CN110738571B - Transaction risk control method and related device - Google Patents

Transaction risk control method and related device Download PDF

Info

Publication number
CN110738571B
CN110738571B CN201911012991.4A CN201911012991A CN110738571B CN 110738571 B CN110738571 B CN 110738571B CN 201911012991 A CN201911012991 A CN 201911012991A CN 110738571 B CN110738571 B CN 110738571B
Authority
CN
China
Prior art keywords
risk
user
transaction
information
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911012991.4A
Other languages
Chinese (zh)
Other versions
CN110738571A (en
Inventor
王杨
刘艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911012991.4A priority Critical patent/CN110738571B/en
Publication of CN110738571A publication Critical patent/CN110738571A/en
Application granted granted Critical
Publication of CN110738571B publication Critical patent/CN110738571B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The application discloses a transaction risk control method and a related device, wherein an operation information is acquired, and a risk control page is called according to the operation information to acquire a risk level, wherein the risk control page comprises user characteristic elements or operation characteristic elements; then determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification; and when the risk control result meets the preset condition, completing the transaction operation corresponding to the operation information, thereby realizing confirmation and verification of the user identity and the corresponding transaction information, rapidly obtaining the risk control result and further improving the efficiency of transaction risk control.

Description

Transaction risk control method and related device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a transaction risk control method and related devices.
Background
Along with the development of mobile technology, more intelligent devices are in life of people, meanwhile, people increasingly start to use a mobile payment function, in the payment or transaction process, in order to meet the requirements of law and regulation related to anti-money laundering, the customer identity recognition system is further perfected, the business risk is effectively controlled, and the risk users need to be subjected to due investigation to know the fund sources, the transaction purposes, the transaction properties and the like.
Generally, the transaction risk control is performed by means of off-line access, such as employing an external third party investigation facility or directly investigating the target user by a business person in the facility.
However, in the online risk control process, a large amount of human resources are required, and due to the nature of investigation, poor user experience is easy to generate, and the best party needs to be clearly informed by spending a large amount of time and providing explanation such as related evidence, thereby influencing the efficiency of transaction risk control.
Disclosure of Invention
In view of the foregoing, a first aspect of the present application provides a transaction risk control method, which is applicable to a mobile transaction system or a program process, and specifically includes: acquiring operation information, wherein the operation information is determined based on characteristic elements in the transaction operation process of a user;
Invoking a risk control page according to the operation information to obtain a risk level, wherein the risk control page comprises user characteristic elements or operation characteristic elements;
determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification;
and if the risk control result meets a preset condition, completing the transaction operation corresponding to the operation information.
Preferably, in some possible implementations of the present application, the calling a risk control page according to the operation information to obtain a risk level includes:
Invoking the risk control page according to the operation information, and determining the user characteristic elements and the operation characteristic elements;
determining preset operation information corresponding to the user characteristic elements according to preset rules;
and comparing the preset operation information with the information input in the operation characteristic elements to acquire the risk level.
Preferably, in some possible implementations of the present application, the comparing the preset operation information with information input in the operation feature element to obtain the risk level includes:
determining numerical information indicated by a plurality of risk items in the operation characteristic elements;
and comparing the numerical value information with the corresponding numerical value in the preset operation information to acquire the risk level.
Preferably, in some possible implementations of the present application, the calling a risk control page according to the operation information to obtain a risk level includes:
Invoking the risk control page according to the operation information, and determining the operation characteristic elements;
Determining the numerical information indicated by a plurality of risk items in the operation characteristic element;
and comparing a risk threshold with the numerical information to obtain the risk grade, wherein the risk threshold is used for indicating a characteristic value set in the transaction process.
Preferably, in some possible implementations of the present application, the determining a corresponding identification operation according to the risk level to obtain a risk control result includes:
Performing user identification according to the risk level to obtain a user identification result and user data, wherein the user identification comprises biological information identification or picture identification;
Determining a characteristic field according to the user identification result;
Traversing the user data according to the characteristic field to obtain the risk control result.
Preferably, in some possible implementations of the present application, traversing the user profile according to the feature field to obtain the risk control result includes:
Traversing the user data according to the characteristic field to obtain a hit rate table;
determining a risk field corresponding to an item exceeding a preset threshold value in the hit rate table;
And determining the corresponding relation between the operation information and the risk field according to the operation identification, and determining the risk control result.
Preferably, in some possible implementations of the present application, the method for controlling transaction risk is applied to a terminal device, where the terminal device is a block node device in a block chain node.
