, and operates the high technical problem of threshold.
Embodiment 5
According to the embodiment of the present application, a kind of identifying system of operational risk is additionally provided, comprising:
Processor;And
Memory is connect with processor, for providing the instruction for handling following processing step for processor: obtaining target behaviour
The preset kind behavior of work, wherein preset kind behavior is generated behavior during performance objective operation;It obtains default
The corresponding default identification condition of type behavior;Preset kind behavior is identified according to default identification condition, obtains identification knot
Fruit, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
Scheme provided by the above embodiments of the present application 5 can be with after getting the preset kind behavior of object run
The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition,
The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 5 provided by the present application solves the recognition methods of operational risk in the prior art as a result,
Accuracy is low, and operates the high technical problem of threshold.
Embodiment 6
According to the embodiment of the present application, a kind of embodiment of the recognition methods of operational risk is provided, it should be noted that In
The step of process of attached drawing illustrates can execute in a computer system such as a set of computer executable instructions, also,
It, in some cases, can be to be different from shown in sequence execution herein although logical order is shown in flow charts
The step of out or describing.
Fig. 7 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 6.As shown in fig. 7, the party
Method may include steps of:
Step S72 obtains the preset kind behavior of object run, wherein object run is to carry out when executing transaction business
Operation, preset kind behavior for characterize performance objective operation during caused by, and on operational risk exist influence
Behavior.
Specifically, above-mentioned transaction business can be first to enjoy pays class business afterwards, may include first enjoying paying class product kimonos afterwards
Business, above-mentioned operational risk can be the fund bad debt risk first enjoyed and paid in class business afterwards, can be to first enjoying the fortune for paying class business afterwards
Battalion's cost causes very big threat.
In the application scenarios for paying class business after formerly enjoying, user needs logon account, selects the product being desirable for or clothes
It is engaged in and places an order, corresponding product is sent to user or provides a user corresponding service by businessman, and it uses the product by the user or services,
When billing period reach when, an order can be generated from the background, user can pay according to the order of generation, complete product or
The charging of service is withholdd.For example, user can select first to enjoy the iPhone8 mobile phone for paying class afterwards on electric business platform, used determining
It after the logon account of family, can complete to place an order, user can be used 10 days (that is, charging is all after receiving iPhone8 mobile phone
Phase is 10 days), user needs to complete the payment of corresponding fund in 10 days.
From the foregoing, it will be observed that user needs to carry out multi-pass operation, and then generate more during enjoyment first enjoys and pays class business afterwards
Kind operation behavior, that is, object run can generate a variety of operation behaviors in the process of implementation, and some of them are related to account peace
Entirely, the behavior for the items such as order is submitted and payment is withholdd, causes shadow to the fund bad debt risk for paying class business afterwards is entirely first enjoyed
It rings, if user carries out illegal operation in certain operating process, for example, user's not payment, then will lead to first to enjoy and pay afterwards
There is fund bad debt risk in class business, that is, leading to object run, there are operational risks.Therefore, operational risk will can be deposited
It is determined as preset kind behavior in the behavior of influence, and by carrying out discriminance analysis to preset kind behavior, to obtain entire
The recognition result of object run.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior,
Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards,
The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes
For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset
Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make
It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment
Behavior).
Step S74 obtains the corresponding default identification condition of preset kind behavior, wherein default identification condition is for determining
Risk prevention system strategy when transaction business operates.
Specifically, above-mentioned default identification condition can be in advance as the different risks of different preset kind behaviors deployment
Prevention and control strategy system, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, off-line strategy body
System, wherein intercepting strategy system in advance can be before user begins to use product or service, intercept to illegal act
Strategy, thus by the strategy may determine that user execute behavior whether be illegal act, need to intercept;Wholesale is bright in advance
Bottom strategy system can be before user begins to use product or service, the plan confirmed to the wholesale ability to pay of user
Slightly, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system, which can be, judges user
It is whether offline, that is, the strategy of client can not be related to, used to may determine that whether user is sincere by the strategy.
Step S76 identifies preset kind behavior according to risk prevention system strategy, determines the process of transaction business operation
In whether there is operational risk.
