CN110390445A - The recognition methods of operational risk, device and system - Google Patents

The recognition methods of operational risk, device and system Download PDF

Info

Publication number
CN110390445A
CN110390445A CN201810338694.8A CN201810338694A CN110390445A CN 110390445 A CN110390445 A CN 110390445A CN 201810338694 A CN201810338694 A CN 201810338694A CN 110390445 A CN110390445 A CN 110390445A
Authority
CN
China
Prior art keywords
behavior
preset kind
user
identification condition
object run
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810338694.8A
Other languages
Chinese (zh)
Inventor
陈静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810338694.8A priority Critical patent/CN110390445A/en
Publication of CN110390445A publication Critical patent/CN110390445A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This application discloses a kind of recognition methods of operational risk, device and system.Wherein, this method comprises: obtaining the preset kind behavior of object run, wherein preset kind behavior is generated during performance objective operates for characterizing, and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;Preset kind behavior is identified according to default identification condition, obtains recognition result, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.Present application addresses the recognition methods accuracy of operational risk in the prior art is low, and operate the high technical problem of threshold.

Description

The recognition methods of operational risk, device and system
Technical field
This application involves service security fields, in particular to a kind of recognition methods of operational risk, device and are System.
Background technique
Class product is paid afterwards for first enjoying, and after first giving certain on probation or on probation of user, is carrying out charging and charge.This In a product type, there can be a big chunk user elder generation Evaluation product, after coming out to metering period bill, branch is not paid With abandoning account, change account and change an identity and continue to use;This kind of user can make first to enjoy the operation cost for paying class product afterwards by Very big threat can also generate the service of normal users and bother.Based on such risk, for the generation for the user that controls risk, Various credit scoring products are proposed, for example, sesame credit or the letter control service with shield.
But the threshold of product is also improved while credit scoring prevention and control risk, the new user of most of internet is special It is not the elderly, there are no many data in big data, cause credit scoring very low, possibly can not enjoys this kind of clothes Business;In addition, credit scoring often takes a kind of data to score, the credit grade of entire people can not be completely portrayed.
Recognition methods accuracy for operational risk in the prior art is low, and operates the high problem of threshold, at present not yet It puts forward effective solutions.
Summary of the invention
The embodiment of the present application provides a kind of recognition methods of operational risk, device and system, at least to solve existing skill The recognition methods accuracy of operational risk is low in art, and operates the high technical problem of threshold.
According to the one aspect of the embodiment of the present application, a kind of recognition methods of operational risk is provided, comprising: obtain target The preset kind behavior of operation, wherein preset kind behavior is generated and right during performance objective operates for characterizing There is the behavior influenced in operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to default identification condition pair Preset kind behavior is identified, recognition result is obtained, wherein recognition result, which is used to characterize during performance objective operates, is It is no that there are operational risks.
According to the another aspect of the embodiment of the present application, a kind of recognition methods of operational risk is additionally provided, comprising: showing Operation display interface in interface, wherein operation interface is interface corresponding to the preset kind behavior of object run, preset kind Behavior is generated during performance objective operates for characterizing, and there is the behavior influenced to operational risk;Display identification As a result, wherein recognition result is to be identified according to the corresponding default identification condition of preset kind behavior to preset kind behavior It obtains, recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of identification device of operational risk is additionally provided, comprising: first obtains Modulus block, for obtaining the preset kind behavior of object run, wherein preset kind behavior is used to characterize performance objective operation Caused by the process, and there is the behavior influenced to operational risk;Second obtains module, for obtaining preset kind behavior pair The default identification condition answered;Identification module is identified for being identified according to default identification condition to preset kind behavior As a result, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of identification device of operational risk is additionally provided, comprising: first is aobvious Show module, for the operation display interface in display interface, wherein operation interface is right for the preset kind behavior of object run The interface answered, preset kind behavior is generated during performance objective operates for characterizing, and there are shadows to operational risk Loud behavior;Second display module, for showing recognition result, wherein recognition result is corresponding according to preset kind behavior Default identification condition is identified, recognition result is used to characterize the process of performance objective operation to preset kind behavior In whether there is operational risk.
According to the another aspect of the embodiment of the present application, a kind of storage medium is additionally provided, storage medium includes the journey of storage Sequence, wherein equipment where control storage medium executes following steps in program operation: obtaining the preset kind row of object run For, wherein preset kind behavior is generated behavior during performance objective operation;It is corresponding to obtain preset kind behavior Default identification condition;Preset kind behavior is identified according to default identification condition, obtains recognition result, wherein identification knot Fruit is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of processor is additionally provided, processor is used to run program, In, program executes following steps when running: obtaining the preset kind behavior of object run, wherein preset kind behavior is to execute Generated behavior during object run;Obtain the corresponding default identification condition of preset kind behavior;According to default identification Condition identifies preset kind behavior, obtains recognition result, wherein recognition result is used to characterize the mistake of performance objective operation It whether there is operational risk in journey.
According to the another aspect of the embodiment of the present application, a kind of identifying system of operational risk is additionally provided, comprising: processing Device;And memory, it is connect with processor, for providing the instruction for handling following processing step for processor: obtaining target behaviour The preset kind behavior of work, wherein preset kind behavior is generated behavior during performance objective operation;It obtains default The corresponding default identification condition of type behavior;Preset kind behavior is identified according to default identification condition, obtains identification knot Fruit, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
According to the another aspect of the embodiment of the present application, a kind of recognition methods of operational risk is additionally provided, comprising: obtain mesh Mark the preset kind behavior of operation, wherein object run is the operation carried out when executing transaction business, and preset kind behavior is used for Caused by characterizing during performance objective operation, and there is the behavior influenced to operational risk;Obtain preset kind behavior Corresponding default identification condition, wherein default identification condition is used to determine risk prevention system strategy when transaction business operation;According to Risk prevention system strategy identifies preset kind behavior, whether there is operational risk during determining transaction business operation.
In the embodiment of the present application, after getting the preset kind behavior of object run, available preset kind The corresponding default identification condition of behavior, and preset kind behavior is identified by default identification condition, it whether there is The recognition result of operational risk, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
As a result, scheme provided by the present application solve operational risk in the prior art recognition methods accuracy it is low, and grasp Make the high technical problem of threshold.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 be according to the terminal of recognition methods for realizing operational risk of the embodiment of the present application a kind of (or Mobile device) hardware block diagram;
Fig. 2 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 1;
Fig. 3 is the flow chart according to a kind of recognition methods of optional operational risk of the embodiment of the present application;
Fig. 4 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 2;
Fig. 5 is the schematic diagram according to a kind of identification device of operational risk of the embodiment of the present application 3;
Fig. 6 is the schematic diagram according to a kind of identification device of operational risk of the embodiment of the present application 4;
Fig. 7 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 6;And
Fig. 8 is the structural block diagram according to a kind of terminal of the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Firstly, the part noun or term that occur during the embodiment of the present application is described are suitable for following solution It releases:
It first enjoys and paying afterwards: can be and first go out bill gathering using product or service, then charging.
Credit scoring: can be and obtain the credit score based on a user based on various algorithm models, according to different letters It is given user with giving and is first enjoyed the product amount paid afterwards.
Risk identification behavior sequence: it can be and path, the abstract critical path that can be controlled risk, group are used based on user It is sequence at risk identifying rows.
Fund bad debt risk: it can be first to enjoy and pay the corresponding fund that can not withdraw after the charging of class product afterwards, form product Bad credit.
Embodiment 1
According to the embodiment of the present application, a kind of embodiment of the recognition methods of operational risk is provided, it should be noted that In The step of process of attached drawing illustrates can execute in a computer system such as a set of computer executable instructions, also, It, in some cases, can be to be different from shown in sequence execution herein although logical order is shown in flow charts The step of out or describing.
Embodiment of the method provided by the embodiment of the present application one can be in mobile terminal, terminal or similar fortune It calculates and is executed in device.Fig. 1 shows a kind of terminal (or mobile device) of recognition methods for realizing operational risk Hardware block diagram.As shown in Figure 1, terminal 10 (or mobile device 10) may include one or more (adopts in figure With 102a, 102b ... ..., 102n is shown) processor 102 (processor 102 can include but is not limited to Micro-processor MCV or The processing unit of programmable logic device FPGA etc.), memory 104 for storing data and the biography for communication function Defeated device 106.It in addition to this, can also include: display, input/output interface (I/O interface), universal serial bus (USB) Port (a port that can be used as in the port of I/O interface is included), network interface, power supply and/or camera.This field is general Logical technical staff is appreciated that structure shown in FIG. 1 is only to illustrate, and does not cause to limit to the structure of above-mentioned electronic device. For example, terminal 10 may also include the more perhaps less component than shown in Fig. 1 or have different from shown in Fig. 1 Configuration.
It is to be noted that said one or multiple processors 102 and/or other data processing circuits lead to herein Can often " data processing circuit " be referred to as.The data processing circuit all or part of can be presented as software, hardware, firmware Or any other combination.In addition, data processing circuit for single independent processing module or all or part of can be integrated to meter In any one in other elements in calculation machine terminal 10 (or mobile device).As involved in the embodiment of the present application, The data processing circuit controls (such as the selection for the variable resistance end path connecting with interface) as a kind of processor.
Memory 104 can be used for storing the software program and module of application software, such as the operation in the embodiment of the present application Corresponding program instruction/the data storage device of the recognition methods of risk, processor 102 are stored in memory 104 by operation Software program and module realize the knowledge of above-mentioned operational risk thereby executing various function application and data processing Other method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 104 can further comprise The memory remotely located relative to processor 102, these remote memories can pass through network connection to terminal 10. The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device 106 is used to that data to be received or sent via a network.Above-mentioned network specific example may include The wireless network that the communication providers of terminal 10 provide.In an example, transmitting device 106 includes that a network is suitable Orchestration (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to Internet is communicated.In an example, transmitting device 106 can be radio frequency (Radio Frequency, RF) module, For wirelessly being communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), the liquid crystal display aloow user with The user interface of terminal 10 (or mobile device) interacts.
Herein it should be noted that in some embodiments, above-mentioned computer equipment (or mobile device) shown in FIG. 1 has There is touch display (also referred to as " touch screen " or " touch display screen ").In some embodiments, above-mentioned calculating shown in FIG. 1 Machine equipment (or mobile device) has graphical user interface (GUI), and user can be contacted by the finger touched on touch sensitive surface And/or gesture to carry out human-computer interaction with GUI, human-computer interaction function herein optionally includes following interaction: creation webpage is drawn Figure word processing, production electronic document, game, video conference, instant messaging, sends and receive e-mail, call interface, plays number Word video, playback digital music and/or web browsing etc. are matched for executing the executable instruction of above-mentioned human-computer interaction function It sets/is stored in one or more processors executable computer program product or readable storage medium storing program for executing.
Under above-mentioned running environment, this application provides the recognition methods of operational risk as shown in Figure 2.Fig. 2 is basis A kind of flow chart of the recognition methods of the operational risk of the embodiment of the present application 1.As shown in Fig. 2, this method may include walking as follows It is rapid:
Step S22 obtains the preset kind behavior of object run, wherein preset kind behavior is for characterizing performance objective Caused by during operation, and there is the behavior influenced to operational risk.
Specifically, above-mentioned object run can be first to enjoy pays class business corresponding operation afterwards, first enjoy pay class business afterwards can To include first enjoying paying class products & services afterwards, above-mentioned operational risk can be the fund bad credit wind first enjoyed and paid in class business afterwards Danger, can cause very big threat to the operation cost for paying class business afterwards is first enjoyed.
Class business is paid afterwards for first enjoying, user needs logon account, and it selects the product being desirable for or service and places an order, quotient Corresponding product is sent to user or provides a user corresponding service by family, is used the product by the user or is serviced, works as billing period When arrival, an order can be generated from the background, and user can pay according to the order of generation, complete the charging of product or service It withholds.For example, user can select first to enjoy the iPhone8 mobile phone for paying class afterwards on electric business platform, user's logon account is being determined Later, it can complete to place an order, user can be used 10 days (that is, metering period is 10 days) after receiving iPhone8 mobile phone, User needs to complete the payment of corresponding fund in 10 days.
From the foregoing, it will be observed that user needs to carry out multi-pass operation, and then generate more during enjoyment first enjoys and pays class business afterwards Kind operation behavior, that is, object run can generate a variety of operation behaviors in the process of implementation, and some of them are related to account peace Entirely, the behavior for the items such as order is submitted and payment is withholdd, causes shadow to the fund bad debt risk for paying class business afterwards is entirely first enjoyed It rings, if user carries out illegal operation in certain operating process, for example, user's not payment, then will lead to first to enjoy and pay afterwards There is fund bad debt risk in class business, that is, leading to object run, there are operational risks.Therefore, operational risk will can be deposited It is determined as preset kind behavior in the behavior of influence, and by carrying out discriminance analysis to preset kind behavior, to obtain entire The recognition result of object run.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior, Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards, The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment Behavior).
Step S24 obtains the corresponding default identification condition of preset kind behavior.
Specifically, above-mentioned default identification condition can be in advance as the different risks of different preset kind behaviors deployment Prevention and control strategy system, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, off-line strategy body System, wherein intercepting strategy system in advance can be before user begins to use product or service, intercept to illegal act Strategy, thus by the strategy may determine that user execute behavior whether be illegal act, need to intercept;Wholesale is bright in advance Bottom strategy system can be before user begins to use product or service, the plan confirmed to the wholesale ability to pay of user Slightly, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system, which can be, judges user It is whether offline, that is, the strategy of client can not be related to, used to may determine that whether user is sincere by the strategy.
Step S26 identifies preset kind behavior according to default identification condition, obtains recognition result, wherein identification As a result for characterizing during performance objective operates with the presence or absence of operational risk.
Specifically, if corresponding prevention and control strategy system is hit in the preset kind behavior of user, for example, user carries out illegally Registration, then can determine that the credit grade of user is lower, has the operational risk for not paying expense, may thereby determine that after first enjoying Paying class business, there are fund bad debt risks, that is, determining object run, there are operational risks;If the preset kind behavior of user The corresponding prevention and control strategy system of miss can then determine that the credit grade of user is higher, and there is no the operations for not paying expense Risk may thereby determine that first to enjoy and pay class business afterwards there is no fund bad debt risk, that is, determining object run, there is no operations Risk.
It, can be to the operation of user during user's enjoyment first enjoys and pays class business afterwards in a kind of optional scheme Behavior is monitored in real time, can be according to corresponding prevention and control when the behavior for detecting that user executes belongs to preset kind behavior Strategy system identifies the behavior of user, to judge the credit grade of user, further determines that first to enjoy and pays class business afterwards With the presence or absence of fund bad debt risk, a closed loop prevention and control system is formed, the development of business is more bonded.
Fig. 3 be according to a kind of flow chart of the recognition methods of optional operational risk of the embodiment of the present application, below with reference to Fig. 3 is described in detail a kind of preferred embodiment of the application for first enjoying the business scenario for paying class business afterwards.Such as Fig. 3 institute Show, can determine that preset kind behavior includes: user's registration, user logs in, user is on probation or use, user's use in (in figure It is not shown), user's payment is withholdd, wherein user's registration, user log in and user is on probation or there are two types of prevention and control strategies using corresponding to System is to intercept strategy system in advance and wholesale is put one's cards on the table strategy system in advance respectively;All preset kind behaviors are corresponding with offline Strategy system.After detecting the preset kind behavior of user, need to judge preset kind behavior, and get Corresponding prevention and control strategy system, and preset kind behavior is identified by prevention and control strategy system, by all default classes Type behavior identified, available final recognition result.
Scheme provided by the above embodiments of the present application 1 can be with after getting the preset kind behavior of object run The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition, The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 1 provided by the present application solves the recognition methods of operational risk in the prior art as a result, Accuracy is low, and operates the high technical problem of threshold.
In the above embodiments of the present application, in the case where preset kind behavior includes: registration behavior, step S24 is obtained pre- If the corresponding default identification condition of type behavior, comprising:
Whether step S2412 judges the behavior of registering as illegal registration behavior.
Specifically, above-mentioned illegal registration behavior can refer to malicious registration behavior, for example, user uses same IP address In the interior multiple accounts of registration on the same day, by judging whether the user of current register account number carries out malicious registration, it can be determined that should Whether user registers a large amount of accounts, if it is determined that a large amount of accounts of the user's registration can then determine that the user first enjoys in the presence of enjoyment After pay class business, but do not pay the operational risk of expense.
Step S2414 obtains the first identification condition, obtains default identification if registration behavior is illegal registration behavior Condition.
Specifically, the first above-mentioned identification condition can be the prevention and control strategy system being arranged in advance for illegal registration behavior, For example, it may be intercepting strategy system in advance.
In a kind of optional scheme, judging that user's registration belongs to illegal registration, for example, user is using same IP Location can determine that the credit grade of user is lower, there are bad credit record, users after the interior multiple accounts of registration on the same day Enjoyment is first enjoyed pays class business there are fund bad debt risk afterwards, that is, object run there are operational risk, needs further to obtain in advance The strategy system of interception in advance first disposed identifies user's registration.
Step S2416 continues to execute object run if registration behavior is not illegal registration behavior.
In a kind of optional scheme, after judging that user's registration belongs to lawful registration, the letter of user can be determined With higher ranked, it being not present bad credit record, user enjoys first to enjoy and pays class business afterwards fund bad debt risk is not present, that is, Operational risk is not present in current object run, then can continue to execute subsequent operation.
For example, as shown in figure 3, user can carry out Account Registration in register interface, in the row for detecting user's registration Later, to first determine whether user carries out malicious registration, if it is judged that user carries out malicious registration, then available correspondence Interception strategy system in advance, and by advance intercept strategy system the behavior of user's registration is identified;If it is judged that User does not carry out malicious registration, then user can be logged on login interface by the account and password registered.
In the above embodiments of the present application, in the case where preset kind behavior includes: login behavior, step S24 is obtained pre- If the corresponding default identification condition of type behavior, comprising:
Step S2422 judges login behavior with the presence or absence of batch operation risk.
Specifically, above-mentioned batch operation risk can refer to that user carries out batch register, by judging that user is No progress batch register, it can be determined that whether the user currently logged in possesses a large amount of accounts, if it is determined that the user possesses A large amount of accounts can then determine that the user first enjoys the operational risk paid class business afterwards, but do not pay expense in the presence of enjoyment.
Step S2424 obtains the first identification condition, obtains default knowledge if there are batch operation risks for the behavior of login Other condition.
In a kind of optional scheme, judging user's login, there are batch operation risks, for example, user logs in simultaneously After multiple accounts, it can determine that the credit grade of user is lower, there are bad credit record, user enjoys first to enjoy pays class industry afterwards There are fund bad debt risks for business, that is, object run there are operational risk, needs further to obtain the interception in advance disposed in advance Strategy system identifies user's registration.
Step S2426 continues to execute object run if batch operation risk is not present in the behavior of login.
In a kind of optional scheme, after judging that batch operation risk is not present in user's login, use can be determined The credit grade at family is higher, be not present bad credit record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk, That is, operational risk is not present in current object run, then subsequent operation can be continued to execute.
For example, as shown in figure 3, user can pass through the account of registration on login interface after user completes to log in It is logged in password, after detecting the behavior that user logs in, first determines whether user has batch operation risk, if Judge that user has batch operation risk, then it is available it is corresponding intercept strategy system in advance, and by intercepting strategy in advance The behavior that system logs in user identifies;If it is judged that user does not have batch operation risk, then user can be in business Class product or service are paid in first enjoying for selecting to need to try out or use in selection interface afterwards.
In the above embodiments of the present application, in the case where preset kind behavior includes: order behavior, step S24 is obtained pre- If the corresponding default identification condition of type behavior, comprising:
Step S2432 obtains the target object for executing order behavior.
Specifically, above-mentioned target object can be the user for having registered login, which needs on probation or use first Class product or service are paid after enjoying, and product or service have been chosen on service selection interface.
Step S2434 matches target object with white list.
Specifically, above-mentioned white list can be the pre- big data that first passes through and be analyzed to obtain to user's history operation behavior White list, for the user in white list in first enjoying the operating process for paying class business afterwards before, credit grade is higher, and there is no not Good credit record, that is, operational risk is not present in the object run that the user in white list executes, by that current will try out or make It is matched with the user for paying class business afterwards is first enjoyed with white list, it can be determined that whether the user is user in white list, such as Fruit determines the user not and is the user in white list, it is determined that the user pays class business in the presence of enjoying first to enjoy afterwards, but not branch payment Operational risk.
Step S2436, if target object is with white list, it fails to match, obtains the first identification condition, obtains default knowledge Other condition.
In a kind of optional scheme, is judging on probation or matched using the user for paying class business afterwards is first enjoyed with white list After failure, the credit grade before can determining user is lower, and there are bad credit record, user enjoys first to enjoy pays class industry afterwards Business there are fund bad debt risk, need further exist for obtaining the strategy system of interception in advance disposed in advance is on probation to user or use into Row identification.
Step S2438 obtains the second identification condition, obtains default knowledge if target object and white list successful match Other condition.
Specifically, the second above-mentioned identification condition can be determining user after white list, tries out or uses with user Corresponding prevention and control strategy system, for example, it may be wholesale is put one's cards on the table strategy system in advance.
It should be noted that bad letter is not present since the user in white list is that credit grade is higher in historical operation With the user of record, fund bad debt risk is not present in order to ensure user this time operates, needs strategy of putting one's cards on the table by wholesale in advance System is on probation to user or use identifies.
In a kind of optional scheme, judge it is on probation or using first enjoying the user for paying class afterwards and white list successful match Later, the level of signal before can determining user is higher, and bad credit record is not present, and user enjoys first to enjoy pays class business afterwards There is no fund bad debt risk, it is on probation to user or make to need further exist for obtaining the wholesale in advance disposed in advance strategy system of putting one's cards on the table With being identified.