A second aspect of the present application provides an apparatus for transaction risk control, comprising: the system comprises an acquisition unit, a transaction processing unit and a processing unit, wherein the acquisition unit is used for acquiring operation information, and the operation information is determined based on characteristic elements in the transaction operation process of a user;
the calling unit is used for calling a risk control page according to the operation information to acquire a risk level, wherein the risk control page comprises user characteristic elements or operation characteristic elements;
the identification unit is used for determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification;
And the control unit is used for completing the transaction operation corresponding to the operation information if the risk control result meets the preset condition.
Preferably, in some possible implementations of the present application, the calling unit is specifically configured to call the risk control page according to the operation information, and determine the user feature element and the operation feature element;
The calling unit is specifically configured to determine preset operation information corresponding to the user feature element according to a preset rule;
The calling unit is specifically configured to compare the preset operation information with information input in the operation feature element, so as to obtain the risk level.
Preferably, in some possible implementations of the present application, the invoking unit is specifically configured to determine numerical information indicated by a plurality of risk items in the operation feature element;
the calling unit is specifically configured to compare the numerical value information with a corresponding numerical value in the preset operation information, so as to obtain the risk level.
Preferably, in some possible implementations of the present application, the calling unit is specifically configured to call the risk control page according to the operation information, and determine the operation feature element;
The calling unit is specifically configured to determine the numerical information indicated by the multiple risk items in the operation feature element;
The calling unit is specifically configured to compare a risk threshold with the numerical information to obtain the risk level, where the risk threshold is used to indicate a feature value set in a transaction process.
Preferably, in some possible implementations of the present application, the identifying unit is specifically configured to perform user identification according to the risk level, so as to obtain a user identification result and user data, where the user identification includes biometric information identification or picture identification;
The identification unit is specifically configured to determine a feature field according to the user identification result;
the identification unit is specifically configured to traverse the user data according to the feature field to obtain the risk control result.
Preferably, in some possible implementations of the present application, the identifying unit is specifically configured to traverse the user profile according to the feature field to obtain a hit rate table;
The identification unit is specifically configured to determine a risk field corresponding to an item exceeding a preset threshold in the hit rate table;
The identification unit is specifically configured to determine, according to the operation identification, a corresponding relationship between the operation information and the risk field, and determine the risk control result.
A third aspect of the present application provides a computer apparatus comprising: a memory, a processor, and a bus system; the memory is used for storing program codes; the processor is configured to execute the method of transaction risk control according to the first aspect or any one of the first aspects according to instructions in the program code.
A fourth aspect of the application provides a computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the method of transaction risk control of the first aspect or any of the first aspects described above.
From the above technical solutions, the embodiment of the present application has the following advantages:
Acquiring operation information, and calling a risk control page according to the operation information to acquire a risk level, wherein the risk control page comprises user characteristic elements or operation characteristic elements; then determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification; and when the risk control result meets a preset condition, completing the transaction operation corresponding to the operation information. Therefore, confirmation and verification of the user identity and the corresponding transaction information are realized, the risk control result can be obtained rapidly, and further the transaction risk control efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a diagram of a network architecture in which a transaction risk control system operates;
FIG. 2 is a schematic diagram of a transaction risk control process according to an embodiment of the present application;
FIG. 3 is a flow chart of a method for transaction risk control according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an interface for transaction risk control according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an interface for transaction risk control according to another embodiment of the present application;
FIG. 6 is a flow chart of another method for transaction risk control provided by an embodiment of the present application;
FIG. 7 is a flow chart diagram of another transaction risk control provided by an embodiment of the present application;
Fig. 8 is a schematic structural diagram of a transaction risk control device according to an embodiment of the present application;
FIG. 9 is a schematic diagram of another transaction risk control device according to an embodiment of the present application;
FIG. 10A is a schematic diagram of a data sharing system according to an embodiment of the present application;
FIG. 10B is a block diagram illustrating a data sharing system according to an embodiment of the present application;
Fig. 10C is a schematic diagram of a data transmission response of a blockchain node according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a transaction risk control method and a related device, which can be applied to the operation process of a transaction system or a related transaction program, and particularly, the operation information is determined based on characteristic elements in the transaction operation process of a user by acquiring the operation information, and a risk control page is called according to the operation information so as to acquire a risk level, wherein the risk control page comprises the user characteristic elements or the operation characteristic elements; then determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification; and when the risk control result meets the preset condition, completing the transaction operation corresponding to the operation information, thereby realizing confirmation and verification of the user identity and the corresponding transaction information, rapidly obtaining the risk control result and further improving the efficiency of transaction risk control.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented, for example, in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "includes" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that the transaction risk control method provided by the application can be applied to the operation process of the transaction risk control system, specifically, the transaction risk control system can be operated in a network architecture shown in fig. 1, and is a network architecture diagram operated by the transaction risk control system, as shown in fig. 1, the transaction risk control system can provide transaction risk control with a plurality of information sources, and the transaction risk control result can be obtained by collecting transaction information of different users and comparing the transaction information with characteristic information in a server, so as to further control the transaction; it will be appreciated that fig. 1 shows a plurality of terminal devices for user transactions, and in an actual scenario, more or fewer terminal devices may participate in the transaction, and the specific number and types depend on the actual scenario, which is not limited herein; in addition, one server is shown in fig. 1, but in an actual scenario, there may also be participation of multiple servers, and in a scenario of a cross-border transaction, the specific number of servers depends on the actual scenario.