Specifically, if corresponding prevention and control strategy system is hit in the preset kind behavior of user, for example, user carries out illegally
Registration, then can determine that the credit grade of user is lower, has the operational risk for not paying expense, may thereby determine that after first enjoying
Paying class business, there are fund bad debt risks, that is, determining object run, there are operational risks;If the preset kind behavior of user
The corresponding prevention and control strategy system of miss can then determine that the credit grade of user is higher, and there is no the operations for not paying expense
Risk may thereby determine that first to enjoy and pay class business afterwards there is no fund bad debt risk, that is, determining object run, there is no operations
Risk.
It, can be to the operation of user during user's enjoyment first enjoys and pays class business afterwards in a kind of optional scheme
Behavior is monitored in real time, can be according to corresponding prevention and control when the behavior for detecting that user executes belongs to preset kind behavior
Strategy system identifies the behavior of user, to judge the credit grade of user, further determines that first to enjoy and pays class business afterwards
With the presence or absence of fund bad debt risk, a closed loop prevention and control system is formed, the development of business is more bonded.
Scheme provided by the above embodiments of the present application 6 can be with after getting the preset kind behavior of object run
The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition,
The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 6 provided by the present application solves the recognition methods of operational risk in the prior art as a result,
Accuracy is low, and operates the high technical problem of threshold.
Embodiment 7
Embodiments herein can provide a kind of terminal, which can be in terminal group
Any one computer terminal.Optionally, in the present embodiment, above-mentioned terminal also could alternatively be mobile whole
The terminal devices such as end.
Optionally, in the present embodiment, above-mentioned terminal can be located in multiple network equipments of computer network
At least one network equipment.
In the present embodiment, above-mentioned terminal can execute the program of following steps in the recognition methods of operational risk
Code: the preset kind behavior of object run is obtained, wherein during preset kind behavior is for characterizing performance objective operation
It is generated, and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to pre-
If identification condition identifies preset kind behavior, recognition result is obtained, wherein recognition result is for characterizing performance objective behaviour
It whether there is operational risk during work.
Optionally, Fig. 8 is the structural block diagram according to a kind of terminal of the embodiment of the present application.As shown in figure 8, the meter
Calculation machine terminal A may include: one or more (one is only shown in figure) processors 802 and memory 804.
Wherein, memory can be used for storing software program and module, such as the knowledge of the operational risk in the embodiment of the present application
Corresponding program instruction/the module of other method and apparatus, the software program and mould that processor is stored in memory by operation
Block realizes the recognition methods of above-mentioned operational risk thereby executing various function application and data processing.Memory can wrap
Include high speed random access memory, can also include nonvolatile memory, as one or more magnetic storage device, flash memory or
Other non-volatile solid state memories of person.In some instances, memory can further comprise remotely located relative to processor
Memory, these remote memories can pass through network connection to terminal A.The example of above-mentioned network includes but is not limited to interconnect
Net, intranet, local area network, mobile radio communication and combinations thereof.
Processor can call the information and application program of memory storage by transmitting device, to execute following step:
Obtain the preset kind behavior of object run, wherein preset kind behavior is produced for characterizing during performance objective operates
Raw, and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to default knowledge
Other condition identifies preset kind behavior, obtains recognition result, wherein recognition result is used to characterize performance objective operation
It whether there is operational risk in the process.
Optionally, the program code of following steps can also be performed in above-mentioned processor: preset kind behavior includes as next
Kind is a variety of: registration behavior logs in behavior, orders behavior, usage behavior, order generation behavior and payment behavior.
Optionally, the program code of following steps can also be performed in above-mentioned processor: including: registration in preset kind behavior
In the case where behavior, judge the behavior of registering whether as illegal registration behavior;If the behavior of registration is illegal registration behavior, obtain
First identification condition, obtains default identification condition;If the behavior of registration is not illegal registration behavior, target behaviour is continued to execute
Make.
Optionally, the program code of following steps can also be performed in above-mentioned processor: including: to log in preset kind behavior
In the case where behavior, judge login behavior with the presence or absence of batch operation risk;If the behavior of login there are batch operation risk,
The first identification condition is obtained, default identification condition is obtained;If batch operation risk is not present in the behavior of login, mesh is continued to execute
Mark operation.
Optionally, the program code of following steps can also be performed in above-mentioned processor: including: to order in preset kind behavior
In the case where behavior, the target object for executing order behavior is obtained;Target object is matched with white list;If target pair
As it fails to match with white list, then the first identification condition is obtained, default identification condition is obtained;If target object and white list
With success, then the second identification condition is obtained, default identification condition is obtained.