For example, as shown in figure 3, user log in after, user can select on service selection interface need try out or Class product or service are paid in first enjoying for using afterwards, after the behavior for detecting that user is on probation or using, whether first determine whether user White list user, if it is judged that user is not white list user, then it is available it is corresponding intercept strategy system in advance, and The behavior that user is on probation or uses is identified by intercepting strategy system in advance;If it is judged that user fails, name is applied alone Family, then available corresponding wholesale in advance is put one's cards on the table strategy system, and on probation to user by the strategy system of putting one's cards on the table of wholesale in advance Or the behavior used is identified.
In the above embodiments of the present application, step S26 identifies preset kind behavior according to default identification condition, obtains To recognition result, comprising:
Step S2612, judges whether preset kind behavior meets default identification condition.
Step S2614, if preset kind behavior is unsatisfactory for default identification condition, obtaining recognition result is that there is no behaviour Make risk, and starts to execute usage behavior.
Step S2616 obtains recognition result if preset kind behavior meets default identification condition to there is operation wind Danger.
In a kind of optional scheme, for user's registration, the behavior that user logs in and user tries out or uses, above-mentioned row To be the behavior paid before class business begins to use after formerly enjoying, different behaviors are corresponding with different prevention and control strategy systems, when need When being identified with corresponding prevention and control strategy system, it can be determined that whether behavior hits corresponding prevention and control strategy system, if Hit, then can determine that the credit grade of user is lower, and there are bad credit record, user enjoys first to enjoy pays the presence of class business afterwards Fund bad debt risk needs further to carry out identification judgement by manually trial;If miss, the letter of user can be determined With higher ranked, it is not present bad credit record, user enjoys first to enjoy and pays class business afterwards fund bad debt risk is not present, then can be with Start to execute usage behavior.
It should be noted that due to the behavior that user successively registers, logs in and tries out or uses, when determining that user infuses Volume miss intercepts strategy system in advance when, then the behavior of user's login can be continued to execute;When determine user log in miss When intercepting strategy system in advance, then the behavior that user is on probation or uses can be continued to execute;When determining that user is on probation or using not Hit intercepts strategy system in advance when, then it can start first to enjoy the use for paying class business afterwards operation, that is, starting in user's use Behavior.
For example, as shown in figure 3, when determining needing that user's registration, user are logged in or used by intercepting strategy system in advance When the behavior that family is tried out or used is identified, it can be determined that user's registration, the behavior that user logs in or user tries out or uses Whether hit and intercept strategy system in advance, if hit, need further to log in user's registration, user or user it is on probation or The behavior used is identified;If miss, first enjoys and pay the use of class business afterwards and can start.When needs pass through wholesale in advance When strategy system of putting one's cards on the table is on probation to user or use identifies, it can be determined that whether the behavior that user tries out or uses hits thing Preceding wholesale is put one's cards on the table strategy system, if hit, needs further to identify the behavior that user is on probation or uses;If not Hit then first enjoys and pays the use of class business afterwards and can start.
In the above embodiments of the present application, in step S2616, obtaining recognition result is this method there are after operational risk Further include following steps:
Step S28 audits preset kind behavior, obtains the first auditing result.
In a kind of optional scheme, if user's registration, the behavior hit thing that user logs in or user tries out or uses Preceding interception strategy system or user be on probation or the behavior hit that uses wholesale is put one's cards on the table strategy system in advance, then can be by artificial The behavior that the mode of trial logs in user's registration, user or user is on probation or uses is audited, and judges the credit etc. of user Grade, and whether there is bad credit record, so that judge that user enjoys first to enjoy pays class business with the presence or absence of fund bad credit afterwards Risk.
It is corresponding to judge whether there is preset kind behavior if the first auditing result is that the audit fails by step S210 Query information.
Specifically, above-mentioned query information refers to whether user seeks advice from.
In a kind of optional scheme, it can further judge whether user consults if artificial trial does not pass through It askes.
Step S212, if it is determined that there are query informations, then judge whether to need to obtain the corresponding letter of preset kind behavior Breath.
Specifically, the above-mentioned corresponding information of preset kind behavior can be user's materials to be submitted.
In a kind of optional scheme, if user carried out consulting, it can further judge whether user needs to mention Hand over material.
Step S214, if it is determined that need to obtain the corresponding information of preset kind behavior, then obtain preset kind behavior pair The information answered, and the corresponding information of preset kind behavior is audited, obtain the second auditing result.
In a kind of optional scheme, if it is determined that user needs to submit material, then can further submit to user Material is audited.
Step S216, if the first auditing result or the second auditing result are that audit passes through, return re-executes acquisition The step of order behavior corresponding default identification condition.
It, can be with if the material audit that artificial trial passes through or user submits passes through in a kind of optional scheme The corresponding prevention and control strategy system of behavior that user is on probation or uses is obtained, that is, judging whether user is white list user, specifically Judgment method such as foregoing description, this will not be repeated here.
Step S218, if it is determined that query information is not present, does not need to obtain the corresponding information of preset kind behavior or the Two auditing results are that the audit fails, then start to execute usage behavior.
In a kind of optional scheme, if user does not seek advice from perhaps user and does not need to submit material or user The material of submission does not pass through audit, then can determine that the credit grade of user is higher, and bad credit record is not present, and user enjoys It first enjoys and pays class business afterwards there is no fund bad debt risk, then can start to execute usage behavior.
It should be noted that due to the behavior that user successively registers, logs in and tries out or uses, for user's registration Behavior, if user do not seek advice from the material that perhaps user does not need that material or user is submitted to submit do not pass through it is careful Core can then continue to execute the behavior of user's login;For the behavior that user logs in, if user does not seek advice from, Huo Zheyong The material that family does not need that material or user is submitted to submit does not pass through audit, then can continue to execute what user tried out or used Behavior;For the behavior that user is on probation or uses, if user do not seek advice from perhaps user do not need to submit material or The material that user submits does not pass through audit, then can start first to enjoy the use for paying class business afterwards operation, use that is, starting user In behavior.
For example, as shown in figure 3, the behavior hit in user intercepts strategy system in advance or wholesale is put one's cards on the table strategy system in advance Later, it needs manually to be tried, and judges whether to pass through, if passed through, judge whether user is white list user, if Do not pass through, then continue to judge whether user seeks advice from, if do not seeked advice from, first enjoy and pay the use of class business afterwards and can start, if consulted It askes, then further determines whether to need to submit material, can start if it is not required, then first enjoying and paying the use of class business afterwards, if It needs, then whether further judgement material is audited and passed through, if passed through, judges whether user is white list user, if not Pass through, then first enjoys and pay the use of class business afterwards and can start.As shown in figure 3, user's registration, user are logged in and user it is on probation or It three behaviors such as uses, forms a closed loop prevention and control system, be more bonded the development of business.
In the above embodiments of the present application, step S24 obtains the corresponding default identification condition of preset kind behavior, comprising:
Step S2442 obtains third and identifies condition, obtains default identification condition.
Specifically, above-mentioned third identification condition, which can be, observes user's totality behavior, pre-set prevention and control Strategy system, for example, it may be off-line strategy system.
In a kind of optional scheme, during user operates, can preset kind behavior to user into Row totality behavior observation, obtains off-line strategy system, and know to the preset kind behavior of user by off-line strategy system Not.
Step S26 identifies preset kind behavior according to default identification condition, obtains recognition result, comprising:
Step S2622, judges whether preset kind behavior meets third identification condition.
S2624, if it is determined that preset kind behavior is unsatisfactory for third identification condition, then obtaining recognition result is that there is no behaviour Make risk, and continues to execute object run.
S2626, if it is determined that preset kind behavior meets third identification condition, then obtains recognition result to there is operation wind Danger.
In a kind of optional scheme, when needing to identify to the preset kind behavior of user by off-line strategy system When, it can be determined that whether preset kind behavior hits off-line strategy system, if miss, can determine the credit etc. of user Grade it is higher, be not present bad credit record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk, then can be with user It can be used normally first to enjoy and pay class business afterwards;If miss, it can determine that the credit grade of user is lower, there are bad letters With record, user enjoys first to enjoy pays class business there are fund bad debt risk afterwards, needs further to know preset kind behavior Do not judge.
For example, as shown in figure 3, can carry out overall behavior to the behavior of user after user starts to operate and see It examines, and judges whether the behavior of user hits strategy system, if miss, user be can be used normally;If hit, It needs further to judge whether product has malicious act.
In the above embodiments of the present application, in step S2614 or step S218, starts to execute usage behavior or S2626, determine After preset kind behavior meets third identification condition, this method further includes following steps:
Step S222, judges whether usage behavior belongs to malicious act.
Specifically, above-mentioned malicious act can refer to that user illegally uses product or service, for example, user is not deliberately true Recognize to receive first to enjoy and pays class product afterwards.The use of class business is paid after formerly enjoying to start, or by overall behavior observation, judges user Behavior miss off-line strategy system after, by judging in user's use with the presence or absence of malicious act, it can be determined that current User first enjoys the operational risk paid class business afterwards, but do not pay expense with the presence or absence of enjoyment.
Step S224, if it is determined that usage behavior belongs to malicious act, then is immediately performed order and generates behavior and paying bank For.
In a kind of optional scheme, there are in the case where malicious act in determining user's use, user can be determined Credit grade it is lower, there are bad credit record, user enjoys first to enjoy and pays class business afterwards there are fund bad debt risks, in order to keep away Exempt from fund bad debt risk, charging can be shifted to an earlier date, generate corresponding order, and reminds that user pays the bill namely user holds in advance Row order generates and delivery operation.
Step S226, if it is determined that usage behavior is not belonging to malicious act, then execution of order generates behavior after preset time And payment behavior.
Specifically, above-mentioned preset time can be first enjoying and paying class business corresponding metering period afterwards for user's selection.
In a kind of optional scheme, in the case where malicious act is not present in determining user's use, use can be determined The credit grade at family is higher, be not present bad credit record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk, Then user can be used normally, and can produce corresponding order when metering period reaches, and user is reminded to pay the bill, That is, user's execution of order after metering period arrival generates and delivery operation.
For example, as shown in figure 3, sentencing after a pair class business use can start after formerly enjoying, and after overall behavior observation It is disconnected to go out to hit off-line strategy system, then it may determine that product using whether having malicious act, if so, then shifting to an earlier date charging, is gone forward side by side Row is withholdd;If it is not, metering period expense generates, and withhold.
In the above embodiments of the present application, in step S224 or step S226, after executing payment behavior, this method further includes Following steps:
Step S228, judges whether payment behavior runs succeeded.
Step S230, if it is determined that payment behavior runs succeeded, then continues to execute object run, and performance objective is operated Target object typing white list.
Step S232, if it is determined that payment behavior executes failure, then stops performance objective operation, and by target object typing Blacklist.
In a kind of optional scheme, after detecting that charging is withholdd, it can be determined that it withholds and whether succeeds, if at Function, it is determined that user has paid corresponding expense, then can determine that the credit grade of user is higher, and there is no bad credits to remember Record, user enjoy first enjoy pay afterwards class business be not present fund bad debt risk, further, user can be used normally first to enjoy and pay afterwards Class business, and white list is added in user;If it fails, then determining that user does not pay corresponding expense, can determine user Credit grade it is lower, there are bad credit record, user enjoys first to enjoy and pays class business afterwards there are fund bad debt risks, further Ground terminates user using first enjoying and pays class business afterwards, and blacklist is added in user.
For example, as shown in figure 3, after being withholdd, it can be determined that withhold and whether succeed, used if it succeeds, determining Family has paid corresponding expense, so that it is determined that user can be used normally and record white list;If it fails, then determining user not Corresponding expense is paid, uses so that it is determined that user terminates and records blacklist.