It can be understood that the transaction risk control system can be operated on a personal mobile terminal, a server, and a third party device to provide transaction risk control, so as to obtain a risk control result; the specific transaction risk control system may be implemented in a program form in the device, may also be implemented as a system component in the device, and may also be implemented as a cloud service program, where a specific operation mode is determined according to an actual scenario, and is not limited herein.
Along with the development of mobile technology, more intelligent devices are in life of people, meanwhile, people increasingly start to use a mobile payment function, in the payment or transaction process, in order to meet the requirements of law and regulation related to anti-money laundering, the customer identity recognition system is further perfected, the business risk is effectively controlled, and the risk users need to be subjected to due investigation to know the fund sources, the transaction purposes, the transaction properties and the like.
Generally, the transaction risk control is performed by means of off-line access, such as employing an external third party investigation facility or directly investigating the target user by a business person in the facility.
However, in the online risk control process, a large amount of human resources are required, and due to the nature of investigation, poor user experience is easy to generate, and the best party needs to be clearly informed by spending a large amount of time and providing explanation such as related evidence, thereby influencing the efficiency of transaction risk control.
In order to solve the above-mentioned problems, the present application provides a method for controlling transaction risk, which is applied to a flow frame of transaction risk control shown in fig. 2, and as shown in fig. 2, the flow frame of transaction risk control provided by the embodiment of the present application includes a fact feature, a transaction feature, a model feature and a risk feature; basic information is acquired through collection of the fact features and the transaction features, and then a specific analysis method is selected in the model features to analyze the basic information, so that the high, medium or low grade indicated by the risk features is obtained, and specific transaction risk control operation is guided.
It will be appreciated that the above description is given by taking a high, medium or low grade as an example, and the specific grading method may be based on other grading methods, and the specific grading form is specific to the actual scenario and is not limited herein.
It can be understood that the method provided by the application can be a program writing method, which is used as a processing logic in a hardware system, and can also be used as a transaction risk control device, and the processing logic is realized in an integrated or external mode. As an implementation manner, the transaction risk control device obtains operation information, the operation information is determined based on characteristic elements in the transaction operation process of a user, and a risk control page is called according to the operation information so as to obtain a risk level, wherein the risk control page comprises user characteristic elements or operation characteristic elements; then determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification; and when the risk control result meets the preset condition, completing the transaction operation corresponding to the operation information, thereby realizing confirmation and verification of the user identity and the corresponding transaction information, rapidly obtaining the risk control result and further improving the efficiency of transaction risk control.
With reference to the above-mentioned flow architecture, a method for controlling transaction risk in the present application will be described, referring to fig. 3, fig. 3 is a flow chart of a method for controlling transaction risk provided in an embodiment of the present application, where the embodiment of the present application at least includes the following steps:
301. And acquiring operation information.
In this embodiment, the operation information is determined based on characteristic elements in the process of performing a transaction operation by the user, and specifically, the transaction operation may be a payment system of a third party, for example: the corresponding characteristic elements may be payment buttons or payment buttons, etc. representing operations for payment or transfer, and the specific characteristic elements are determined by actual scenes, and are not limited herein.
302. And calling a risk control page according to the operation information to acquire a risk level.
In this embodiment, the risk control page includes a user feature element or an operation feature element; specifically, the user characteristic elements may include risk sub-items of the identity document or identity document held by the user, the age of the user, the region in which the user is located, the occupation of the user, the negative news message of the user, and other facts characteristics; the operation characteristic elements include transaction frequency and transaction amount, transaction IP is distributed in risk sub-items of transaction characteristics such as unusual places or overseas, and specific element combinations depend on actual scenes and are not limited herein.
Alternatively, the risk control page may adopt a manner shown in fig. 4, and as shown in fig. 4, an interface schematic diagram of transaction risk control provided by an embodiment of the present application includes a plurality of options related to user information. Further, the risk control page may also adopt a mode shown in fig. 5, as shown in fig. 5, which is an interface schematic diagram of another transaction risk control provided by the embodiment of the present application, where information is collected in an uploading picture mode.