Optionally, the program code of following steps can also be performed in above-mentioned processor: judging whether preset kind behavior is full
The default identification condition of foot;If preset kind behavior is unsatisfactory for default identification condition, obtaining recognition result is that there is no operations
Risk, and start to execute usage behavior;If preset kind behavior meets default identification condition, recognition result is obtained to exist
Operational risk.
Optionally, the program code of following steps can also be performed in above-mentioned processor: grasping obtaining recognition result to exist
After making risk, preset kind behavior is audited, obtains the first auditing result;If the first auditing result is that audit is not led to
It crosses, then judges whether there is the corresponding query information of preset kind behavior;If it is determined that then judging whether to need there are query information
Obtain the corresponding information of preset kind behavior;If it is determined that needing to obtain the corresponding information of preset kind behavior, then obtain pre-
If the corresponding information of type behavior, and the corresponding information of preset kind behavior is audited, obtain the second auditing result;If
First auditing result or the second auditing result are that audit passes through, then return and re-execute the corresponding default identification of acquisition order behavior
The step of condition;If it is determined that query information is not present, do not need to obtain the corresponding information of preset kind behavior or the second audit
As a result for the audit fails, then start to execute usage behavior.
Optionally, the program code of following steps can also be performed in above-mentioned processor: obtaining third identification condition, obtains pre-
If the condition of identification;Judge whether preset kind behavior meets third identification condition;If it is determined that preset kind behavior is unsatisfactory for
Three identification conditions, then obtaining recognition result is that there is no operational risks, and continue to execute object run;If it is determined that preset kind
Behavior meets third identification condition, then obtaining recognition result is that there are operational risks.
Optionally, the program code of following steps can also be performed in above-mentioned processor: start execute usage behavior or really
Determine to judge whether usage behavior belongs to malicious act after preset kind behavior meets third identification condition;If it is determined that using
Behavior belongs to malicious act, then is immediately performed order and generates behavior and payment behavior;If it is determined that usage behavior is not belonging to malice
Behavior, then execution of order generates behavior and payment behavior after preset time.
Optionally, the program code of following steps can also be performed in above-mentioned processor: after executing payment behavior, judgement
Whether payment behavior runs succeeded;If it is determined that payment behavior runs succeeded, then object run is continued to execute, and by performance objective
The target object typing white list of operation;If it is determined that payment behavior executes failure, then stop performance objective operation, and by target
Object typing blacklist.
Using the embodiment of the present application, after getting the preset kind behavior of object run, available preset kind
The corresponding default identification condition of behavior, and preset kind behavior is identified by default identification condition, it whether there is
The recognition result of operational risk, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior
Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented
The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business
If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user
With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
As a result, scheme provided by the present application solve operational risk in the prior art recognition methods accuracy it is low, and grasp
Make the high technical problem of threshold.
It will appreciated by the skilled person that structure shown in Fig. 8 is only to illustrate, terminal is also possible to intelligence
It can mobile phone (such as Android phone, iOS mobile phone), tablet computer, applause computer and mobile internet device (Mobile
Internet Devices, MID), the terminal devices such as PAD.Fig. 8 it does not cause to limit to the structure of above-mentioned electronic device.Example
Such as, terminal A may also include the more or less component (such as network interface, display device) than shown in Fig. 8, or
Person has the configuration different from shown in Fig. 8.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing the relevant hardware of terminal device by program, which can store in a computer readable storage medium
In, storage medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random
Access Memory, RAM), disk or CD etc..
Embodiment 8
Embodiments herein additionally provides a kind of storage medium.Optionally, in the present embodiment, above-mentioned storage medium can
With program code performed by the recognition methods for saving operational risk provided by above-described embodiment one.
Optionally, in the present embodiment, above-mentioned storage medium can be located in computer network in computer terminal group
In any one terminal, or in any one mobile terminal in mobile terminal group.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps: obtaining
Take the preset kind behavior of object run, wherein produced by preset kind behavior is for characterizing during performance objective operates
, and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to default identification
Condition identifies preset kind behavior, obtains recognition result, wherein recognition result is used to characterize the mistake of performance objective operation
It whether there is operational risk in journey.
Optionally, storage medium is also configured to store the program code for executing following steps: preset kind behavior
Including following one or more: registration behavior logs in behavior, orders behavior, usage behavior, order generation behavior and paying bank
For.
