CN111105238A - Transaction risk control method and device - Google Patents
Transaction risk control method and device Download PDFInfo
- Publication number
- CN111105238A CN111105238A CN201911080668.0A CN201911080668A CN111105238A CN 111105238 A CN111105238 A CN 111105238A CN 201911080668 A CN201911080668 A CN 201911080668A CN 111105238 A CN111105238 A CN 111105238A
- Authority
- CN
- China
- Prior art keywords
- transaction
- risk
- historical
- amount
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 238000012954 risk control Methods 0.000 title claims abstract description 46
- 230000008569 process Effects 0.000 claims abstract description 25
- 230000000977 initiatory effect Effects 0.000 claims description 13
- 238000004590 computer program Methods 0.000 claims description 10
- 230000007246 mechanism Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 13
- 238000004891 communication Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 239000000284 extract Substances 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 210000002268 wool Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a transaction risk control method and device, and relates to the technical field of computers. One embodiment of the method comprises: receiving current transaction data, and extracting set transaction elements from the current transaction data so as to obtain corresponding historical transaction data based on the transaction elements; judging whether a risk transaction combination exists in the historical transaction data or not according to transaction time, income amount and expenditure amount of a plurality of transactions in the historical transaction data; and determining whether the current transaction has a transaction risk according to the judgment result so as to normally process the current transaction or refuse to process the current transaction. The method determines whether the transaction risk exists in the current transaction by judging whether the risk transaction combination exists in the historical transaction data, so that the current transaction is reasonably processed, and the transaction risk is reduced.
Description
Technical Field
The invention relates to the field of computers, in particular to a transaction risk control method and a transaction risk control device.
Background
With the development of financial markets, various preferential activities are layered in various financial institutions for seizing traffic, and a group of risk users, such as a group of users who are willing to seize wool, is derived. This group selectively engages in preferential activities in exchange for physical benefits at a relatively low cost, even a zero cost. The occurrence of the risk users greatly reduces the publicity effect of the preferential activities and also reduces the customer friendliness and participation of normal users.
In the prior art, in order to identify the risking user, the financial institution generally performs judgment according to the similarity degree of the transaction frequency, the transaction amount, the transaction information and the like. For example, if the same device or IP address frequently initiates a plurality of small-amount transactions with similar amounts, the users are considered as risk users, and then the risk control can be performed on the business transactions of the users.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
in the prior art, a risk user can be identified only under the condition that the user frequently initiates a plurality of small-amount transactions with similar amounts of money by using the same equipment or IP address, the identification effect is poor, and risk control cannot be effectively carried out.
Disclosure of Invention
In view of this, embodiments of the present invention provide a transaction risk control method and apparatus, which determine whether a transaction risk exists in a current transaction by determining whether a risk transaction combination exists in historical transaction data, so as to reasonably process the current transaction and reduce the transaction risk.
To achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a transaction risk control method.
The transaction risk control method of the embodiment of the invention comprises the following steps: receiving current transaction data, and extracting set transaction elements from the current transaction data so as to obtain corresponding historical transaction data based on the transaction elements; judging whether a risk transaction combination exists in the historical transaction data or not according to transaction time, income amount and expenditure amount of a plurality of transactions in the historical transaction data; and determining whether the current transaction has a transaction risk according to the judgment result so as to normally process the current transaction or refuse to process the current transaction.
Optionally, the determining whether a risk transaction combination exists in the historical transaction data according to the transaction time, the income amount, and the expenditure amount of the multiple transactions in the historical transaction data includes: calculating the sum of the income amount of at least one transaction in the first transaction time period to obtain the total income amount; calculating the sum of the expenditure amount of at least one transaction in the second transaction time period to obtain the total expenditure amount; and comparing the total income amount with the total expenditure amount, and if the difference value of the total income amount and the total expenditure amount is smaller than a set first threshold value, a risk transaction combination exists in the historical transaction data.
Optionally, before the step of determining whether the current transaction is at risk of the transaction according to the determination result, the method further includes: counting transaction times of the user in different transaction platforms or transaction mechanisms in the historical transaction data; and comparing the transaction times with a set second threshold value to judge whether a risk transaction combination exists in the historical transaction data.
Optionally, the historical transaction data comprises transaction data for revenue transactions and expenditure transactions respectively conducted by the user using different transaction account numbers.