It may be appreciated that invoking the risk control page to obtain the risk level according to the operation information may include both qualitative analysis and quantitative analysis, for example, quantitative analysis, that is, when a value corresponding to a certain transaction characteristic when a user transacts, satisfies a certain condition, that is, the corresponding risk level is obtained, for example, if the amount of a single transaction is greater than one hundred thousand yuan, the risk level is high; specifically, the risk control page is called according to the operation information, and the operation characteristic elements are determined; determining the numerical information indicated by a plurality of risk items in the operation characteristic element; and comparing a risk threshold with the numerical information to obtain the risk grade, wherein the risk threshold is used for indicating a characteristic value set in the transaction process.
Optionally, the risk level may be assessed in combination with the corresponding situation of the user feature element or the operation feature element, specifically, the risk control page is called according to the operation information, and the user feature element and the operation feature element are determined; then determining preset operation information corresponding to the user characteristic elements according to preset rules; and comparing the preset operation information with the information input in the operation characteristic elements to obtain the risk level. Wherein the comparison term may be a numerical value, i.e. numerical information indicative of a plurality of risk terms in the operational feature element is determined; and comparing the numerical value information with the corresponding numerical value in the preset operation information to acquire the risk level. For example: for a user with a foreign passport of the document type, the transaction amount is twenty thousands, while for a user with a Chinese passport of the document type, the transaction amount is fifty thousands, so that the accurate assessment of the risk level based on different user portraits is realized.
It can be understood that the risk level can be classified into a high level classification, a low level classification, and a third level classification, and according to the classification, the enhanced due investigation, the standard due investigation and the simplified due investigation are respectively used correspondingly. Different profiles are collected for different purposes including, but not limited to, user identity information, property sources, transactions and their context. As the risk of the user increases, the data collected by the debug scheme will go deeper and the frequency of collection will be higher. For example, for users who are engaged in industries with high cash density, large transaction amount, high transaction frequency and are frequently overseas, the risk characteristic index is high, and an enhanced due diligence investigation scheme can be used. In the above embodiment, the risk level is illustrated by taking high, medium and low as examples, and the risk level may be further classified by adopting other numerical values or symbols in a specific scenario, where the specific form depends on the actual scenario, and the present invention is not limited thereto.
303. And determining corresponding identification operation according to the risk level to obtain a risk control result.
In this embodiment, the identification operation includes a user identification and an operation identification, the operation identification being associated with the user identification.
Through the risk level assessed in step 302, different recognition operations can be adopted for different levels, for example, user recognition, i.e. data collection, is required for users with high risk levels, operation recognition, i.e. specific information of the user operation is called, and then a risk control result is obtained according to the corresponding situation of the user data and the operation.
304. And if the risk control result meets a preset condition, completing the transaction operation corresponding to the operation information.
In this embodiment, if the operation information correspondence in the user transaction process satisfies a preset condition, that is, the relevant numerical value corresponding to the operation information is within the risk range, the transaction operation corresponding to the operation information is completed.
According to the embodiment, the risk level is obtained by obtaining the operation information and calling the risk control page according to the operation information, wherein the risk control page comprises user characteristic elements or operation characteristic elements; then determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification; and when the risk control result meets a preset condition, completing the transaction operation corresponding to the operation information. Therefore, confirmation and verification of the user identity and the corresponding transaction information are realized, the risk control result can be obtained rapidly, and further the transaction risk control efficiency is improved.
For the process of risk control in the above embodiment, the process may also be obtained by using a big data analysis method, and this scenario is described below, as shown in fig. 6, fig. 6 is a flowchart of another transaction risk control method provided in the embodiment of the present application, where the embodiment of the present application at least includes the following steps:
601. acquiring operation information;
602. invoking a risk control page according to the operation information to obtain a risk level;
In this embodiment, steps 601-602 are similar to steps 301-302, and the related description may be referred to, and will not be repeated here.
603. User identification is carried out according to the risk level, and user data is determined;
In this embodiment, the user is identified according to the risk level, where the identified information is user data stored in the server, the data may be a historical transaction record of the user, and the specific transaction time period indicating the time span may be changed due to the change of the risk level, for example: the higher the risk level, the greater the time span of the user profile obtained from the user profile.
604. The user profile is traversed and the risk fields are determined.
In this embodiment, for the collected user data, risk fields included in the history are filtered, for example, the risk fields may be cross-border transfer, public money consumption, and the like.
605. And determining the corresponding relation between the operation information and the risk field according to the operation identification, and determining the risk control result.
In this embodiment, the operation information of the user is filtered based on the risk field determined in step 604, and if there is a corresponding risk item, risk control is performed. Specifically, firstly, user identification is performed according to the risk level to obtain a user identification result and user data, wherein the user identification comprises biological information identification or picture identification; then determining a characteristic field according to the user identification result; and traversing the user data according to the characteristic field to obtain the risk control result. For example, face recognition is required for users with high risk levels, the characteristic field is cross-border transfer, and if the operation information of the users includes cross-border transfer, risk control is required.