Optionally, storage medium is also configured to store the program code for executing following steps: in preset kind row
In the case where including: registration behavior, judge the behavior of registering whether as illegal registration behavior;If the behavior of registration is illegally to register
Behavior then obtains the first identification condition, obtains default identification condition;If the behavior of registration is not illegal registration behavior, continue
Performance objective operation.
Optionally, storage medium is also configured to store the program code for executing following steps: in preset kind row
In the case where including: login behavior, judge login behavior with the presence or absence of batch operation risk;If there is batch in the behavior of login
Operational risk then obtains the first identification condition, obtains default identification condition;If batch operation risk is not present in the behavior of login,
Then continue to execute object run.
Optionally, storage medium is also configured to store the program code for executing following steps: in preset kind row
In the case where including: order behavior, the target object for executing order behavior is obtained;By target object and white list progress
Match;If target object is with white list, it fails to match, obtains the first identification condition, obtains default identification condition;If target
Object and white list successful match then obtain the second identification condition, obtain default identification condition.
Optionally, storage medium is also configured to store the program code for executing following steps: judging preset kind
Whether behavior meets default identification condition;If preset kind behavior is unsatisfactory for default identification condition, obtaining recognition result is
There is no operational risks, and start to execute usage behavior;If preset kind behavior meets default identification condition, identified
As a result for there are operational risks.
Optionally, storage medium is also configured to store the program code for executing following steps: obtaining identification knot
Fruit is to audit to preset kind behavior there are after operational risk, obtain the first auditing result;If the first auditing result
For the audit fails, then the corresponding query information of preset kind behavior is judged whether there is;If it is determined that there are query information, then
Judge whether to need to obtain the corresponding information of preset kind behavior;If it is determined that needing to obtain the corresponding letter of preset kind behavior
Breath, then obtain the corresponding information of preset kind behavior, and audit to the corresponding information of preset kind behavior, obtain the second instance
Core result;If the first auditing result or the second auditing result are that audit passes through, return, which re-executes, obtains order behavior pair
The step of default identification condition answered;If it is determined that query information is not present, do not need to obtain the corresponding letter of preset kind behavior
Breath or the second auditing result are that the audit fails, then start to execute usage behavior.
Optionally, storage medium is also configured to store the program code for executing following steps: obtaining third identification
Condition obtains default identification condition;Judge whether preset kind behavior meets third identification condition;If it is determined that preset kind row
Condition is identified to be unsatisfactory for third, then obtaining recognition result is that there is no operational risks, and continue to execute object run;If really
Determine preset kind behavior and meet third identification condition, then obtaining recognition result is that there are operational risks.
Optionally, storage medium is also configured to store the program code for executing following steps: making starting to execute
After behavior or determining that preset kind behavior meets third identification condition, judge whether usage behavior belongs to malicious act;Such as
Fruit determines that usage behavior belongs to malicious act, then is immediately performed order and generates behavior and payment behavior;If it is determined that usage behavior
It is not belonging to malicious act, then execution of order generates behavior and payment behavior after preset time.
Optionally, storage medium is also configured to store the program code for executing following steps: executing paying bank
Later, to judge whether payment behavior runs succeeded;If it is determined that payment behavior runs succeeded, then object run is continued to execute,
And the target object typing white list for operating performance objective;If it is determined that payment behavior executes failure, then stop performance objective
Operation, and by target object typing blacklist.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
In above-described embodiment of the application, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment
The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module
It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the application whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code
Medium.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art
For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered
It is considered as the protection scope of the application.
Claims (17)
1. a kind of recognition methods of operational risk characterized by comprising
Obtain the preset kind behavior of object run, wherein the preset kind behavior executes the object run for characterizing
During caused by, and on operational risk exist influence behavior;
Obtain the corresponding default identification condition of the preset kind behavior;
The preset kind behavior is identified according to the default identification condition, obtains recognition result, wherein the identification
As a result it whether there is operational risk during executing the object run for characterization.
2. the method according to claim 1, wherein the preset kind behavior includes following one or more:
Registration behavior logs in behavior, orders behavior, usage behavior, order generation behavior and payment behavior.