Through the above scheme, it is fought by the preset kind behavior higher slice prevention and control used in user, rather than being directed to is No can be used carrys out prevention and control, is the layering closed loop prevention and control principle of more architecture, the development of business is more bonded, so that realizing will provide Golden bad debt risk is controlled to minimum.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, the technical solution of the application is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the application.
Embodiment 2
According to the embodiment of the present application, a kind of embodiment of the recognition methods of operational risk is additionally provided, it should be noted that Step shown in the flowchart of the accompanying drawings can execute in a computer system such as a set of computer executable instructions, and It, in some cases, can be to be different from sequence execution institute herein and although logical order is shown in flow charts The step of showing or describing.
Fig. 4 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 2.As shown in figure 4, the party Method may include steps of:
Step S42 shows in display interface and executes interface, wherein operation interface is the preset kind row of object run For corresponding interface, preset kind behavior is generated during performance objective operates for characterizing, and to operational risk There are the behaviors of influence.
Specifically, above-mentioned display interface can be display circle on the display screen of mobile terminal or terminal Face, mobile terminal may include: smart phone (including Android phone and IOS mobile phone), IPAD, tablet computer, palm PC Etc. equipment, but be not limited only to this, the application is not especially limited this;Above-mentioned operation interface can be user and execute default class The interface of type behavior, for example, user carries out the register interface of account registration, user carries out the login interface etc. of account login, leads to It crosses the operation for executing user in operation interface to detect, can detecte the preset kind behavior of user;Above-mentioned target Operation can be first to enjoy pays class business corresponding operation afterwards, and first enjoying and paying class business afterwards may include first enjoying paying class product kimonos afterwards Business, above-mentioned operational risk can be the fund bad debt risk first enjoyed and paid in class business afterwards, can be to first enjoying the fortune for paying class business afterwards Battalion's cost causes very big threat.
Class business is paid afterwards for first enjoying, user needs logon account, and it selects the product being desirable for or service and places an order, quotient Corresponding product is sent to user or provides a user corresponding service by family, is used the product by the user or is serviced, works as billing period When arrival, an order can be generated from the background, and user can pay according to the order of generation, complete the charging of product or service It withholds.For example, user can select first to enjoy the iPhone8 mobile phone for paying class afterwards on electric business platform, user's logon account is being determined Later, it can complete to place an order, user can be used 10 days (that is, metering period is 10 days) after receiving iPhone8 mobile phone, User needs to complete the payment of corresponding fund in 10 days.
From the foregoing, it will be observed that user needs to carry out multi-pass operation, and then generate more during enjoyment first enjoys and pays class business afterwards Kind operation behavior, that is, object run can generate a variety of operation behaviors in the process of implementation, and some of them are related to account peace Entirely, the behavior for the items such as order is submitted and payment is withholdd, causes shadow to the fund bad debt risk for paying class business afterwards is entirely first enjoyed It rings, if user carries out illegal operation in certain operating process, for example, user's not payment, then will lead to first to enjoy and pay afterwards There is fund bad debt risk in class business, that is, leading to object run, there are operational risks.Therefore, operational risk will can be deposited It is determined as preset kind behavior in the behavior of influence, and by carrying out discriminance analysis to preset kind behavior, to obtain entire The recognition result of object run.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior, Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards, The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment Behavior).
It should be noted that user needs to carry out multi-pass operation, grasp every time during enjoyment first enjoys and pays class business afterwards It requires to carry out in corresponding operation interface, by detecting user's operation, so that it is determined that the behavior that user is current It whether is preset kind behavior.
Step S44 shows recognition result, wherein recognition result is according to the corresponding default identification item of preset kind behavior Part is identified that recognition result whether there is for characterizing during performance objective operates to preset kind behavior Operational risk.
Specifically, above-mentioned default identification condition can be in advance for different preset kind behaviors dispose in advance it is different Risk prevention system strategy system, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, off-line strategy System, wherein intercepting strategy system in advance can be before user begins to use product or service, block to illegal act Whether the strategy cut needs to intercept to be illegal act by the behavior that the strategy may determine that user executes;Wholesale in advance Strategy system of putting one's cards on the table can be before user begins to use product or service, be confirmed to the wholesale ability to pay of user Strategy, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system can be judgement and use Whether family is offline, that is, the strategy of client can not be related to, uses to may determine that whether user is sincere by the strategy. If the preset kind behavior of user is hit corresponding prevention and control strategy system and can then be determined for example, user is illegally registered The credit grade of user is lower, there is the operational risk for not paying expense, may thereby determine that first to enjoy and pays class business afterwards in the presence of money Golden bad debt risk, that is, determining object run, there are operational risks;If the preset kind behavior miss of user is corresponding anti- Strategy system is controlled, then can determine that the credit grade of user is higher, there is no the operational risks for not paying expense, so as to true Fixed first enjoy pays class business afterwards there is no fund bad debt risk, that is, determining that operational risk is not present in object run.
It, can be to the operation of user during user's enjoyment first enjoys and pays class business afterwards in a kind of optional scheme Behavior is monitored in real time, can be according to corresponding prevention and control when the behavior for detecting that user executes belongs to preset kind behavior Strategy system identifies the behavior of user, to judge the credit grade of user, further determines that first to enjoy and pays class business afterwards With the presence or absence of fund bad debt risk, a closed loop prevention and control system is formed, the development of business is more bonded.
As shown in figure 3, can determine that preset kind behavior includes: user's registration, user logs in, user is on probation or use, User is in use, user's payment is withholdd, wherein user's registration, user log in and user is on probation or there are two types of prevention and control using corresponding to Strategy system is to intercept strategy system in advance and wholesale is put one's cards on the table strategy system in advance respectively;All preset kind behaviors are corresponding with Off-line strategy system.After detecting the preset kind behavior of user, need to judge preset kind behavior, and obtain Corresponding prevention and control strategy system is got, and preset kind behavior is identified by prevention and control strategy system, by all pre- If type behavior is identified, available final recognition result.
Scheme provided by the above embodiments of the present application 2 can be by pre- in display interface after operation display interface If the corresponding default identification condition of type behavior identifies preset kind behavior, the identification with the presence or absence of operational risk is obtained As a result, and show recognition result, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 2 provided by the present application solves the recognition methods of operational risk in the prior art as a result, Accuracy is low, and operates the high technical problem of threshold.
Embodiment 3
According to the embodiment of the present application, additionally provide a kind of for implementing the operational risk of the recognition methods of aforesaid operations risk Identification device, as shown in figure 5, the device 500 includes: that the first acquisition module 502, second obtains module 504 and identification module 506。
Wherein, the first acquisition module 502 is used to obtain the preset kind behavior of object run, wherein preset kind behavior Caused by during for characterizing performance objective operation, and there is the behavior influenced to operational risk;Second obtains module 504 for obtaining the corresponding default identification condition of preset kind behavior;Identification module 506 is used for according to default identification condition to pre- If type behavior is identified, obtain recognition result, wherein recognition result for characterize performance objective operation during whether There are operational risks.
Specifically, above-mentioned object run can be first to enjoy pays class business corresponding operation afterwards, first enjoy pay class business afterwards can To include first enjoying paying class products & services afterwards, above-mentioned operational risk can be the fund bad credit wind first enjoyed and paid in class business afterwards Danger, can cause very big threat to the operation cost for paying class business afterwards is first enjoyed.Above-mentioned default identification condition can be is in advance The different risk prevention system strategy systems that different preset kind behaviors are disposed in advance, for example, may include: to intercept tactful body in advance System, wholesale is put one's cards on the table strategy system in advance, off-line strategy system, wherein is intercepted strategy system in advance and be can be and starts to make in user Before product or service, to the strategy that illegal act is intercepted, to may determine that the row that user executes by the strategy Whether to be illegal act, need to intercept;Wholesale strategy system of putting one's cards on the table can be and begin to use product or service in user in advance Before, the strategy wholesale ability to pay of user confirmed, to may determine that whether user has greatly by the strategy Volume ability to pay;Off-line strategy system can be judge whether user is offline, that is, the strategy of client can not be related to, thus It may determine that whether user is sincere by the strategy to use.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior, Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards, The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment Behavior).
Herein it should be noted that above-mentioned first acquisition module 502, second obtains module 504 and identification module 506 is corresponding Step S22 to step S26 in embodiment 1, three modules are identical as example and application scenarios that corresponding step is realized, But it is not limited to the above embodiments 1 disclosure of that.It should be noted that above-mentioned module can be run as a part of of device In the terminal 10 that embodiment 1 provides.
Scheme provided by the above embodiments of the present application 3 can be with after getting the preset kind behavior of object run The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition, The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 3 provided by the present application solves the recognition methods of operational risk in the prior art as a result, Accuracy is low, and operates the high technical problem of threshold.
In the above embodiments of the present application, the second acquisition module includes: the first judging submodule, the first acquisition submodule and the One implementation sub-module.
Wherein, the first judging submodule is used in the case where preset kind behavior includes: registration behavior, judges registration row Whether to be illegal registration behavior;If the first acquisition submodule is illegal registration behavior for registering behavior, first is obtained Identification condition obtains default identification condition;If the first implementation sub-module is not illegal registration behavior for registering behavior, after Continuous performance objective operation.
In the above embodiments of the present application, the second acquisition module includes: second judgment submodule, the second acquisition submodule and the Two implementation sub-modules.
Wherein, second judgment submodule is used in the case where preset kind behavior includes: login behavior, judges to log in row For with the presence or absence of batch operation risk;If the second acquisition submodule is obtained for logging in behavior there are batch operation risk First identification condition, obtains default identification condition;If batch operation wind is not present for logging in behavior in the second implementation sub-module Danger, then continue to execute object run.
In the above embodiments of the present application, the second acquisition module includes: third acquisition submodule, matched sub-block, the 4th obtains Take submodule and the 5th acquisition submodule.
Wherein, third acquisition submodule is used in the case where preset kind behavior includes: order behavior, is obtained to execute and be ordered The target object of purchase behavior;Matched sub-block is for matching target object with white list;4th acquisition submodule is used for If target object is with white list, it fails to match, obtains the first identification condition, obtains default identification condition;5th obtains submodule If block obtains the second identification condition, obtains default identification condition for target object and white list successful match.
In the above embodiments of the present application, identification module include: third judging submodule, first processing submodule and second at Manage submodule.
Wherein, third judging submodule is for judging whether preset kind behavior meets default identification condition;First processing If submodule is unsatisfactory for default identification condition for preset kind behavior, obtain recognition result be there is no operational risk, And start to execute usage behavior;If second processing submodule meets default identification condition for preset kind behavior, obtain Recognition result is that there are operational risks.
In the above embodiments of the present application, the device further include: the first auditing module, first judgment module, second judge mould Block, the second auditing module and the first execution module.
Wherein, the first auditing module obtains the first auditing result for auditing to preset kind behavior;First judgement If module is that the audit fails for the first auditing result, the corresponding inquiry letter of preset kind behavior is judged whether there is Breath;Second judgment module is used for if it is determined that there are query information, then judges whether to need to obtain preset kind behavior corresponding Information;Second auditing module is used to then obtain preset kind row if it is determined that need to obtain the corresponding information of preset kind behavior For corresponding information, and the corresponding information of preset kind behavior is audited, obtains the second auditing result;Second obtains module If being also that audit passes through with the first auditing result or the second auditing result, it is corresponding that return re-executes acquisition order behavior The step of default identification condition;First execution module is used to not need to obtain preset kind if it is determined that there is no query information The corresponding information of behavior or the second auditing result are that the audit fails, then start to execute usage behavior.