Optionally, because people with different professions have different transaction habits, different control standards need to be adopted, and specifically, the hit rate table can be obtained by traversing the user data according to the feature field; then determining a risk field corresponding to an item exceeding a preset threshold value in the hit rate table; and further determining the corresponding relation between the operation information and the risk field according to the operation identification to determine the risk control result. For example, for a user identified as a foreign person, the preset threshold value of the cross-border transfer is 0.5, and if the hit rate of the cross-border transfer in the user profile is greater than 0.5, risk control is required.
Specifically, the above embodiment further relates to an interaction process between a front-end page and a background in a terminal device, as shown in fig. 7, which is another flow chart of transaction risk control provided by the embodiment of the present application, firstly, the front-end page flexibly collects different data and fields for a user according to different risks and corresponding adjustment schemes of each user, and at the same time, checks the data and fields uploaded by the user through technologies such as face recognition, OCR recognition, and the like.
In addition, the wind control background performs model analysis and user risk analysis on collected data in combination with the transaction condition of the user; the wind control background displays the data collected at the front end through a visualization technology, and meanwhile, the collected data can be helpful for wind control to draw risk images of users, carry out risk rating, and effectively help anti-money laundering staff to judge risk conditions of the users, so that corresponding wind control measures are adopted, such as implementing reasonable limitation on transaction modes, transaction scales, transaction frequencies and the like of the users, and payment risk is reduced.
606. And if the risk control result meets a preset condition, completing the transaction operation corresponding to the operation information.
In this embodiment, if the operation information correspondence in the user transaction process satisfies a preset condition, that is, the relevant numerical value corresponding to the operation information is within the risk range, the transaction operation corresponding to the operation information is completed.
By automatically controlling the risk of user transaction on the terminal equipment, the anti-money laundering staff can be effectively assisted to judge the risk conditions of the users, the possibility that illegal persons conduct illegal criminal activities by utilizing WeChat payment and mobile phone QQ payment is reduced, and the efficiency of controlling the transaction risk is improved.
In order to better implement the above-described aspects of the embodiments of the present application, the following provides related apparatuses for implementing the above-described aspects. Referring to fig. 8, fig. 8 is a schematic structural diagram of a transaction risk control device according to an embodiment of the present application, and a transaction risk control device 800 includes:
An obtaining unit 801, configured to obtain operation information, where the operation information is determined based on feature elements in a transaction operation process performed by a user;
a calling unit 802, configured to call a risk control page according to the operation information, so as to obtain a risk level, where the risk control page includes a user feature element or an operation feature element;
An identifying unit 803, configured to determine a corresponding identifying operation according to the risk level, so as to obtain a risk control result, where the identifying operation includes a user identification and an operation identification, and the operation identification is associated with the user identification;
and the control unit 804 is configured to complete the transaction operation corresponding to the operation information if the risk control result meets a preset condition.
Preferably, in some possible implementations of the present application, the calling unit 802 is specifically configured to call the risk control page according to the operation information, and determine the user feature element and the operation feature element;
the calling unit 802 is specifically configured to determine preset operation information corresponding to the user feature element according to a preset rule;
the invoking unit 802 is specifically configured to compare the preset operation information with information input in the operation feature element, so as to obtain the risk level.
Preferably, in some possible implementations of the present application, the invoking unit 802 is specifically configured to determine numerical information indicated by a plurality of risk items in the operation feature element;
The invoking unit 802 is specifically configured to compare the numerical value information with a corresponding numerical value in the preset operation information, so as to obtain the risk level.
Preferably, in some possible implementations of the present application, the calling unit 802 is specifically configured to call the risk control page according to the operation information, and determine the operation feature element;
the calling unit 802 is specifically configured to determine the numerical information indicated by the multiple risk items in the operation feature element;
The invoking unit 802 is specifically configured to compare a risk threshold with the numerical information to obtain the risk level, where the risk threshold is used to indicate a feature value set in a transaction process.
Preferably, in some possible implementations of the present application, the identifying unit 803 is specifically configured to perform user identification according to the risk level, so as to obtain a user identification result and a user profile, where the user identification includes biometric information identification or picture identification;
The identifying unit 803 is specifically configured to determine a feature field according to the user identification result;
The identifying unit 803 is specifically configured to traverse the user profile according to the feature field to obtain the risk control result.
Preferably, in some possible implementations of the present application, the identifying unit 803 is specifically configured to traverse the user profile according to the feature field to obtain a hit rate table;
the identifying unit 803 is specifically configured to determine a risk field corresponding to an item exceeding a preset threshold in the hit rate table;
The identifying unit 803 is specifically configured to determine, according to the operation identification, the corresponding relationship between the operation information and the risk field, and determine the risk control result.