3. according to the method described in claim 2, it is characterized in that, including: the registration behavior in the preset kind behavior
In the case where, obtain the corresponding default identification condition of the preset kind behavior, comprising:
Judge described whether to register behavior as illegal registration behavior;
If the registration behavior is the illegal registration behavior, the first identification condition is obtained, the default identification item is obtained
Part;
If the registration behavior is not the illegal registration behavior, the object run is continued to execute.
4. according to the method described in claim 2, it is characterized in that, including: the login behavior in the preset kind behavior
In the case where, obtain the corresponding default identification condition of the preset kind behavior, comprising:
Judge the login behavior with the presence or absence of batch operation risk;
If there are the batch operation risks for the login behavior, the first identification condition is obtained, the default identification is obtained
Condition;
If the batch operation risk is not present in the login behavior, the object run is continued to execute.
5. according to the method described in claim 2, it is characterized in that, including: the order behavior in the preset kind behavior
In the case where, obtain the corresponding default identification condition of the preset kind behavior, comprising:
Obtain the target object for executing the order behavior;
The target object is matched with white list;
If the target object is with the white list, it fails to match, obtains the first identification condition, obtains the default identification
Condition;
If the target object and the white list successful match, the second identification condition is obtained, the default identification is obtained
Condition.
6. the method according to any one of claim 3 to 5, which is characterized in that according to the default identification condition pair
The preset kind behavior is identified, recognition result is obtained, comprising:
Judge whether the preset kind behavior meets the default identification condition;
If the preset kind behavior is unsatisfactory for the default identification condition, obtaining the recognition result is that there is no operations
Risk, and start to execute the usage behavior;
If the preset kind behavior meets the default identification condition, the recognition result is obtained to there is operation wind
Danger.
7. according to the method described in claim 6, it is characterized in that, obtain the recognition result be there are operational risk it
Afterwards, the method also includes:
The preset kind behavior is audited, the first auditing result is obtained;
If first auditing result is that the audit fails, the corresponding inquiry of the preset kind behavior is judged whether there is
Information;
If it is determined that there are the query informations, then judge whether to need to obtain the corresponding information of the preset kind behavior;
If it is determined that needing to obtain the corresponding information of the preset kind behavior, then the corresponding letter of the preset kind behavior is obtained
Breath, and the corresponding information of the preset kind behavior is audited, obtain the second auditing result;
If first auditing result or second auditing result are that audit passes through, return re-executes to be ordered described in acquisition
The step of purchase behavior corresponding default identification condition;
If it is determined that the query information is not present, the corresponding information of the preset kind behavior or described the are not needed to obtain
Two auditing results are that the audit fails, then start to execute the usage behavior.
8. according to the method described in claim 2, it is characterized in that,
Obtain the corresponding default identification condition of the preset kind behavior, comprising: obtain third and identify condition, obtain described default
Identification condition;
The preset kind behavior is identified according to the default identification condition, obtains recognition result, comprising: described in judgement
Whether preset kind behavior meets the third identification condition;Know if it is determined that the preset kind behavior is unsatisfactory for the third
Other condition, then obtaining the recognition result is that there is no operational risks, and continue to execute the object run;If it is determined that described
Preset kind behavior meets the third identification condition, then obtaining the recognition result is that there are operational risks.
9. method according to claim 7 or 8, which is characterized in that starting to execute described in the usage behavior or determination
After preset kind behavior meets the third identification condition, the method also includes:
Judge whether the usage behavior belongs to malicious act;
If it is determined that the usage behavior belongs to malicious act, then it is immediately performed the order and generates behavior and the paying bank
For;
If it is determined that the usage behavior is not belonging to malicious act, then the order is executed after preset time and generates behavior and described
Payment behavior.
10. according to the method described in claim 9, it is characterized in that, the method is also wrapped after executing the payment behavior
It includes:
Judge whether the payment behavior runs succeeded;
If it is determined that the payment behavior runs succeeded, then the object run is continued to execute, and the object run will be executed
Target object typing white list;
If it is determined that the payment behavior executes failure, then stop executing the object run, and by the target object typing
Blacklist.
11. a kind of recognition methods of operational risk characterized by comprising
The operation display interface in display interface, wherein the operation interface is corresponding to the preset kind behavior of object run
Interface, the preset kind behavior for characterize execute the object run during caused by, and to operational risk
There are the behaviors of influence;
Show recognition result, wherein the recognition result be according to the corresponding default identification condition of the preset kind behavior, it is right
What the preset kind behavior was identified, the recognition result for characterize execute the object run during be
It is no that there are operational risks.