In the above embodiments of the present application, the second acquisition module includes: the 6th acquisition submodule, and identification module includes: the 4th Judging submodule, third processing module and fourth processing module.
Wherein, the 6th acquisition submodule obtains default identification condition for obtaining third identification condition;4th judges submodule Block is for judging whether preset kind behavior meets third identification condition;Third processing module is used for if it is determined that preset kind row Condition is identified to be unsatisfactory for third, then obtaining recognition result is that there is no operational risks, and continue to execute object run;Everywhere Reason module is used for if it is determined that preset kind behavior meets third identification condition, then obtaining recognition result is that there are operational risks.
In the above embodiments of the present application, the device further include: third judgment module, the second execution module and third execute mould Block.
Wherein, third judgment module is for judging whether usage behavior belongs to malicious act;Second execution module is for such as Fruit determines that usage behavior belongs to malicious act, then is immediately performed order and generates behavior and payment behavior;Third execution module is used for If it is determined that usage behavior is not belonging to malicious act, then execution of order generates behavior and payment behavior after preset time.
In the above embodiments of the present application, the device further include: the 4th judgment module, the 4th execution module and the 5th execute mould Block.
Wherein, the 4th judgment module is for judging whether payment behavior runs succeeded;If the 4th execution module is for true Determine payment behavior to run succeeded, then continues to execute object run, and the target object typing white list that performance objective is operated;The Five execution modules are used to then stop performance objective and operate, and target object typing is black if it is determined that payment behavior executes failure List.
Embodiment 4
According to the embodiment of the present application, additionally provide a kind of for implementing the operational risk of the recognition methods of aforesaid operations risk Identification device, as shown in fig. 6, the device 600 includes: the first display module 602 and the second display module 604.
Wherein, the first display module 602 is used for the operation display interface in display interface, wherein operation interface is target Interface corresponding to the preset kind behavior of operation, produced by preset kind behavior is for characterizing during performance objective operates , and there is the behavior influenced to operational risk;Second display module 604 is for showing recognition result, wherein recognition result is According to the corresponding default identification condition of preset kind behavior, preset kind behavior is identified, recognition result is used for It whether there is operational risk during characterizing performance objective operation.
Specifically, above-mentioned display interface can be display circle on the display screen of mobile terminal or terminal Face, mobile terminal may include: smart phone (including Android phone and IOS mobile phone), IPAD, tablet computer, palm PC Etc. equipment, but be not limited only to this, the application is not especially limited this;Above-mentioned operation interface can be user and execute default class The interface of type behavior, for example, user carries out the register interface of account registration, user carries out the login interface etc. of account login, leads to It crosses the operation for executing user in operation interface to detect, can detecte the preset kind behavior of user;Above-mentioned target Operation can be first to enjoy pays class business corresponding operation afterwards, and first enjoying and paying class business afterwards may include first enjoying paying class product kimonos afterwards Business, above-mentioned operational risk can be the fund bad debt risk first enjoyed and paid in class business afterwards, can be to first enjoying the fortune for paying class business afterwards Battalion's cost causes very big threat.Above-mentioned default identification condition can be different preset kind behaviors in advance and dispose in advance Different risk prevention system strategy systems, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, from Line strategy system, wherein intercepting strategy system in advance can be before user begins to use product or service, to illegal act Whether the strategy intercepted needs to intercept to be illegal act by the behavior that the strategy may determine that user executes;Thing Preceding wholesale strategy system of putting one's cards on the table can be before user begins to use product or service, carry out to the wholesale ability to pay of user The strategy of confirmation, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system can be Judge whether user is offline, that is, the strategy of client can not be related to, to may determine that whether user is sincere by the strategy It uses.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior, Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards, The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment Behavior).
Herein it should be noted that above-mentioned first display module 602 and the second display module 604 correspond in embodiment 2 Step S42 to step S44, two modules are identical as example and application scenarios that corresponding step is realized, but are not limited to State 2 disclosure of that of embodiment.It should be noted that above-mentioned module may operate in embodiment 1 as a part of device In the terminal 10 of offer.
Scheme provided by the above embodiments of the present application 4 can be by pre- in display interface after operation display interface If the corresponding default identification condition of type behavior identifies preset kind behavior, the identification with the presence or absence of operational risk is obtained As a result, and show recognition result, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 4 provided by the present application solves the recognition methods of operational risk in the prior art as a result, Accuracy is low, and operates the high technical problem of threshold.
Embodiment 5
According to the embodiment of the present application, a kind of identifying system of operational risk is additionally provided, comprising:
Processor;And
Memory is connect with processor, for providing the instruction for handling following processing step for processor: obtaining target behaviour The preset kind behavior of work, wherein preset kind behavior is generated behavior during performance objective operation;It obtains default The corresponding default identification condition of type behavior;Preset kind behavior is identified according to default identification condition, obtains identification knot Fruit, wherein recognition result is for characterizing during performance objective operates with the presence or absence of operational risk.
Scheme provided by the above embodiments of the present application 5 can be with after getting the preset kind behavior of object run The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition, The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 5 provided by the present application solves the recognition methods of operational risk in the prior art as a result, Accuracy is low, and operates the high technical problem of threshold.
Embodiment 6
According to the embodiment of the present application, a kind of embodiment of the recognition methods of operational risk is provided, it should be noted that In The step of process of attached drawing illustrates can execute in a computer system such as a set of computer executable instructions, also, It, in some cases, can be to be different from shown in sequence execution herein although logical order is shown in flow charts The step of out or describing.
Fig. 7 is the flow chart according to a kind of recognition methods of operational risk of the embodiment of the present application 6.As shown in fig. 7, the party Method may include steps of:
Step S72 obtains the preset kind behavior of object run, wherein object run is to carry out when executing transaction business Operation, preset kind behavior for characterize performance objective operation during caused by, and on operational risk exist influence Behavior.
Specifically, above-mentioned transaction business can be first to enjoy pays class business afterwards, may include first enjoying paying class product kimonos afterwards Business, above-mentioned operational risk can be the fund bad debt risk first enjoyed and paid in class business afterwards, can be to first enjoying the fortune for paying class business afterwards Battalion's cost causes very big threat.
In the application scenarios for paying class business after formerly enjoying, user needs logon account, selects the product being desirable for or clothes It is engaged in and places an order, corresponding product is sent to user or provides a user corresponding service by businessman, and it uses the product by the user or services, When billing period reach when, an order can be generated from the background, user can pay according to the order of generation, complete product or The charging of service is withholdd.For example, user can select first to enjoy the iPhone8 mobile phone for paying class afterwards on electric business platform, used determining It after the logon account of family, can complete to place an order, user can be used 10 days (that is, charging is all after receiving iPhone8 mobile phone Phase is 10 days), user needs to complete the payment of corresponding fund in 10 days.
From the foregoing, it will be observed that user needs to carry out multi-pass operation, and then generate more during enjoyment first enjoys and pays class business afterwards Kind operation behavior, that is, object run can generate a variety of operation behaviors in the process of implementation, and some of them are related to account peace Entirely, the behavior for the items such as order is submitted and payment is withholdd, causes shadow to the fund bad debt risk for paying class business afterwards is entirely first enjoyed It rings, if user carries out illegal operation in certain operating process, for example, user's not payment, then will lead to first to enjoy and pay afterwards There is fund bad debt risk in class business, that is, leading to object run, there are operational risks.Therefore, operational risk will can be deposited It is determined as preset kind behavior in the behavior of influence, and by carrying out discriminance analysis to preset kind behavior, to obtain entire The recognition result of object run.
Optionally, preset kind behavior may include following one or more: registration behavior, log in behavior, order behavior, Usage behavior, order generate behavior and payment behavior.
Specifically, above-mentioned preset kind behavior can be the critical behavior of user's execution, first enjoys and pays class business difference afterwards, The operation that user needs to be implemented is different, and the preset kind behavior obtained from is also different, the row that preset kind behavior specifically includes For that can pay class business afterwards according to first enjoying and be determined.The major part provided on internet is first enjoyed and pays class business afterwards, is preset Type behavior may include multiple, that is, obtaining preset kind behavior sequence, can specifically include: registration, login, order make It is generated with (i.e. above-mentioned usage behavior) in (i.e. above-mentioned order behavior), use, order and charging is withholdd (i.e. above-mentioned payment Behavior).
Step S74 obtains the corresponding default identification condition of preset kind behavior, wherein default identification condition is for determining Risk prevention system strategy when transaction business operates.
Specifically, above-mentioned default identification condition can be in advance as the different risks of different preset kind behaviors deployment Prevention and control strategy system, for example, may include: to intercept that strategy system, wholesale is put one's cards on the table strategy system in advance in advance, off-line strategy body System, wherein intercepting strategy system in advance can be before user begins to use product or service, intercept to illegal act Strategy, thus by the strategy may determine that user execute behavior whether be illegal act, need to intercept;Wholesale is bright in advance Bottom strategy system can be before user begins to use product or service, the plan confirmed to the wholesale ability to pay of user Slightly, to may determine that whether user has wholesale ability to pay by the strategy;Off-line strategy system, which can be, judges user It is whether offline, that is, the strategy of client can not be related to, used to may determine that whether user is sincere by the strategy.
Step S76 identifies preset kind behavior according to risk prevention system strategy, determines the process of transaction business operation In whether there is operational risk.
Specifically, if corresponding prevention and control strategy system is hit in the preset kind behavior of user, for example, user carries out illegally Registration, then can determine that the credit grade of user is lower, has the operational risk for not paying expense, may thereby determine that after first enjoying Paying class business, there are fund bad debt risks, that is, determining object run, there are operational risks;If the preset kind behavior of user The corresponding prevention and control strategy system of miss can then determine that the credit grade of user is higher, and there is no the operations for not paying expense Risk may thereby determine that first to enjoy and pay class business afterwards there is no fund bad debt risk, that is, determining object run, there is no operations Risk.
It, can be to the operation of user during user's enjoyment first enjoys and pays class business afterwards in a kind of optional scheme Behavior is monitored in real time, can be according to corresponding prevention and control when the behavior for detecting that user executes belongs to preset kind behavior Strategy system identifies the behavior of user, to judge the credit grade of user, further determines that first to enjoy and pays class business afterwards With the presence or absence of fund bad debt risk, a closed loop prevention and control system is formed, the development of business is more bonded.
Scheme provided by the above embodiments of the present application 6 can be with after getting the preset kind behavior of object run The corresponding default identification condition of preset kind behavior is obtained, and preset kind behavior is identified by default identification condition, The recognition result with the presence or absence of operational risk is obtained, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
The scheme of above-described embodiment 6 provided by the present application solves the recognition methods of operational risk in the prior art as a result, Accuracy is low, and operates the high technical problem of threshold.
Embodiment 7
Embodiments herein can provide a kind of terminal, which can be in terminal group Any one computer terminal.Optionally, in the present embodiment, above-mentioned terminal also could alternatively be mobile whole The terminal devices such as end.
Optionally, in the present embodiment, above-mentioned terminal can be located in multiple network equipments of computer network At least one network equipment.