Optionally, the determining whether a risk transaction combination exists in the historical transaction data according to the transaction time, the income amount, and the expenditure amount of the multiple transactions in the historical transaction data includes: calculating the sum of the income amount of at least one income transaction belonging to the first transaction account number in the first transaction time period to obtain the total income amount; calculating the sum of the expenditure amount of at least one expenditure transaction belonging to the second transaction account in the second transaction time period to obtain the total expenditure amount; and comparing the total income amount with the total expenditure amount, and if the difference value of the total income amount and the total expenditure amount is smaller than a set first threshold value, a risk transaction combination exists in the historical transaction data.
Optionally, before the step of determining whether the current transaction is at risk of the transaction according to the determination result, the method further includes: and counting the combined number of the risk transaction combinations, and judging whether the combined number is greater than or equal to a set third threshold value.
Optionally, the transaction elements include any one or more of: a transaction account number, a device identification of the transaction initiating device, and a transaction account.
To achieve the above object, according to another aspect of the embodiments of the present invention, there is provided a transaction risk control device.
The transaction risk control device of the embodiment of the invention comprises: the data acquisition module is used for receiving current transaction data, extracting set transaction elements from the current transaction data and acquiring corresponding historical transaction data based on the transaction elements; the risk judgment module is used for judging whether a risk transaction combination exists in the historical transaction data or not according to the transaction time, income amount and expenditure amount of a plurality of transactions in the historical transaction data; and the risk control module is used for determining whether the current transaction has transaction risk according to the judgment result so as to normally process the current transaction or refuse to process the current transaction.
Optionally, the risk judging module is further configured to: calculating the sum of the income amount of at least one transaction in the first transaction time period to obtain the total income amount; calculating the sum of the expenditure amount of at least one transaction in the second transaction time period to obtain the total expenditure amount; and comparing the total income amount with the total expenditure amount, and if the difference value of the total income amount and the total expenditure amount is smaller than a set first threshold value, a risk transaction combination exists in the historical transaction data.
Optionally, the apparatus further comprises: the first statistical judgment module is used for counting transaction times of the user in different transaction platforms or transaction mechanisms in the historical transaction data; and comparing the transaction times with a set second threshold value to judge whether a risk transaction combination exists in the historical transaction data.
Optionally, the historical transaction data comprises transaction data for revenue transactions and expenditure transactions respectively conducted by the user using different transaction account numbers.
Optionally, the risk judging module is further configured to: calculating the sum of the income amount of at least one income transaction belonging to the first transaction account number in the first transaction time period to obtain the total income amount; calculating the sum of the expenditure amount of at least one expenditure transaction belonging to the second transaction account in the second transaction time period to obtain the total expenditure amount; and comparing the total income amount with the total expenditure amount, and if the difference value of the total income amount and the total expenditure amount is smaller than a set first threshold value, a risk transaction combination exists in the historical transaction data.
Optionally, the apparatus further comprises: and the second statistic judging module is used for counting the combined number of the risk transaction combinations and judging whether the combined number is greater than or equal to a set third threshold value.
To achieve the above object, according to still another aspect of embodiments of the present invention, there is provided an electronic apparatus.
An electronic device of an embodiment of the present invention includes: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement a transaction risk control method of an embodiment of the present invention.
To achieve the above object, according to still another aspect of embodiments of the present invention, there is provided a computer-readable medium.
A computer-readable medium of an embodiment of the present invention has a computer program stored thereon, which when executed by a processor implements a transaction risk control method of an embodiment of the present invention.
One embodiment of the above invention has the following advantages or benefits: determining whether the current transaction has a transaction risk or not by judging whether a risk transaction combination exists in the historical transaction data or not, and further reasonably processing the current transaction to reduce the transaction risk; comparing the difference value between the total income amount of a plurality of transactions and the total expenditure amount of the appointed transaction time period with a first threshold value, further determining whether risk transactions exist in the current transactions, and further reducing transaction risks by fully utilizing the relation between historical transaction data and user consumption habits; comparing the transaction times of the user on different transaction platforms or transaction institutions with a second threshold value to determine risk transaction combinations in the historical transaction data, so that risk transactions can be identified conveniently; by counting transaction data under different transaction account numbers, behaviors of the same user in performing risk transaction by using different account numbers are effectively identified; and comparing the combined number of the risk transaction combinations with a third threshold, and determining whether the current transaction has a transaction risk according to the comparison result, so that the accuracy of transaction risk identification is improved.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of main steps of a transaction risk control method according to a first embodiment of the invention;
FIG. 2 is a schematic flow chart of a transaction risk control method according to a second embodiment of the present invention;
FIG. 3 is a schematic flow chart of a transaction risk control method according to a third embodiment of the present invention;
FIG. 4 is a schematic diagram of the main modules of a transaction risk control device according to an embodiment of the present invention;
FIG. 5 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
FIG. 6 is a schematic diagram of a computer apparatus suitable for use in an electronic device to implement an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic diagram illustrating the main steps of a transaction risk control method according to a first embodiment of the present invention. As shown in fig. 1, a transaction risk control method according to a first embodiment of the present invention mainly includes the following steps:
step S101: receiving current transaction data, and extracting set transaction elements from the current transaction data so as to obtain corresponding historical transaction data based on the transaction elements. And a certain transaction account initiates a service transaction to the service system, the service system extracts transaction elements from the current transaction data, and then historical transaction data of the transaction account is obtained based on the transaction elements. In an embodiment, the current transaction data may include: a transaction account number, transaction time, transaction type, transaction amount, transaction institution identification, and equipment identification of the transaction initiating equipment. The transaction elements may include: a transaction account number, and a device identification of the transaction initiating device.