12. a kind of identification device of operational risk characterized by comprising
First obtains module, for obtaining the preset kind behavior of object run, wherein the preset kind behavior is for characterizing
Caused by executing during the object run, and there is the behavior influenced to operational risk;
Second obtains module, for obtaining the corresponding default identification condition of the preset kind behavior;
Identification module obtains recognition result for identifying according to the default identification condition to the preset kind behavior,
Wherein, it whether there is operational risk during the recognition result is for characterizing the execution object run.
13. a kind of identification device of operational risk characterized by comprising
First display module, for the operation display interface in display interface, wherein the operation interface is the pre- of object run
If interface corresponding to type behavior, produced by the preset kind behavior is used to characterize during the execution object run
, and there is the behavior influenced to operational risk;
Second display module, for showing recognition result, wherein the recognition result is corresponding according to the preset kind behavior
Default identification condition, the preset kind behavior is identified, the recognition result for characterize execute described in
It whether there is operational risk during object run.
14. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program
When control the storage medium where equipment execute following steps: obtain the preset kind behavior of object run, wherein described pre-
If type behavior is to execute generated behavior during the object run;It is corresponding pre- to obtain the preset kind behavior
If the condition of identification;The preset kind behavior is identified according to the default identification condition, obtains recognition result, wherein
The recognition result whether there is operational risk during executing the object run for characterization.
15. a kind of processor, which is characterized in that the processor is for running program, wherein executed when described program is run with
Lower step: the preset kind behavior of object run is obtained, wherein the preset kind behavior is to execute the mistake of the object run
Generated behavior in journey;Obtain the corresponding default identification condition of the preset kind behavior;According to the default identification condition
The preset kind behavior is identified, recognition result is obtained, wherein the recognition result executes the target for characterizing
It whether there is operational risk during operation.
16. a kind of identifying system of operational risk characterized by comprising
Processor;And
Memory is connected to the processor, for providing the instruction for handling following processing step for the processor: obtaining mesh
Mark the preset kind behavior of operation, wherein the preset kind behavior is generated during executing the object run
Behavior;Obtain the corresponding default identification condition of the preset kind behavior;According to the default identification condition to the default class
Type behavior is identified, recognition result is obtained, wherein during the recognition result is for characterizing the execution object run
With the presence or absence of operational risk.
17. a kind of recognition methods of operational risk characterized by comprising
Obtain the preset kind behavior of object run, wherein the object run is the operation carried out when executing transaction business, institute
State preset kind behavior for characterize execute during the object run caused by, and there is influence to operational risk
Behavior;
Obtain the corresponding default identification condition of the preset kind behavior, wherein described in the default identification condition is used to determine
Risk prevention system strategy when transaction business operates;
The preset kind behavior is identified according to the risk prevention system strategy, determines the process of the transaction business operation
In whether there is operational risk.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810338694.8A CN110390445A (en) | 2018-04-16 | 2018-04-16 | The recognition methods of operational risk, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810338694.8A CN110390445A (en) | 2018-04-16 | 2018-04-16 | The recognition methods of operational risk, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110390445A true CN110390445A (en) | 2019-10-29 |
Family
ID=68283861
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810338694.8A Pending CN110390445A (en) | 2018-04-16 | 2018-04-16 | The recognition methods of operational risk, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110390445A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309495A (en) * | 2020-02-03 | 2020-06-19 | 支付宝(杭州)信息技术有限公司 | Batch processing request initiating method and device, risk identification platform and storage medium |