In the present embodiment, above-mentioned terminal can execute the program of following steps in the recognition methods of operational risk Code: the preset kind behavior of object run is obtained, wherein during preset kind behavior is for characterizing performance objective operation It is generated, and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to pre- If identification condition identifies preset kind behavior, recognition result is obtained, wherein recognition result is for characterizing performance objective behaviour It whether there is operational risk during work.
Optionally, Fig. 8 is the structural block diagram according to a kind of terminal of the embodiment of the present application.As shown in figure 8, the meter Calculation machine terminal A may include: one or more (one is only shown in figure) processors 802 and memory 804.
Wherein, memory can be used for storing software program and module, such as the knowledge of the operational risk in the embodiment of the present application Corresponding program instruction/the module of other method and apparatus, the software program and mould that processor is stored in memory by operation Block realizes the recognition methods of above-mentioned operational risk thereby executing various function application and data processing.Memory can wrap Include high speed random access memory, can also include nonvolatile memory, as one or more magnetic storage device, flash memory or Other non-volatile solid state memories of person.In some instances, memory can further comprise remotely located relative to processor Memory, these remote memories can pass through network connection to terminal A.The example of above-mentioned network includes but is not limited to interconnect Net, intranet, local area network, mobile radio communication and combinations thereof.
Processor can call the information and application program of memory storage by transmitting device, to execute following step: Obtain the preset kind behavior of object run, wherein preset kind behavior is produced for characterizing during performance objective operates Raw, and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to default knowledge Other condition identifies preset kind behavior, obtains recognition result, wherein recognition result is used to characterize performance objective operation It whether there is operational risk in the process.
Optionally, the program code of following steps can also be performed in above-mentioned processor: preset kind behavior includes as next Kind is a variety of: registration behavior logs in behavior, orders behavior, usage behavior, order generation behavior and payment behavior.
Optionally, the program code of following steps can also be performed in above-mentioned processor: including: registration in preset kind behavior In the case where behavior, judge the behavior of registering whether as illegal registration behavior;If the behavior of registration is illegal registration behavior, obtain First identification condition, obtains default identification condition;If the behavior of registration is not illegal registration behavior, target behaviour is continued to execute Make.
Optionally, the program code of following steps can also be performed in above-mentioned processor: including: to log in preset kind behavior In the case where behavior, judge login behavior with the presence or absence of batch operation risk;If the behavior of login there are batch operation risk, The first identification condition is obtained, default identification condition is obtained;If batch operation risk is not present in the behavior of login, mesh is continued to execute Mark operation.
Optionally, the program code of following steps can also be performed in above-mentioned processor: including: to order in preset kind behavior In the case where behavior, the target object for executing order behavior is obtained;Target object is matched with white list;If target pair As it fails to match with white list, then the first identification condition is obtained, default identification condition is obtained;If target object and white list With success, then the second identification condition is obtained, default identification condition is obtained.
Optionally, the program code of following steps can also be performed in above-mentioned processor: judging whether preset kind behavior is full The default identification condition of foot;If preset kind behavior is unsatisfactory for default identification condition, obtaining recognition result is that there is no operations Risk, and start to execute usage behavior;If preset kind behavior meets default identification condition, recognition result is obtained to exist Operational risk.
Optionally, the program code of following steps can also be performed in above-mentioned processor: grasping obtaining recognition result to exist After making risk, preset kind behavior is audited, obtains the first auditing result;If the first auditing result is that audit is not led to It crosses, then judges whether there is the corresponding query information of preset kind behavior;If it is determined that then judging whether to need there are query information Obtain the corresponding information of preset kind behavior;If it is determined that needing to obtain the corresponding information of preset kind behavior, then obtain pre- If the corresponding information of type behavior, and the corresponding information of preset kind behavior is audited, obtain the second auditing result;If First auditing result or the second auditing result are that audit passes through, then return and re-execute the corresponding default identification of acquisition order behavior The step of condition;If it is determined that query information is not present, do not need to obtain the corresponding information of preset kind behavior or the second audit As a result for the audit fails, then start to execute usage behavior.
Optionally, the program code of following steps can also be performed in above-mentioned processor: obtaining third identification condition, obtains pre- If the condition of identification;Judge whether preset kind behavior meets third identification condition;If it is determined that preset kind behavior is unsatisfactory for Three identification conditions, then obtaining recognition result is that there is no operational risks, and continue to execute object run;If it is determined that preset kind Behavior meets third identification condition, then obtaining recognition result is that there are operational risks.
Optionally, the program code of following steps can also be performed in above-mentioned processor: start execute usage behavior or really Determine to judge whether usage behavior belongs to malicious act after preset kind behavior meets third identification condition;If it is determined that using Behavior belongs to malicious act, then is immediately performed order and generates behavior and payment behavior;If it is determined that usage behavior is not belonging to malice Behavior, then execution of order generates behavior and payment behavior after preset time.
Optionally, the program code of following steps can also be performed in above-mentioned processor: after executing payment behavior, judgement Whether payment behavior runs succeeded;If it is determined that payment behavior runs succeeded, then object run is continued to execute, and by performance objective The target object typing white list of operation;If it is determined that payment behavior executes failure, then stop performance objective operation, and by target Object typing blacklist.
Using the embodiment of the present application, after getting the preset kind behavior of object run, available preset kind The corresponding default identification condition of behavior, and preset kind behavior is identified by default identification condition, it whether there is The recognition result of operational risk, to realize the purpose of operational risk prevention and control.
It is easily noted that, due to obtaining the preset kind behavior of object run, and it is corresponding according to preset kind behavior Default identification condition identified, the purpose of the layering closed loop prevention and control of operational risk, compared with prior art, nothing may be implemented The credit score limitation user that need to add up from user's history enjoys the equity of business, but for pre- during user's enjoyment business If the operational risk of type behavior judges, the Rule of judgment that obtains without the data according to other industry identifies the expense of user With more close to the objective group of business improving the technical effect of recognition accuracy using threshold to reach reduction business.
As a result, scheme provided by the present application solve operational risk in the prior art recognition methods accuracy it is low, and grasp Make the high technical problem of threshold.
It will appreciated by the skilled person that structure shown in Fig. 8 is only to illustrate, terminal is also possible to intelligence It can mobile phone (such as Android phone, iOS mobile phone), tablet computer, applause computer and mobile internet device (Mobile Internet Devices, MID), the terminal devices such as PAD.Fig. 8 it does not cause to limit to the structure of above-mentioned electronic device.Example Such as, terminal A may also include the more or less component (such as network interface, display device) than shown in Fig. 8, or Person has the configuration different from shown in Fig. 8.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing the relevant hardware of terminal device by program, which can store in a computer readable storage medium In, storage medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
Embodiment 8
Embodiments herein additionally provides a kind of storage medium.Optionally, in the present embodiment, above-mentioned storage medium can With program code performed by the recognition methods for saving operational risk provided by above-described embodiment one.
Optionally, in the present embodiment, above-mentioned storage medium can be located in computer network in computer terminal group In any one terminal, or in any one mobile terminal in mobile terminal group.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps: obtaining Take the preset kind behavior of object run, wherein produced by preset kind behavior is for characterizing during performance objective operates , and there is the behavior influenced to operational risk;Obtain the corresponding default identification condition of preset kind behavior;According to default identification Condition identifies preset kind behavior, obtains recognition result, wherein recognition result is used to characterize the mistake of performance objective operation It whether there is operational risk in journey.
Optionally, storage medium is also configured to store the program code for executing following steps: preset kind behavior Including following one or more: registration behavior logs in behavior, orders behavior, usage behavior, order generation behavior and paying bank For.
Optionally, storage medium is also configured to store the program code for executing following steps: in preset kind row In the case where including: registration behavior, judge the behavior of registering whether as illegal registration behavior;If the behavior of registration is illegally to register Behavior then obtains the first identification condition, obtains default identification condition;If the behavior of registration is not illegal registration behavior, continue Performance objective operation.
Optionally, storage medium is also configured to store the program code for executing following steps: in preset kind row In the case where including: login behavior, judge login behavior with the presence or absence of batch operation risk;If there is batch in the behavior of login Operational risk then obtains the first identification condition, obtains default identification condition;If batch operation risk is not present in the behavior of login, Then continue to execute object run.
Optionally, storage medium is also configured to store the program code for executing following steps: in preset kind row In the case where including: order behavior, the target object for executing order behavior is obtained;By target object and white list progress Match;If target object is with white list, it fails to match, obtains the first identification condition, obtains default identification condition;If target Object and white list successful match then obtain the second identification condition, obtain default identification condition.
Optionally, storage medium is also configured to store the program code for executing following steps: judging preset kind Whether behavior meets default identification condition;If preset kind behavior is unsatisfactory for default identification condition, obtaining recognition result is There is no operational risks, and start to execute usage behavior;If preset kind behavior meets default identification condition, identified As a result for there are operational risks.
Optionally, storage medium is also configured to store the program code for executing following steps: obtaining identification knot Fruit is to audit to preset kind behavior there are after operational risk, obtain the first auditing result;If the first auditing result For the audit fails, then the corresponding query information of preset kind behavior is judged whether there is;If it is determined that there are query information, then Judge whether to need to obtain the corresponding information of preset kind behavior;If it is determined that needing to obtain the corresponding letter of preset kind behavior Breath, then obtain the corresponding information of preset kind behavior, and audit to the corresponding information of preset kind behavior, obtain the second instance Core result;If the first auditing result or the second auditing result are that audit passes through, return, which re-executes, obtains order behavior pair The step of default identification condition answered;If it is determined that query information is not present, do not need to obtain the corresponding letter of preset kind behavior Breath or the second auditing result are that the audit fails, then start to execute usage behavior.
Optionally, storage medium is also configured to store the program code for executing following steps: obtaining third identification Condition obtains default identification condition;Judge whether preset kind behavior meets third identification condition;If it is determined that preset kind row Condition is identified to be unsatisfactory for third, then obtaining recognition result is that there is no operational risks, and continue to execute object run;If really Determine preset kind behavior and meet third identification condition, then obtaining recognition result is that there are operational risks.
Optionally, storage medium is also configured to store the program code for executing following steps: making starting to execute After behavior or determining that preset kind behavior meets third identification condition, judge whether usage behavior belongs to malicious act;Such as Fruit determines that usage behavior belongs to malicious act, then is immediately performed order and generates behavior and payment behavior;If it is determined that usage behavior It is not belonging to malicious act, then execution of order generates behavior and payment behavior after preset time.
Optionally, storage medium is also configured to store the program code for executing following steps: executing paying bank Later, to judge whether payment behavior runs succeeded;If it is determined that payment behavior runs succeeded, then object run is continued to execute, And the target object typing white list for operating performance objective;If it is determined that payment behavior executes failure, then stop performance objective Operation, and by target object typing blacklist.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
In above-described embodiment of the application, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the application whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered It is considered as the protection scope of the application.