Step S102: and judging whether a risk transaction combination exists in the historical transaction data or not according to the transaction time, income amount and expenditure amount of a plurality of transactions in the historical transaction data. The historical transaction data includes both expenditure transactions and revenue transactions. Calculating the sum of the income amount of at least one income transaction in the first transaction time period to obtain the total income amount; calculating the sum of the expenditure amount of at least one expenditure transaction in the second transaction time period to obtain the total expenditure amount; and (4) making a difference between the total income amount and the total expenditure amount, and considering the corresponding expenditure transaction and income transaction as a risk transaction combination when the difference is smaller than a set first threshold value. The first transaction time period and the second transaction time period can be completely overlapped, partially overlapped and free of overlapping time, and specific values can be determined according to requirements.
Step S103: and determining whether the current transaction has a transaction risk according to the judgment result so as to normally process the current transaction or refuse to process the current transaction. If the risk transaction combination exists in the historical transaction data, the user initiating the current transaction can be judged to be a risk user, the transaction risk exists in the current transaction, and the transaction can be refused to be processed. If no risk transaction combination exists in the historical transaction data, the user can be judged to be a normal user, no transaction risk exists in the current transaction, and the transaction can be processed normally. The risk users are accurately identified through the method, and the transaction risk of the transaction with the users is further reduced.
To explain the above embodiment of the transaction risk control method provided by the present invention more specifically, another embodiment of the transaction risk control method is provided below, please refer to fig. 2.
Fig. 2 is a schematic main flow chart of a transaction risk control method according to a second embodiment of the invention. As shown in fig. 2, the transaction risk control method according to the second embodiment of the present invention mainly includes the following steps:
step S201: current transaction data is received. The user initiates a business transaction to the business system, and the business transaction can be an expenditure transaction of funds or an income transaction of the funds. The current transaction data may include: a transaction account, a transaction account number, a transaction time, a transaction type, a transaction amount, a transaction institution identification, a device identification of a transaction initiating device, a transaction channel, etc. The transaction types are expenditure transaction and income transaction; transaction institution identification, such as transaction merchant number; device identification such as IP address, device number; transaction channels such as Payment treasures, Internet banking.
Step S202: transaction elements are extracted from the current transaction data to obtain historical transaction data for the user initiating the current transaction. The transaction element is used for subsequently acquiring historical transaction data of a user initiating a current transaction, so that the transaction element only needs to uniquely represent the user, and may be, for example, a username of a transaction account of the user, a transaction account number, a device identifier of a transaction initiating device, and the like. The transaction element may also contain multiple elements, i.e. multiple elements uniquely representing the same user, such as a username and device identification.
Step S203: judging whether risk transaction combinations exist in the historical transaction data or not, and if so, executing a step S204; if not, step S205 is performed. The determination of whether a risk transaction combination exists in the historical transaction data may be accomplished in a variety of ways, as described in detail below.
The first method is as follows: after the historical transaction data is obtained, two transaction time periods can be selected in a user-defined mode, namely a first transaction time period and a second transaction time period. A total revenue amount for the at least one revenue transaction during the first transaction time period and a total expenditure amount for the at least one expenditure transaction during the second transaction time period are calculated. And then, making a difference between the total income amount and the total expenditure amount, wherein if the difference value is smaller than a first threshold value, the fact that a risk transaction combination exists in the historical transaction data is shown, and the corresponding income transaction and expenditure transaction are the risk transaction combination. If the difference value is larger than or equal to the first threshold value, the risk transaction combination does not exist in the historical transaction data of the transaction time period.
And updating the transaction time periods, and determining whether risk transaction combinations exist in the historical transaction data of each transaction time period according to the mode. The following describes how to determine whether risk transaction combinations exist in historical transaction data by taking a certain transaction time period as an example.