Acquiring operation information, and calling a risk control page according to the operation information to acquire a risk level, wherein the risk control page comprises user characteristic elements or operation characteristic elements; then determining corresponding identification operation according to the risk level to obtain a risk control result, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification; and when the risk control result meets a preset condition, completing the transaction operation corresponding to the operation information. Therefore, confirmation and verification of the user identity and the corresponding transaction information are realized, the risk control result can be obtained rapidly, and further the transaction risk control efficiency is improved.
Referring to fig. 9, fig. 9 is a schematic structural diagram of another transaction risk control device according to an embodiment of the present application, where the transaction risk control device 900 may have relatively large differences according to different configurations or performances, and may include one or more central processing units (central processing units, CPU) 922 (e.g., one or more processors) and a memory 932, and one or more storage mediums 930 (e.g., one or more mass storage devices) storing application programs 942 or data 944. Wherein the memory 932 and the storage medium 930 may be transitory or persistent. The program stored on the storage medium 930 may include one or more modules (not shown), each of which may include a series of instruction operations in the transaction risk control device. Still further, the central processor 922 may be arranged to communicate with the storage medium 930 to execute a series of instruction operations in the storage medium 930 on the transaction risk control device 900.
Transaction risk control device 900 may also include one or more power supplies 926, one or more wired or wireless network interfaces 950, one or more input/output interfaces 958, and/or one or more operating systems 941, such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, and the like.
The steps performed by the transaction risk control device in the above embodiments may be based on the transaction risk control device structure shown in fig. 8.
Embodiments of the present application also provide a computer readable storage medium having stored therein transaction risk control instructions which, when executed on a computer, cause the computer to perform the steps performed by the transaction risk control device in the method described in the embodiments of figures 2 to 7, as described above.
There is also provided in an embodiment of the application a computer program product comprising transaction risk control instructions which, when run on a computer, cause the computer to perform the steps performed by the transaction risk control device in the method described in the embodiments of figures 2 to 7, as described above.
Embodiments of the present application also provide a transaction risk control system that may include the transaction risk control device in the embodiment described in fig. 8, or the transaction risk control device described in fig. 9.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or partly in the form of a software product or all or part of the technical solution, which is stored in a storage medium, and includes several instructions for causing a computer device (which may be a personal computer, a transaction risk control device, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In addition, the method and apparatus for transaction risk control described above may also be applied to a data sharing system, see the data sharing system shown in fig. 10A, where the data sharing system 1000 refers to a system for performing data sharing between nodes, where the data sharing system may include a plurality of nodes 1001, and the plurality of nodes 1001 may be respective clients in the data sharing system, where each client runs on a terminal device corresponding to the method according to the present application. Each node 1001 may receive input information while operating normally and maintain shared data within the data sharing system based on the received input information. In order to ensure the information intercommunication in the data sharing system, information connection can exist between each node in the data sharing system, and the nodes can transmit information through the information connection. For example, when any node in the data sharing system receives input information, other nodes in the data sharing system acquire the input information according to a consensus algorithm, and store the input information as data in the shared data, so that the data stored on all nodes in the data sharing system are consistent.
Each node in the data sharing system has a node identifier corresponding to the node identifier, and each node in the data sharing system can store the node identifiers of other nodes in the data sharing system, so that the generated block can be broadcast to other nodes in the data sharing system according to the node identifiers of other nodes. Each node can maintain a node identification list shown in the following table, and the node names and the node identifications are correspondingly stored in the node identification list. The node identifier may be an IP (Internet Protocol, protocol interconnected between networks) address and any other information that can be used to identify the node, and the IP address is only illustrated in table 1.
Table 1 correspondence between nodes and node identifiers
Node name Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node N 119.123.789.258
Each node in the data sharing system stores one and the same blockchain. The blockchain is composed of a plurality of blocks, referring to fig. 10B, the blockchain is composed of a plurality of blocks, the starting block comprises a block header and a block body, the block header stores an input information characteristic value, a version number, a time stamp and a difficulty value, and the block body stores input information; the next block of the starting block takes the starting block as a father block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the father block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain are associated with the block data stored in the father block, and the safety of the input information in the block is ensured.