Claims (17)

1. a kind of recognition methods of operational risk characterized by comprising
Obtain the preset kind behavior of object run, wherein the preset kind behavior executes the object run for characterizing During caused by, and on operational risk exist influence behavior;
Obtain the corresponding default identification condition of the preset kind behavior;
The preset kind behavior is identified according to the default identification condition, obtains recognition result, wherein the identification As a result it whether there is operational risk during executing the object run for characterization.
2. the method according to claim 1, wherein the preset kind behavior includes following one or more: Registration behavior logs in behavior, orders behavior, usage behavior, order generation behavior and payment behavior.
3. according to the method described in claim 2, it is characterized in that, including: the registration behavior in the preset kind behavior In the case where, obtain the corresponding default identification condition of the preset kind behavior, comprising:
Judge described whether to register behavior as illegal registration behavior;
If the registration behavior is the illegal registration behavior, the first identification condition is obtained, the default identification item is obtained Part;
If the registration behavior is not the illegal registration behavior, the object run is continued to execute.
4. according to the method described in claim 2, it is characterized in that, including: the login behavior in the preset kind behavior In the case where, obtain the corresponding default identification condition of the preset kind behavior, comprising:
Judge the login behavior with the presence or absence of batch operation risk;
If there are the batch operation risks for the login behavior, the first identification condition is obtained, the default identification is obtained Condition;
If the batch operation risk is not present in the login behavior, the object run is continued to execute.
5. according to the method described in claim 2, it is characterized in that, including: the order behavior in the preset kind behavior In the case where, obtain the corresponding default identification condition of the preset kind behavior, comprising:
Obtain the target object for executing the order behavior;
The target object is matched with white list;
If the target object is with the white list, it fails to match, obtains the first identification condition, obtains the default identification Condition;
If the target object and the white list successful match, the second identification condition is obtained, the default identification is obtained Condition.
6. the method according to any one of claim 3 to 5, which is characterized in that according to the default identification condition pair The preset kind behavior is identified, recognition result is obtained, comprising:
Judge whether the preset kind behavior meets the default identification condition;
If the preset kind behavior is unsatisfactory for the default identification condition, obtaining the recognition result is that there is no operations Risk, and start to execute the usage behavior;
If the preset kind behavior meets the default identification condition, the recognition result is obtained to there is operation wind Danger.
7. according to the method described in claim 6, it is characterized in that, obtain the recognition result be there are operational risk it Afterwards, the method also includes:
The preset kind behavior is audited, the first auditing result is obtained;
If first auditing result is that the audit fails, the corresponding inquiry of the preset kind behavior is judged whether there is Information;
If it is determined that there are the query informations, then judge whether to need to obtain the corresponding information of the preset kind behavior;
If it is determined that needing to obtain the corresponding information of the preset kind behavior, then the corresponding letter of the preset kind behavior is obtained Breath, and the corresponding information of the preset kind behavior is audited, obtain the second auditing result;
If first auditing result or second auditing result are that audit passes through, return re-executes to be ordered described in acquisition The step of purchase behavior corresponding default identification condition;
If it is determined that the query information is not present, the corresponding information of the preset kind behavior or described the are not needed to obtain Two auditing results are that the audit fails, then start to execute the usage behavior.
8. according to the method described in claim 2, it is characterized in that,
Obtain the corresponding default identification condition of the preset kind behavior, comprising: obtain third and identify condition, obtain described default Identification condition;
The preset kind behavior is identified according to the default identification condition, obtains recognition result, comprising: described in judgement Whether preset kind behavior meets the third identification condition;Know if it is determined that the preset kind behavior is unsatisfactory for the third Other condition, then obtaining the recognition result is that there is no operational risks, and continue to execute the object run;If it is determined that described Preset kind behavior meets the third identification condition, then obtaining the recognition result is that there are operational risks.
9. method according to claim 7 or 8, which is characterized in that starting to execute described in the usage behavior or determination After preset kind behavior meets the third identification condition, the method also includes:
Judge whether the usage behavior belongs to malicious act;
If it is determined that the usage behavior belongs to malicious act, then it is immediately performed the order and generates behavior and the paying bank For;
If it is determined that the usage behavior is not belonging to malicious act, then the order is executed after preset time and generates behavior and described Payment behavior.
10. according to the method described in claim 9, it is characterized in that, the method is also wrapped after executing the payment behavior It includes:
Judge whether the payment behavior runs succeeded;
If it is determined that the payment behavior runs succeeded, then the object run is continued to execute, and the object run will be executed Target object typing white list;
If it is determined that the payment behavior executes failure, then stop executing the object run, and by the target object typing Blacklist.
11. a kind of recognition methods of operational risk characterized by comprising
The operation display interface in display interface, wherein the operation interface is corresponding to the preset kind behavior of object run Interface, the preset kind behavior for characterize execute the object run during caused by, and to operational risk There are the behaviors of influence;
Show recognition result, wherein the recognition result be according to the corresponding default identification condition of the preset kind behavior, it is right What the preset kind behavior was identified, the recognition result for characterize execute the object run during be It is no that there are operational risks.
12. a kind of identification device of operational risk characterized by comprising
First obtains module, for obtaining the preset kind behavior of object run, wherein the preset kind behavior is for characterizing Caused by executing during the object run, and there is the behavior influenced to operational risk;
Second obtains module, for obtaining the corresponding default identification condition of the preset kind behavior;
Identification module obtains recognition result for identifying according to the default identification condition to the preset kind behavior, Wherein, it whether there is operational risk during the recognition result is for characterizing the execution object run.
13. a kind of identification device of operational risk characterized by comprising
First display module, for the operation display interface in display interface, wherein the operation interface is the pre- of object run If interface corresponding to type behavior, produced by the preset kind behavior is used to characterize during the execution object run , and there is the behavior influenced to operational risk;
Second display module, for showing recognition result, wherein the recognition result is corresponding according to the preset kind behavior Default identification condition, the preset kind behavior is identified, the recognition result for characterize execute described in It whether there is operational risk during object run.
14. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When control the storage medium where equipment execute following steps: obtain the preset kind behavior of object run, wherein described pre- If type behavior is to execute generated behavior during the object run;It is corresponding pre- to obtain the preset kind behavior If the condition of identification;The preset kind behavior is identified according to the default identification condition, obtains recognition result, wherein The recognition result whether there is operational risk during executing the object run for characterization.
15. a kind of processor, which is characterized in that the processor is for running program, wherein executed when described program is run with Lower step: the preset kind behavior of object run is obtained, wherein the preset kind behavior is to execute the mistake of the object run Generated behavior in journey;Obtain the corresponding default identification condition of the preset kind behavior;According to the default identification condition The preset kind behavior is identified, recognition result is obtained, wherein the recognition result executes the target for characterizing It whether there is operational risk during operation.
16. a kind of identifying system of operational risk characterized by comprising
Processor;And
Memory is connected to the processor, for providing the instruction for handling following processing step for the processor: obtaining mesh Mark the preset kind behavior of operation, wherein the preset kind behavior is generated during executing the object run Behavior;Obtain the corresponding default identification condition of the preset kind behavior;According to the default identification condition to the default class Type behavior is identified, recognition result is obtained, wherein during the recognition result is for characterizing the execution object run With the presence or absence of operational risk.
17. a kind of recognition methods of operational risk characterized by comprising
Obtain the preset kind behavior of object run, wherein the object run is the operation carried out when executing transaction business, institute State preset kind behavior for characterize execute during the object run caused by, and there is influence to operational risk Behavior;
Obtain the corresponding default identification condition of the preset kind behavior, wherein described in the default identification condition is used to determine Risk prevention system strategy when transaction business operates;
The preset kind behavior is identified according to the risk prevention system strategy, determines the process of the transaction business operation In whether there is operational risk.
CN201810338694.8A 2018-04-16 2018-04-16 The recognition methods of operational risk, device and system Pending CN110390445A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810338694.8A CN110390445A (en) 2018-04-16 2018-04-16 The recognition methods of operational risk, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810338694.8A CN110390445A (en) 2018-04-16 2018-04-16 The recognition methods of operational risk, device and system

Publications (1)

Publication Number Publication Date
CN110390445A true CN110390445A (en) 2019-10-29

Family

ID=68283861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810338694.8A Pending CN110390445A (en) 2018-04-16 2018-04-16 The recognition methods of operational risk, device and system

Country Status (1)

Country Link
CN (1) CN110390445A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309495A (en) * 2020-02-03 2020-06-19 支付宝(杭州)信息技术有限公司 Batch processing request initiating method and device, risk identification platform and storage medium
CN111966429A (en) * 2020-08-21 2020-11-20 支付宝(杭州)信息技术有限公司 Applet processing method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105654303A (en) * 2015-12-31 2016-06-08 拉扎斯网络科技(上海)有限公司 High-risk user identification method and device
CN106529288A (en) * 2016-11-16 2017-03-22 智者四海(北京)技术有限公司 Account risk identification method and device
CN106685894A (en) * 2015-11-09 2017-05-17 阿里巴巴集团控股有限公司 Risk identification method, apparatus and system thereof
CN106875078A (en) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 transaction risk detection method, device and equipment
CN106936807A (en) * 2015-12-31 2017-07-07 阿里巴巴集团控股有限公司 A kind of recognition methods of malicious operation and device
CN107256257A (en) * 2017-06-12 2017-10-17 上海携程商务有限公司 Abnormal user generation content identification method and system based on business datum
CN107464113A (en) * 2017-07-27 2017-12-12 无锡雅座在线科技股份有限公司 The risk of trading activity determines method and device
US20180082229A1 (en) * 2015-05-13 2018-03-22 Alibaba Group Holding Limited Risk identification based on historical behavioral data

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180082229A1 (en) * 2015-05-13 2018-03-22 Alibaba Group Holding Limited Risk identification based on historical behavioral data
CN106685894A (en) * 2015-11-09 2017-05-17 阿里巴巴集团控股有限公司 Risk identification method, apparatus and system thereof
CN105654303A (en) * 2015-12-31 2016-06-08 拉扎斯网络科技(上海)有限公司 High-risk user identification method and device
CN106936807A (en) * 2015-12-31 2017-07-07 阿里巴巴集团控股有限公司 A kind of recognition methods of malicious operation and device
CN106875078A (en) * 2016-08-03 2017-06-20 阿里巴巴集团控股有限公司 transaction risk detection method, device and equipment
CN106529288A (en) * 2016-11-16 2017-03-22 智者四海(北京)技术有限公司 Account risk identification method and device
CN107256257A (en) * 2017-06-12 2017-10-17 上海携程商务有限公司 Abnormal user generation content identification method and system based on business datum
CN107464113A (en) * 2017-07-27 2017-12-12 无锡雅座在线科技股份有限公司 The risk of trading activity determines method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309495A (en) * 2020-02-03 2020-06-19 支付宝(杭州)信息技术有限公司 Batch processing request initiating method and device, risk identification platform and storage medium
CN111309495B (en) * 2020-02-03 2023-07-14 支付宝(杭州)信息技术有限公司 Batch processing request initiating method and device, risk identification equipment and storage medium
CN111966429A (en) * 2020-08-21 2020-11-20 支付宝(杭州)信息技术有限公司 Applet processing method and device

Similar Documents

Publication Publication Date Title
CN107665432A (en) The system and method that suspicious user behavior is identified in the interacting of user and various bank services
CN106875078B (en) Transaction risk detection method, device and equipment
CN108053204A (en) Automatic settlement method and sell equipment
CN109063977B (en) Non-inductive transaction risk monitoring method and device
CN107526582B (en) Web game control method and device
WO2015101162A1 (en) Data processing method based on instant messaging or social applications, and device thereof
CN110225104A (en) Data capture method, device and terminal device
CN108154356A (en) Cross-border money transfer method, the first electronic equipment and payment server
CN110414258A (en) Document handling method and system, data processing method
CN104836696B (en) A kind of detection method and device of IP address
CN107392614B (en) Method and device for realizing offline transaction
CN106056386A (en) Payment method, payment terminal, server and payment system
CN110377522A (en) The test method for scene of trading, calculates equipment and medium at device
CN107194690A (en) A kind of two-dimensional code scanning method and terminal, computer installation and readable storage medium storing program for executing
CN107451819A (en) A kind of auth method and device based on user's operation behavior feature
CN108596579A (en) a kind of virtual resource transfer method, device, terminal and storage medium
CN109344599A (en) A kind of authentication management method, device, terminal and medium
CN110390445A (en) The recognition methods of operational risk, device and system
CN105791246A (en) Information verification method, device and system
CN116562931A (en) Method, device, equipment and storage medium for processing consumption coupon transaction data
CN110033016A (en) Training method, numeric keypad recognition methods and the system of numeric keypad identification model
CN104951969A (en) Data processing method and apparatus for virtual resource transfer
CN106411881A (en) Method and device for buying ticket based on client
CN111179023B (en) Order identification method and device
CN109165947A (en) Account information determines method, apparatus and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40016203

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20191029