For example, a user uses a bank card to perform an expenditure transaction and a revenue transaction, and the expenditure record of the bank card on day T is as follows: at merchant M1 100 are paid out, at merchant M2 5 dollars are paid out, and at merchant M3 10 dollars are paid out. The income of the bank card on the T +2 day is recorded as follows: a 16-dollar revenue was received from trading platform N1. Since the total revenue amount (16 dollars) of the user on day T +2 is slightly greater than the total expenditure amount (15 dollars) of the user on day T at Merchant M2 and Merchant M3, it can be inferred that a combination of risky transactions exists in the user's historical transaction data.
The second method comprises the following steps: after the historical transaction data is obtained, the transaction times of the user on each transaction platform and each transaction mechanism are counted, if the transaction times are larger than a second threshold value, it is indicated that a risk transaction combination exists in the historical transaction data, and all transactions of the user on the corresponding transaction platform or transaction mechanism (namely the transaction platform or transaction mechanism with the transaction times larger than the second threshold value) form the risk transaction combination. And if all the transaction times are less than or equal to the second threshold value, indicating that no risk transaction combination exists in the historical transaction data. The following examples are given.
For example, the transaction count of a user at the transaction platform N1 is 10, the transaction count at the transaction platform N2 is 5, and the second threshold is 6. Since the number of transactions (10) by the user at transaction platform N1 is greater than the second threshold (6), it may be inferred that a combination of risky transactions exists in the user's historical transaction data.
The third method comprises the following steps: after the historical transaction data are obtained, whether income transaction records of T days and expenditure transaction records of T + N days meet set rules or not is judged, the times of meeting the set rules are recorded day by day, and the higher the times, the higher the probability of risk transaction combination existing in the historical transaction data is. Here, N is an integer, and may be 1, 2, 3, or the like. The rules may be custom set, such as the same IP address initiating multiple small payout amount transactions on day T, and receiving revenue greater than the sum of payout amounts on day T + 2.
Step S204: refusing to process the current transaction, and ending the process. If the risk transaction combination exists in the historical transaction data, the user can be judged to be a risk user, the transaction risk exists in the current transaction, and the processing can be refused to avoid the transaction risk.
Step S205: and (5) normally processing the current transaction and ending the flow. If no risk transaction combination exists in the historical transaction data, the user can be judged to be a normal user, no transaction risk exists in the current transaction, and the processing can be continued according to the normal business process.
In the second embodiment, as long as the risk transaction combination exists in the historical transaction data, the corresponding user is considered as a risk user, but this way may have a misjudgment situation, and the third embodiment optimizes the situation. Meanwhile, in the third embodiment, the risk identification of the expenditure transaction and the income transaction performed by the same user using different account numbers is also specifically described. The details are as follows.
Fig. 3 is a schematic main flow chart of a transaction risk control method according to a third embodiment of the present invention. As shown in fig. 3, the transaction risk control method according to the third embodiment of the present invention mainly includes the following steps:
step S301: current transaction data is received. The specific implementation of this step is the same as step S201, and is not described here again.
Step S302: and extracting the transaction elements from the current transaction data to obtain historical transaction data of the corresponding transaction account. The historical transaction data includes transaction data for revenue transactions and expenditure transactions respectively performed by the user using different transaction account numbers. The transaction data may include a transaction account number, transaction time, transaction amount, transaction institution, and the like.
Step S303: judging whether risk transaction combinations exist in the historical transaction data, if so, executing the step S304; if not, step S306 is performed. After the historical transaction data is obtained, two transaction time periods can still be selected in a self-defined mode, namely a first transaction time period and a second transaction time period. The total income amount of at least one income transaction attributed to the first transaction account in the first transaction time period and the total expenditure amount of at least one expenditure transaction attributed to the second transaction account in the second transaction time period are calculated. The first transaction account number and the second transaction account number may each include a plurality of sub-account numbers.
And subsequently, the total income amount and the total expenditure amount are differentiated according to the preorder mode, if the difference value is smaller than a first threshold value, the risk transaction combination exists in the historical transaction data, and the corresponding income transaction and expenditure transaction are the risk transaction combination. If the difference value is larger than or equal to the first threshold value, the risk transaction combination does not exist in the historical transaction data of the transaction time period.
And updating the transaction time periods, and determining whether risk transaction combinations exist in the historical transaction data of each transaction time period according to the mode. In the following, a description will be given of how to determine whether risk transaction combinations exist in the historical transaction data in a certain transaction time period.
For example, a certain user uses a bank card a to perform an expenditure transaction and uses a bank card B to perform an income transaction, and the expenditure record of the bank card a on day T is as follows: at merchant M1 100 are paid out, at merchant M2 5 dollars are paid out, and at merchant M3 10 dollars are paid out. The income of the bank card B on the T +1 day is recorded as follows: a 16-dollar revenue was received from trading platform N1. Since the total revenue amount (16 dollars) of the user on day T +1 is slightly greater than the total expenditure amount (15 dollars) of the user on day T at Merchant M2 and Merchant M3, it can be inferred that the two expenditure transactions of 5 dollars and 10 dollars are suspected to be risk transactions.
Step S304: judging whether the combined number of the risk transaction combinations is greater than or equal to a third threshold, and if so, executing step S305; if less than the third threshold, step S306 is performed. Through the processing, whether the risk transaction combination exists in the historical transaction data or not is determined, and at the moment, the risk transaction combination is judged to be the normal transaction of the user, so that the user cannot be determined to be a risk user. Therefore, the combined number of risk transaction combinations is counted in this step, and the combined number is compared with the third threshold value, thereby determining whether the user is a risk user.
Step S305: the current transaction is rejected and step S307 is executed. If the combination quantity is larger than or equal to the third threshold, the probability that the risk transaction combination is normal transaction is low, the user can be judged to be a risk user, the transaction risk exists in the current transaction, and the processing can be refused in order to avoid the transaction risk.
Step S306: the current transaction is processed normally, and step S307 is executed. If the number of the combinations is smaller than the third threshold, the probability that the risk transaction combination is normal transaction is higher, the user can be judged to be a normal user, the transaction risk does not exist in the current transaction, and the processing can be continued according to the normal business process.
Step S307: and receiving next transaction data, taking the next transaction data as current transaction data, and executing the step S302. And after the current transaction is rejected or the normal processing of the current transaction is finished, receiving next transaction data and continuing processing according to the mode.
According to the transaction risk control method, whether the transaction risk exists in the current transaction is determined by judging whether the risk transaction combination exists in the historical transaction data, so that the current transaction is reasonably processed, and the transaction risk is reduced; comparing the difference value between the total income amount of a plurality of transactions and the total expenditure amount of the appointed transaction time period with a first threshold value, further determining whether risk transactions exist in the current transactions, and further reducing transaction risks by fully utilizing the relation between historical transaction data and user consumption habits; comparing the transaction times of the user on different transaction platforms or transaction institutions with a second threshold value to determine risk transaction combinations in the historical transaction data, so that risk transactions can be identified conveniently; by counting transaction data under different transaction account numbers, behaviors of the same user in performing risk transaction by using different account numbers are effectively identified; and comparing the combined number of the risk transaction combinations with a third threshold, and determining whether the current transaction has a transaction risk according to the comparison result, so that the accuracy of transaction risk identification is improved.
The transaction risk control method provided by the present invention is described above with reference to specific embodiments, and a transaction risk control device applying the transaction risk control method is described below with reference to specific embodiments.
Fig. 4 is a schematic diagram of main modules of a transaction risk control device according to an embodiment of the present invention. As shown in fig. 4, the transaction risk control device 400 according to the embodiment of the present invention mainly includes:
the data obtaining module 401 is configured to receive current transaction data, extract a set transaction element from the current transaction data, and obtain corresponding historical transaction data based on the transaction element. A certain transaction account initiates a service transaction to a service system, a transaction risk control device of the service system extracts transaction elements from current transaction data, and then historical transaction data of the transaction account is obtained based on the transaction elements. In an embodiment, the current transaction data may include: a transaction account number, transaction time, transaction type, transaction amount, transaction institution identification, and equipment identification of the transaction initiating equipment. The transaction elements may include: a transaction account number, and a device identification of the transaction initiating device.
A risk judgment module 402, configured to judge whether a risk transaction combination exists in the historical transaction data according to transaction time, income amount, and expenditure amount of multiple transactions in the historical transaction data. The historical transaction data includes both expenditure transactions and revenue transactions. Calculating the sum of the income amount of at least one income transaction in the first transaction time period to obtain the total income amount; calculating the sum of the expenditure amount of at least one expenditure transaction in the second transaction time period to obtain the total expenditure amount; and (4) making a difference between the total income amount and the total expenditure amount, and considering the corresponding expenditure transaction and income transaction as a risk transaction combination when the difference is smaller than a set first threshold value. The first transaction time period and the second transaction time period can be completely overlapped, partially overlapped and free of overlapping time, and specific values can be determined according to requirements.
And a risk control module 403, configured to determine whether a transaction risk exists in the current transaction according to the determination result, so as to normally process the current transaction or refuse to process the current transaction. If the risk transaction combination exists in the historical transaction data, the user initiating the current transaction can be judged to be a risk user, the transaction risk exists in the current transaction, and the transaction can be refused to be processed. If no risk transaction combination exists in the historical transaction data, the user can be judged to be a normal user, no transaction risk exists in the current transaction, and the transaction can be processed normally. The risk users are accurately identified through the method, and the transaction risk of the transaction with the users is further reduced.
In addition, the transaction risk control device 400 according to the embodiment of the present invention may further include: a first statistical decision module and a second statistical decision module (not shown in fig. 4). The first statistical judgment module is used for counting transaction times of users in different transaction platforms or transaction institutions in the historical transaction data; and comparing the transaction times with a set second threshold value to judge whether a risk transaction combination exists in the historical transaction data. And the second statistic judging module is used for counting the combined number of the risk transaction combinations and judging whether the combined number is greater than a set third threshold value.
From the above description, it can be seen that whether the transaction risk exists in the current transaction is determined by judging whether the risk transaction combination exists in the historical transaction data, so that the current transaction is reasonably processed, and the transaction risk is reduced; comparing the transaction times of the user on different transaction platforms or transaction institutions with a second threshold value to determine risk transaction combinations in the historical transaction data, so that risk transactions can be identified conveniently; and comparing the combined number of the risk transaction combinations with a third threshold, and determining whether the current transaction has a transaction risk according to the comparison result, so that the accuracy of transaction risk identification is improved.
Fig. 5 illustrates an exemplary system architecture 500 to which the transaction risk control method or the transaction risk control device of an embodiment of the present invention may be applied.
As shown in fig. 5, the system architecture 500 may include terminal devices 501, 502, 503, a network 504, and a server 505. The network 504 serves to provide a medium for communication links between the terminal devices 501, 502, 503 and the server 505. Network 504 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 501, 502, 503 to interact with a server 505 over a network 504 to receive or send messages or the like. The terminal devices 501, 502, 503 may have various communication client applications installed thereon, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 501, 502, 503 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 505 may be a server providing various services, such as a background management server for processing transaction requests sent by the user using the terminal devices 501, 502, 503. The background management server can acquire corresponding historical transaction data based on the current transaction data, judge whether a transaction risk combination exists in the historical transaction data, further process the current transaction, and feed back a processing result to the terminal equipment.
It should be noted that the transaction risk control method provided in the embodiment of the present application is generally executed by the server 505, and accordingly, the transaction risk control device is generally disposed in the server 505.
It should be understood that the number of terminal devices, networks, and servers in fig. 5 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The invention also provides an electronic device and a computer readable medium according to the embodiment of the invention.
The electronic device of the present invention includes: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement a transaction risk control method of an embodiment of the present invention.
The computer readable medium of the present invention has stored thereon a computer program which, when executed by a processor, implements a transaction risk control method of an embodiment of the present invention.
Referring now to FIG. 6, shown is a block diagram of a computer system 600 suitable for use with the electronic device implementing an embodiment of the present invention. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the computer system 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, the processes described above with respect to the main step diagrams may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program containing program code for performing the method illustrated in the main step diagram. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 601.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a data acquisition module, a risk judgment module, and a risk control module. The names of these modules do not constitute a limitation to the modules themselves in some cases, for example, the data acquisition module may also be described as a "module that receives current transaction data, extracts set transaction elements from the current transaction data, and acquires corresponding historical transaction data based on the transaction elements".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: receiving current transaction data, and extracting set transaction elements from the current transaction data so as to obtain corresponding historical transaction data based on the transaction elements; judging whether a risk transaction combination exists in the historical transaction data or not according to transaction time, income amount and expenditure amount of a plurality of transactions in the historical transaction data; and determining whether the current transaction has a transaction risk according to the judgment result so as to normally process the current transaction or refuse to process the current transaction.
From the above description, it can be seen that whether the transaction risk exists in the current transaction is determined by judging whether the risk transaction combination exists in the historical transaction data, so that the current transaction is reasonably processed, and the transaction risk is reduced.
The product can execute the method provided by the embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the method provided by the embodiment of the present invention.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A transaction risk control method, comprising:
receiving current transaction data, and extracting set transaction elements from the current transaction data so as to obtain corresponding historical transaction data based on the transaction elements;
judging whether a risk transaction combination exists in the historical transaction data or not according to transaction time, income amount and expenditure amount of a plurality of transactions in the historical transaction data;
and determining whether the current transaction has a transaction risk according to the judgment result so as to normally process the current transaction or refuse to process the current transaction.
2. The method of claim 1, wherein determining whether a combination of risky transactions exists in the historical transaction data based on transaction times, income amounts, and expenditure amounts of a plurality of transactions in the historical transaction data comprises:
calculating the sum of the income amount of at least one transaction in the first transaction time period to obtain the total income amount;
calculating the sum of the expenditure amount of at least one transaction in the second transaction time period to obtain the total expenditure amount;
and comparing the total income amount with the total expenditure amount, and if the difference value of the total income amount and the total expenditure amount is smaller than a set first threshold value, a risk transaction combination exists in the historical transaction data.
3. The method of claim 1, wherein prior to the step of determining whether the current transaction is at risk for the transaction based on the determination, the method further comprises:
counting transaction times of the user in different transaction platforms or transaction mechanisms in the historical transaction data;
and comparing the transaction times with a set second threshold value to judge whether a risk transaction combination exists in the historical transaction data.
4. The method of claim 1, wherein the historical transaction data comprises transaction data for revenue and expenditure transactions, respectively, by the user using different transaction account numbers.
5. The method of claim 4, wherein determining whether a combination of risky transactions exists in the historical transaction data based on transaction times, income amounts, and expenditure amounts of a plurality of transactions in the historical transaction data comprises:
calculating the sum of the income amount of at least one income transaction belonging to the first transaction account number in the first transaction time period to obtain the total income amount;
calculating the sum of the expenditure amount of at least one expenditure transaction belonging to the second transaction account in the second transaction time period to obtain the total expenditure amount;
and comparing the total income amount with the total expenditure amount, and if the difference value of the total income amount and the total expenditure amount is smaller than a set first threshold value, a risk transaction combination exists in the historical transaction data.
6. The method according to any one of claims 1 to 5, wherein the step of determining whether the current transaction is at risk of the transaction is preceded by the step of determining, based on the determination, further comprising:
and counting the combined number of the risk transaction combinations, and judging whether the combined number is greater than or equal to a set third threshold value.
7. The method of any of claims 1 to 5, wherein the transaction elements include any one or more of: a transaction account number, a device identification of the transaction initiating device, and a transaction account.
8. A transaction risk control device, comprising:
the data acquisition module is used for receiving current transaction data, extracting set transaction elements from the current transaction data and acquiring corresponding historical transaction data based on the transaction elements;
the risk judgment module is used for judging whether a risk transaction combination exists in the historical transaction data or not according to the transaction time, income amount and expenditure amount of a plurality of transactions in the historical transaction data;
and the risk control module is used for determining whether the current transaction has transaction risk according to the judgment result so as to normally process the current transaction or refuse to process the current transaction.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
10. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911080668.0A CN111105238A (en) | 2019-11-07 | 2019-11-07 | Transaction risk control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911080668.0A CN111105238A (en) | 2019-11-07 | 2019-11-07 | Transaction risk control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111105238A true CN111105238A (en) | 2020-05-05 |
Family
ID=70420583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911080668.0A Pending CN111105238A (en) | 2019-11-07 | 2019-11-07 | Transaction risk control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111105238A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111681008A (en) * | 2020-06-04 | 2020-09-18 | 中国建设银行股份有限公司 | Risk control method, device, equipment and storage medium |
CN114549010A (en) * | 2022-02-25 | 2022-05-27 | 中国工商银行股份有限公司 | Transaction advance risk control method, device, electronic equipment and medium |
CN114565459A (en) * | 2022-02-18 | 2022-05-31 | 中国银联股份有限公司 | Abnormal transaction identification method, device, equipment and medium |
CN117132396A (en) * | 2023-07-04 | 2023-11-28 | 北京中盛九橙企业管理咨询有限公司 | Risk assessment system and method for online transaction |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101408969A (en) * | 2008-11-13 | 2009-04-15 | 中国工商银行股份有限公司 | Server and system for monitoring bank risk data |
CN102163353A (en) * | 2011-02-25 | 2011-08-24 | 广州广电运通金融电子股份有限公司 | Electronic journal diary intelligent analysis system and method |
CN106156029A (en) * | 2015-03-24 | 2016-11-23 | 中国人民解放军国防科学技术大学 | The uneven fictitious assets data classification method of multi-tag based on integrated study |
CN106327340A (en) * | 2016-08-04 | 2017-01-11 | 中国银联股份有限公司 | Method and device for detecting abnormal node set in financial network |
CN107705206A (en) * | 2017-11-07 | 2018-02-16 | 中国银行股份有限公司 | A kind of transaction risk appraisal procedure and device |
CN107767138A (en) * | 2017-10-20 | 2018-03-06 | 杭州呯嘭智能技术有限公司 | On-line payment is counter to cheat method and system |
CN108876105A (en) * | 2018-05-10 | 2018-11-23 | 易联支付有限公司 | A kind of transaction risk control method and device |
CN110378698A (en) * | 2019-07-24 | 2019-10-25 | 中国工商银行股份有限公司 | Transaction risk recognition methods, device and computer system |
-
2019
- 2019-11-07 CN CN201911080668.0A patent/CN111105238A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101408969A (en) * | 2008-11-13 | 2009-04-15 | 中国工商银行股份有限公司 | Server and system for monitoring bank risk data |
CN102163353A (en) * | 2011-02-25 | 2011-08-24 | 广州广电运通金融电子股份有限公司 | Electronic journal diary intelligent analysis system and method |
CN106156029A (en) * | 2015-03-24 | 2016-11-23 | 中国人民解放军国防科学技术大学 | The uneven fictitious assets data classification method of multi-tag based on integrated study |
CN106327340A (en) * | 2016-08-04 | 2017-01-11 | 中国银联股份有限公司 | Method and device for detecting abnormal node set in financial network |
CN107767138A (en) * | 2017-10-20 | 2018-03-06 | 杭州呯嘭智能技术有限公司 | On-line payment is counter to cheat method and system |
CN107705206A (en) * | 2017-11-07 | 2018-02-16 | 中国银行股份有限公司 | A kind of transaction risk appraisal procedure and device |
CN108876105A (en) * | 2018-05-10 | 2018-11-23 | 易联支付有限公司 | A kind of transaction risk control method and device |
CN110378698A (en) * | 2019-07-24 | 2019-10-25 | 中国工商银行股份有限公司 | Transaction risk recognition methods, device and computer system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111681008A (en) * | 2020-06-04 | 2020-09-18 | 中国建设银行股份有限公司 | Risk control method, device, equipment and storage medium |
CN111681008B (en) * | 2020-06-04 | 2023-06-30 | 中国建设银行股份有限公司 | Risk control method, apparatus, device and storage medium |
CN114565459A (en) * | 2022-02-18 | 2022-05-31 | 中国银联股份有限公司 | Abnormal transaction identification method, device, equipment and medium |
CN114549010A (en) * | 2022-02-25 | 2022-05-27 | 中国工商银行股份有限公司 | Transaction advance risk control method, device, electronic equipment and medium |
CN117132396A (en) * | 2023-07-04 | 2023-11-28 | 北京中盛九橙企业管理咨询有限公司 | Risk assessment system and method for online transaction |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111105238A (en) | Transaction risk control method and device | |
CN109615389A (en) | Electronic-payment transaction risk control method, device, server and storage medium | |
CN111861745B (en) | Service wind control method and device | |
CN112132674A (en) | Transaction processing method and device | |
CN111127214A (en) | Method and apparatus for portfolio | |
CN112241915A (en) | Loan product generation method and device | |
CN111881329A (en) | Account balance management method and system | |
CN112581270A (en) | Risk account identification method and device, electronic equipment and storage medium | |
CN114912925A (en) | Fraud detection method, device, electronic equipment and computer readable medium | |
CN110930238A (en) | Method, device, equipment and computer readable medium for improving audit task efficiency | |
CN111242576A (en) | Method and device for processing request | |
CN117035315A (en) | Bank outlet queuing method and device, electronic equipment and storage medium | |
CN111429251A (en) | Method and device for processing data under multiple modes | |
CN116228384A (en) | Data processing method, device, electronic equipment and computer readable medium | |
CN115564415A (en) | Order payment and settlement method and device | |
CN114423009A (en) | Fraud user identification method, apparatus, electronic device, and computer-readable medium | |
CN114066615A (en) | Trusted payment method, device, electronic equipment and storage medium | |
CN111429257A (en) | Transaction monitoring method and device | |
CN111402018A (en) | Method and system for reporting resource budget | |
CN116468432B (en) | Order processing method, device, equipment and medium | |
CN108537659B (en) | Method and apparatus for outputting information | |
CN112561321A (en) | Capital saving assessment method and system | |
US20150262148A1 (en) | Systems and methods for service request processing | |
CN115880048A (en) | Method, device, electronic equipment and computer readable medium for processing account data | |
CN113487408A (en) | Information processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20221008 Address after: 25 Financial Street, Xicheng District, Beijing 100033 Applicant after: CHINA CONSTRUCTION BANK Corp. Address before: 25 Financial Street, Xicheng District, Beijing 100033 Applicant before: CHINA CONSTRUCTION BANK Corp. Applicant before: Jianxin Financial Science and Technology Co.,Ltd. |