When each block in the blockchain is generated, referring to fig. 10C, when the node where the blockchain is located receives the input information, checking the input information, storing the input information into the memory pool after the checking is completed, and updating the hash tree used for recording the input information; then, updating the update time stamp to the time of receiving the input information, trying different random numbers, and calculating the characteristic value for a plurality of times, so that the calculated characteristic value can meet the following formula:
SHA256(SHA256(version+prev_hash+merkle_root+ntime+nbits+x))<TARGET
Wherein SHA256 is a eigenvalue algorithm used to calculate eigenvalues; version (version number) is version information of the related block protocol in the block chain; the prev_hash is the block header characteristic value of the parent block of the current block; merkle _root is a characteristic value of input information; ntime is the update time of the update timestamp; the nbits is the current difficulty, is a fixed value in a period of time, and is determined again after exceeding a fixed period of time; x is a random number; TARGET is a eigenvalue threshold that can be determined from nbits.
Thus, when the random number meeting the formula is calculated, the information can be correspondingly stored to generate the block head and the block main body, and the current block is obtained. And then, the node where the blockchain is located sends the newly generated blocks to other nodes in the data sharing system where the newly generated blocks are located according to the node identification of other nodes in the data sharing system, the other nodes verify the newly generated blocks, and the newly generated blocks are added into the blockchain stored in the newly generated blocks after the verification is completed.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (12)

1. A method of transaction risk control, comprising:
Acquiring operation information, wherein the operation information is determined based on characteristic elements in the transaction operation process of a user;
Invoking a risk control page according to the operation information to obtain a risk level, wherein the risk control page comprises user characteristic elements or operation characteristic elements, the user characteristic elements comprise types of identity documents or identity documents held by a user, ages of the user, regions where the user is located, occupations of the user and negative news information of the user, and the operation characteristic elements comprise transaction frequency and transaction amount;
User identification is carried out according to the risk level to obtain a user identification result and user data, wherein the user identification comprises biological information identification or picture identification, the user data is a user history transaction record, the history transaction record indicates that a transaction time period of a time span is changed due to the change of the risk level, the risk level is classified into high, medium and low levels, different risk levels respectively correspond to different investigation types, the investigation types comprise enhanced due-job investigation, standard due-job investigation and simplified due-job investigation, the acquired data of the different investigation types are different, the data comprises user identity information, property sources, transactions and background conditions thereof, and the different risk levels correspond to different identification operations;
Determining a characteristic field according to the user identification result;
Traversing the user data according to the characteristic field to obtain a hit rate table;
determining a risk field corresponding to an item exceeding a preset threshold value in the hit rate table;
Determining a risk control result according to the corresponding relation between the operation information and the risk field, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification;
and if the risk control result meets a preset condition, finishing the transaction operation corresponding to the operation information, wherein the preset condition is that the relevant numerical value corresponding to the operation information is in a risk range.
2. The method of claim 1, wherein the invoking the risk control page according to the operation information to obtain a risk level comprises:
Invoking the risk control page according to the operation information, and determining the user characteristic elements and the operation characteristic elements;
determining preset operation information corresponding to the user characteristic elements according to preset rules;
and comparing the preset operation information with the information input in the operation characteristic elements to acquire the risk level.
3. The method according to claim 2, wherein said comparing the preset operation information with information entered in the operation feature element to obtain the risk level comprises:
determining numerical information indicated by a plurality of risk items in the operation characteristic elements;
and comparing the numerical value information with the corresponding numerical value in the preset operation information to acquire the risk level.
4. The method of claim 1, wherein the invoking the risk control page according to the operation information to obtain a risk level comprises:
Invoking the risk control page according to the operation information, and determining the operation characteristic elements;
Determining the numerical information indicated by a plurality of risk items in the operation characteristic element;
and comparing a risk threshold with the numerical information to obtain the risk grade, wherein the risk threshold is used for indicating a characteristic value set in the transaction process.
5. The method of claim 1, wherein the method of transaction risk control is applied to a terminal device that is a blocknode device in a blockchain node.
6. An apparatus for transaction risk control, comprising:
The system comprises an acquisition unit, a transaction processing unit and a processing unit, wherein the acquisition unit is used for acquiring operation information, and the operation information is determined based on characteristic elements in the transaction operation process of a user;
The calling unit is used for calling a risk control page according to the operation information to obtain a risk level, the risk control page comprises user characteristic elements or operation characteristic elements, the user characteristic elements comprise types of identity documents or identity documents held by a user, ages of the user, regions where the user is located, occupations of the user and negative news information of the user, and the operation characteristic elements comprise transaction frequency and transaction amount;
The identification unit is used for carrying out user identification according to the risk level to obtain a user identification result and user data, wherein the user identification comprises biological information identification or picture identification, the user data is a user historical transaction record, the historical transaction record indicates that the transaction time period of the time span is changed due to the change of the risk level, the risk level is classified into high, medium and low levels, different risk levels respectively correspond to different investigation types, the investigation types comprise enhanced due investigation, standard due investigation and simplified due investigation, the acquired data of the different investigation types are different, the data comprises user identity information, property sources, transactions and background conditions thereof, and the different risk levels correspond to different identification operations; determining a characteristic field according to the user identification result; traversing the user data according to the characteristic field to obtain a hit rate table; determining a risk field corresponding to an item exceeding a preset threshold value in the hit rate table; determining a risk control result according to the corresponding relation between the operation information and the risk field, wherein the identification operation comprises user identification and operation identification, and the operation identification is associated with the user identification;
And the control unit is used for completing the transaction operation corresponding to the operation information if the risk control result meets the preset condition, wherein the preset condition is that the relevant numerical value corresponding to the operation information is in the risk range.