CN111966429A (en) * | 2020-08-21 | 2020-11-20 | 支付宝(杭州)信息技术有限公司 | Applet processing method and device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105654303A (en) * | 2015-12-31 | 2016-06-08 | 拉扎斯网络科技(上海)有限公司 | High-risk user identification method and device |
CN106529288A (en) * | 2016-11-16 | 2017-03-22 | 智者四海(北京)技术有限公司 | Account risk identification method and device |
CN106685894A (en) * | 2015-11-09 | 2017-05-17 | 阿里巴巴集团控股有限公司 | Risk identification method, apparatus and system thereof |
CN106875078A (en) * | 2016-08-03 | 2017-06-20 | 阿里巴巴集团控股有限公司 | transaction risk detection method, device and equipment |
CN106936807A (en) * | 2015-12-31 | 2017-07-07 | 阿里巴巴集团控股有限公司 | A kind of recognition methods of malicious operation and device |
CN107256257A (en) * | 2017-06-12 | 2017-10-17 | 上海携程商务有限公司 | Abnormal user generation content identification method and system based on business datum |
CN107464113A (en) * | 2017-07-27 | 2017-12-12 | 无锡雅座在线科技股份有限公司 | The risk of trading activity determines method and device |
US20180082229A1 (en) * | 2015-05-13 | 2018-03-22 | Alibaba Group Holding Limited | Risk identification based on historical behavioral data |
-
2018
- 2018-04-16 CN CN201810338694.8A patent/CN110390445A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180082229A1 (en) * | 2015-05-13 | 2018-03-22 | Alibaba Group Holding Limited | Risk identification based on historical behavioral data |
CN106685894A (en) * | 2015-11-09 | 2017-05-17 | 阿里巴巴集团控股有限公司 | Risk identification method, apparatus and system thereof |
CN105654303A (en) * | 2015-12-31 | 2016-06-08 | 拉扎斯网络科技(上海)有限公司 | High-risk user identification method and device |
CN106936807A (en) * | 2015-12-31 | 2017-07-07 | 阿里巴巴集团控股有限公司 | A kind of recognition methods of malicious operation and device |
CN106875078A (en) * | 2016-08-03 | 2017-06-20 | 阿里巴巴集团控股有限公司 | transaction risk detection method, device and equipment |
CN106529288A (en) * | 2016-11-16 | 2017-03-22 | 智者四海(北京)技术有限公司 | Account risk identification method and device |
CN107256257A (en) * | 2017-06-12 | 2017-10-17 | 上海携程商务有限公司 | Abnormal user generation content identification method and system based on business datum |
CN107464113A (en) * | 2017-07-27 | 2017-12-12 | 无锡雅座在线科技股份有限公司 | The risk of trading activity determines method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309495A (en) * | 2020-02-03 | 2020-06-19 | 支付宝(杭州)信息技术有限公司 | Batch processing request initiating method and device, risk identification platform and storage medium |
CN111309495B (en) * | 2020-02-03 | 2023-07-14 | 支付宝(杭州)信息技术有限公司 | Batch processing request initiating method and device, risk identification equipment and storage medium |
CN111966429A (en) * | 2020-08-21 | 2020-11-20 | 支付宝(杭州)信息技术有限公司 | Applet processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107665432A (en) | The system and method that suspicious user behavior is identified in the interacting of user and various bank services | |
CN106875078B (en) | Transaction risk detection method, device and equipment | |
CN108053204A (en) | Automatic settlement method and sell equipment | |
CN109063977B (en) | Non-inductive transaction risk monitoring method and device | |
CN107526582B (en) | Web game control method and device | |
WO2015101162A1 (en) | Data processing method based on instant messaging or social applications, and device thereof | |
CN110225104A (en) | Data capture method, device and terminal device | |
CN108154356A (en) | Cross-border money transfer method, the first electronic equipment and payment server | |
CN110414258A (en) | Document handling method and system, data processing method | |
CN104836696B (en) | A kind of detection method and device of IP address | |
CN107392614B (en) | Method and device for realizing offline transaction | |
CN106056386A (en) | Payment method, payment terminal, server and payment system | |
CN110377522A (en) | The test method for scene of trading, calculates equipment and medium at device | |
CN107194690A (en) | A kind of two-dimensional code scanning method and terminal, computer installation and readable storage medium storing program for executing | |
CN107451819A (en) | A kind of auth method and device based on user's operation behavior feature | |
CN108596579A (en) | a kind of virtual resource transfer method, device, terminal and storage medium | |
CN109344599A (en) | A kind of authentication management method, device, terminal and medium | |
CN110390445A (en) | The recognition methods of operational risk, device and system | |
CN105791246A (en) | Information verification method, device and system | |
CN116562931A (en) | Method, device, equipment and storage medium for processing consumption coupon transaction data | |
CN110033016A (en) | Training method, numeric keypad recognition methods and the system of numeric keypad identification model | |
CN104951969A (en) | Data processing method and apparatus for virtual resource transfer | |
CN106411881A (en) | Method and device for buying ticket based on client | |
CN111179023B (en) | Order identification method and device | |
CN109165947A (en) | Account information determines method, apparatus and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40016203 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191029 |