7. The apparatus according to claim 6, wherein the calling unit is specifically configured to:
Invoking the risk control page according to the operation information, and determining the user characteristic elements and the operation characteristic elements;
determining preset operation information corresponding to the user characteristic elements according to preset rules;
and comparing the preset operation information with the information input in the operation characteristic elements to acquire the risk level.
8. The apparatus according to claim 7, wherein the calling unit is specifically configured to:
determining numerical information indicated by a plurality of risk items in the operation characteristic elements;
and comparing the numerical value information with the corresponding numerical value in the preset operation information to acquire the risk level.
9. The apparatus according to claim 6, wherein the calling unit is specifically configured to:
Invoking the risk control page according to the operation information, and determining the operation characteristic elements;
Determining the numerical information indicated by a plurality of risk items in the operation characteristic element;
and comparing a risk threshold with the numerical information to obtain the risk grade, wherein the risk threshold is used for indicating a characteristic value set in the transaction process.
10. A computer device, the computer device comprising a processor and a memory:
The memory is used for storing program codes; the processor is configured to perform the method of transaction risk control of any of claims 1 to 5 according to instructions in the program code.
11. A computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the transaction risk control method of any of the preceding claims 1 to 5.
12. A computer program product comprising transaction risk control instructions which, when run on a computer, cause the computer to perform the method of transaction risk control of any of the preceding claims 1 to 5.
CN201911012991.4A 2019-10-23 Transaction risk control method and related device Active CN110738571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911012991.4A CN110738571B (en) 2019-10-23 Transaction risk control method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911012991.4A CN110738571B (en) 2019-10-23 Transaction risk control method and related device

Publications (2)

Publication Number Publication Date
CN110738571A CN110738571A (en) 2020-01-31
CN110738571B true CN110738571B (en) 2024-06-28

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062629A (en) * 2017-12-26 2018-05-22 平安科技(深圳)有限公司 Processing method, terminal device and the medium of transaction event
CN109064175A (en) * 2018-06-11 2018-12-21 阿里巴巴集团控股有限公司 A kind of account takeover risk prevention system method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062629A (en) * 2017-12-26 2018-05-22 平安科技(深圳)有限公司 Processing method, terminal device and the medium of transaction event
CN109064175A (en) * 2018-06-11 2018-12-21 阿里巴巴集团控股有限公司 A kind of account takeover risk prevention system method and device

Similar Documents

Publication Publication Date Title
US20200342097A1 (en) Systems and methods for detecting resources responsible for events
CN111614690B (en) Abnormal behavior detection method and device
CN111352808B (en) Alarm data processing method, device, equipment and storage medium
MX2012003721A (en) Systems and methods for social graph data analytics to determine connectivity within a community.
CN107231393B (en) Session processing method and device
CN109685536B (en) Method and apparatus for outputting information
CN110378575B (en) Overdue event refund collection method and device and computer readable storage medium
CN110807699A (en) Overdue event payment collection method and device and computer readable storage medium
CN111061948B (en) User tag recommendation method and device, computer equipment and storage medium
CN107862599B (en) Bank risk data processing method and device, computer equipment and storage medium
EP3451611B1 (en) Method and apparatus for setting mobile device identifier
CN110738571B (en) Transaction risk control method and related device
CN112950359A (en) User identification method and device
CN110796379B (en) Risk assessment method, device and equipment of business channel and storage medium
CN115564301A (en) Activated card number prediction method and device and computer equipment
CN108446907B (en) Safety verification method and device
CN110489568B (en) Method and device for generating event graph, storage medium and electronic equipment
CN112579833B (en) Service association relation acquisition method and device based on user operation data
CN110570301B (en) Risk identification method, device, equipment and medium
CN110738571A (en) transaction risk control method and related device
CN111353714A (en) Data monitoring method, server, client and system
Huda et al. IDENTIFICATION OF FRAUD ATTRIBUTES FOR DETECTING FRAUD BASED ONLINE SALES TRANSACTION
CN116151871B (en) Project evaluation management method and related equipment
CN117113402A (en) Data mining method, device, equipment and readable storage medium
CN111784375A (en) User type identification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant