CN112907132A - Full-link interactive wind control method and system - Google Patents

Full-link interactive wind control method and system Download PDF

Info

Publication number
CN112907132A
CN112907132A CN202110319221.5A CN202110319221A CN112907132A CN 112907132 A CN112907132 A CN 112907132A CN 202110319221 A CN202110319221 A CN 202110319221A CN 112907132 A CN112907132 A CN 112907132A
Authority
CN
China
Prior art keywords
user
interaction
stage
risk
full
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110319221.5A
Other languages
Chinese (zh)
Inventor
彭姝雯
舒昌衡
张哲�
赵柯
罗马慧
应缜哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110319221.5A priority Critical patent/CN112907132A/en
Publication of CN112907132A publication Critical patent/CN112907132A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Technology Law (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Administration (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure provides a full-link interactive wind control method, including: receiving the current operation of a user; analyzing the stage of the current operation of the user in the full link, wherein the stage comprises a prior stage, a middle stage and a later stage; initiating a corresponding risk detection request and acquiring a risk detection result based on the stage of the current operation of the user in the full link; determining an interaction strategy with the user based on the acquired risk detection result; and reaching the user based on the interaction strategy of the user, and interacting with the user at different levels to release risks.

Description

Full-link interactive wind control method and system
Technical Field
The present disclosure relates generally to risk prevention and control, and more particularly to risk prevention and control in a full scene.
Background
The key point of conventional risk prevention and control is to identify whether the current operator is the user himself. The gradually formed strong and large core product system in the past can comprehensively judge whether the current operator is the user. However, in recent years, the risk of the user's own operation has increased dramatically, and the corresponding risk prevention situation has also changed from verifying the identity of the user himself to competing with the operation of the user himself, and it is necessary to verify the user's own awareness of the risk and the operation intention.
Aiming at the operation risks of the user, the traditional risk prevention and control mode is very passive. Risk operation can only control risks by means of failure, verification and right limitation, user safety is low, effective rate of management and control of special scenes is low, and subsequent service user experience is poor.
Therefore, there is a need in the art for an efficient scheme capable of improving the management and control of a complex scene for the user's personal operation class, so as to improve the user's sense of security and experience.
Disclosure of Invention
In order to solve the technical problem, the present disclosure provides a full-link interactive wind control scheme, which can improve the effective rate of management and control of complex scenes of user operation, so as to realize risk identification and risk release.
In an embodiment of the present disclosure, a full-link interactive wind control method is provided, including: receiving the current operation of a user; analyzing the stage of the current operation of the user in the full link, wherein the stage comprises a prior stage, a middle stage and a later stage; initiating a corresponding risk detection request and acquiring a risk detection result based on the stage of the current operation of the user in the full link; determining an interaction strategy with the user based on the acquired risk detection result; and reaching the user based on the interaction strategy of the user, and interacting with the user at different levels to release risks.
In another embodiment of the present disclosure, the interaction policy with the user includes an interaction product policy and an interaction content policy.
In yet another embodiment of the present disclosure, the different levels of interaction include shallow level interactions, deep level interactions, and underlying level interactions.
In another embodiment of the present disclosure, reaching the user through both in-and out-of-end reach channels based on interaction policies with the user.
In yet another embodiment of the present disclosure, the different level of interaction may be synchronous interaction or asynchronous interaction.
In another embodiment of the present disclosure, the current operation of the user includes a transactional operation and a non-transactional operation.
In an embodiment of the present disclosure, a full-link interactive wind control system is provided, including: the receiving module is used for receiving the current operation of a user; the analysis engine module is used for analyzing the stages of the current operation of the user in the full link, wherein the stages comprise a pre-stage, a pre-stage and a post-stage; the risk detection module initiates a corresponding risk detection request and acquires a risk detection result based on the stage of the current operation of the user in the full link; and an interaction module to: determining an interaction strategy with the user based on the acquired risk detection result; and reaching the user based on the interaction strategy of the user, and interacting with the user at different levels to release risks.
In another embodiment of the present disclosure, the interaction policy with the user determined by the interaction module includes an interaction product policy and an interaction content policy.
In yet another embodiment of the present disclosure, the different levels of interaction performed by the interaction module include shallow level interactions, deep level interactions, and underlying level interactions.
In another embodiment of the disclosure, the interaction module contacts the user through both in-and out-of-end contact channels based on an interaction policy with the user.
In another embodiment of the present disclosure, the interaction module may perform a synchronous interaction or an asynchronous interaction.
In another embodiment of the present disclosure, the current operation of the user received by the receiving module includes a transaction operation and a non-transaction operation.
In an embodiment of the disclosure, a computer-readable storage medium is provided that stores instructions that, when executed, cause a machine to perform the method as previously described.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Drawings
The foregoing summary, as well as the following detailed description of the present disclosure, will be better understood when read in conjunction with the appended drawings. It is to be noted that the appended drawings are intended as examples of the claimed invention. In the drawings, like reference characters designate the same or similar elements.
FIG. 1 is a flow chart illustrating a full link interactive wind control method according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram illustrating a full link interactive wind control process according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram illustrating a full link interactive wind control analysis engine according to an embodiment of the present disclosure;
FIG. 4 is a schematic diagram illustrating a full link interactive mode wind control framework according to an embodiment of the present disclosure;
fig. 5 is a block diagram illustrating a full link interactive wind control system according to an embodiment of the present disclosure.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, embodiments accompanying the present disclosure are described in detail below.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein, and thus the present disclosure is not limited to the specific embodiments disclosed below.
In the traditional risk prevention and control process, the risk release can be finished only by checking whether the current operator is the current operator. And the wind control system outputs short messages, human faces, a bank card and the like. However, in a risk scenario of the user operating himself, such a scheme cannot effectively release risks.
The full-link interactive wind control system disclosed by the disclosure is a risk prevention and control system constructed aiming at risk release of operation of a user, and through interaction with security services of the user, not only can security information of the system be transmitted to the user, but also more user information can be obtained, so that risk identification and risk release are facilitated.
The safe operation mode of the full-link interactive wind control system disclosed by the disclosure is around the problems that the operation risk identification of a user is inaccurate and the user cannot be managed, a full-scene touch channel is built, a full-link interactive product is built, the user is deeply understood, and the identification and payment stopping efficiency is improved.
The user personal operation aimed at by the technical scheme of the disclosure can be transaction operation or non-transaction operation. The user may be an active party (e.g., a purchaser who initiates a payment request), a passive party (e.g., a recipient of a certain offer message), or a third party (e.g., a vouching party for a certain transaction) associated with the operational event.
In the present disclosure, an individual user will be described as an example, and those skilled in the art will understand that the technical solution of the present disclosure is also applicable to a shop user, an enterprise user, and other types of users.
Fig. 1 is a flow chart illustrating a full link interactive wind control method 100 according to an embodiment of the present disclosure. In fig. 1, the embodiment to be described relates to an individual user performing a placing operation.
At 102, a current operation of a user is received.
In this embodiment, the user is initiating a current operation involving ordering and subsequent payment (i.e., funds transfer).
At 104, the phases in which the user's current operation is in the full link are analyzed, wherein the phases include a pre-event phase, and a post-event phase.
In the online shopping scenario, the full link of online shopping includes registration, login, authentication, goods/information browsing, shopping cart adding, ordering, payment, receiving, evaluation, promotion and marketing, etc. In this link, it can be considered that registration, login, authentication, merchandise/information browsing, shopping cart adding belong to a prior stage, ordering and payment belong to a period in the middle of the day, and receiving, evaluating, promoting and marketing belong to a period after the day.
In this embodiment, the ordering operation is in the event phase. The interim phase refers to when the user's funds are to be transferred. Those skilled in the art will appreciate that the user's current operation may be at any stage of the full link, such as a pre-event stage, an intermediate stage, and a post-event stage. The pre-phase refers to before the user's funds are transferred, and the post-phase refers to after the user's funds are transferred.
The differences in the stages at which current operations are in full link can make the kinds of risks involved very different. In the prior stage, the registration link may encounter risks such as machine registration, stolen information registration, repeated registration and the like, the login link may encounter risks such as library collision, account number theft and the like, the authentication link may encounter risks such as identity information theft and bank card information theft and the like, and the commodity/information browsing link may encounter risks such as crawler access, emulational application and the like. In the in-process stage, the ordering link may be subjected to risks of malicious order brushing/ordering, false transactions and the like, and the payment link may be subjected to risks of cash register, phishing payment, payment refusal and the like. In the latter stage, the receiving link may encounter risks such as problems in the quality of goods/services, the evaluation link may encounter risks such as false evaluation, and the promotion and marketing link may encounter risks such as cotton-padded clothes and wool.
At 106, a corresponding risk detection request is initiated and a risk detection result is obtained based on the stage in which the current operation of the user is in the full link.
Thus, based on the stage in the full link at which the current operation is analyzed at 104, a corresponding risk detection request is initiated. In this embodiment, a request for detection of risk of malicious billing/ordering, fraudulent transactions, etc. that may be encountered may be initiated for the in-flight phase. Those skilled in the art will appreciate that the detection request may also be initiated without limitation for a greater variety of risks.
And the system carries out risk detection based on the risk detection request and acquires a risk detection result.
At 108, an interaction policy with the user is determined based on the obtained risk detection result.
If at this point the system identifies that the user is at risk, the interaction policy with the user will be determined. The interaction policy includes an interaction product policy and an interaction content policy. The interactive product strategy is refined and determined according to factors such as scenes, risks, crowds and the like; on the other hand, the interactive content strategy is further determined according to interactive products, scenes, risks, crowds and other factors, so that the interactive effect is improved.
In this embodiment, for the in-affair stage, interactive products such as pop-up window reminding, question answering reminding, full screen reminding, voice call-out in affair, image-text reminding, examination paper evaluation, intelligent answer, on-end service, delayed account arrival and the like can be selected as required. Products facing the business stage can influence the operation of users, generally, the users are synchronously waited for feedback results on line, the users are synchronously interacted, and the current risk analysis results can be influenced by information fed back by the users.
At 110, the user is reached based on an interaction policy with the user and a different level of interaction is performed with the user to free up risk.
At 110, information is interacted with (i.e., bi-directional information transfer) with the user based on the interaction policy with the user determined at 108. The way to reach the user is usually divided into two ways, end-in reach and end-out reach.
After reaching the user, the user can be interacted with at different levels, namely shallow layer interaction, deep layer interaction and bottom layer interaction. The shallow layer interaction carries out core management and control, and paying experience is emphasized for products (such as asynchronous reminding, weak reminding and the like) with simple interaction in reminding type; deep level interaction performs security service cut-in, emphasizing risk release for complex interaction products (e.g., strong reminders); the underlying interaction carries out fund interception, which is to block the strongest interaction channel (for example, transaction blocking) and pay attention to the risk bottom line.
In the embodiment, for the individual user who is performing the ordering operation, deep interaction, that is, complex bidirectional interaction, can be performed.
Those skilled in the art will appreciate that in the above interactive process, the information acquisition and analysis can be performed using speech recognition and natural language processing techniques, and multiple rounds of interactive sessions with the user can be performed using targeted conversational techniques; also, with the advancement of user intention recognition technology, information acquisition can be accomplished more efficiently and accurately. The technical solution of the present disclosure may incorporate new information processing technology, which is not described herein.
Therefore, the full-link interactive wind control method has full-scene touch ability and full-link interactive products, has rich ability of interacting with users and obtaining more user information, and therefore risk identification/risk release is carried out.
Fig. 2 is a schematic diagram illustrating a full link interactive wind control process according to an embodiment of the present disclosure. In the description of fig. 2, the embodiment to be referred is that an individual user is browsing for goods/information, such as goods reviews of other users.
When the user's prior action is received, the system performs a risk analysis identifying that it may be risking, for example, a copycat application. The analytics engine then utilizes the plurality of models and policies to determine an interaction policy with the user that includes an interaction product policy and an interaction content policy. According to the determined interactive product strategy and the interactive content strategy, the interactive hierarchy, the interactive content and the interactive mode can be determined as required.
As previously described, the interaction hierarchy includes shallow interactions, deep interactions, and underlying interactions. The interactive content may include direct content and process content. The direct content can be directly output without further interaction; and the flow content requires further interaction (e.g., multiple rounds of dialog) before output. The interaction means may include synchronous and asynchronous. The synchronous interaction and synchronous output result affects the operation in real time, and the information fed back by the user can affect the current risk analysis result. And the result of asynchronous interaction and asynchronous output is immediately recovered, and the information fed back by the user is applied to the next risk analysis result in real time. After output, the interactive products and content are rendered by the system and presented to the user.
In this embodiment, since the user is performing a prior operation, the system performs shallow interaction with the user, i.e. asynchronous reminding (e.g. teletext or push-push), and the information asynchronously fed back by the user is recycled for risk analysis of the next operation (e.g. shopping cart adding or order placing).
FIG. 3 is a schematic diagram illustrating a full link interactive wind control analysis engine according to an embodiment of the present disclosure. In the description of fig. 3, the embodiment will be referred to as an individual user performing a receiving operation.
When receiving the current operation of the user, the full-link interactive wind control analysis engine can finely determine an interactive product strategy according to factors such as scenes, risks and crowds, and further determine an interactive content strategy according to the factors such as the interactive products, the scenes, the risks and the crowds.
Based on the interactive product strategy, the analysis engine can further judge the most suitable product template interacted with the user in the template library according to the stage identification information, the crowd information, the control history, and the characteristic related information such as scenes, risk types, repeated prevention logic, the number of control sequence rounds (the number of times of interaction) and the like, so as to optimize the experience and improve the efficiency.
Based on the interactive content policy, the analysis engine may further determine what template content in the content library is most effective for the user interaction according to the characteristics of the scene, the risk category, the crowd information, the management and control history, the product data (e.g., the passing rate, the payment suspension rate), the content data (e.g., the passing rate, the payment suspension rate), and the like, so as to improve the management and control efficiency and reduce the number of interactions of a single user.
The content policies may include content decision trees and process content policies. The content decision tree will produce the computation user interaction content as direct content/flow content. If the content is direct content, directly outputting the content on a content decision tree; and if the flow content is the flow content, entering a flow content strategy and carrying out a refined interactive flow. There are multiple rounds of interaction in each interaction flow. And calculating the content of each round of interaction by combining the model result and the strategy condition, and determining the interaction product and the content which are finally output to the user.
In this embodiment, since the current operation of the user involves a post-incident operation such as a receiving operation, the system recognizes that the user may be at risk of experiencing a problem with the quality of the goods/services, and therefore outputs the underlying interactive product, the transaction will switch from immediate payment to transaction suspension/suspension. The post stage occurs after the user funds transfer. Not limited to the receiving operation in this embodiment, if the system recognizes that the user is at risk in the subsequent full-network scanning, it immediately outputs a suitable post-interaction product to perform bidirectional information transfer with the user, thereby completing risk release.
After-event interaction can be carried out on line to synchronously wait for the feedback result of the user, and the user information can be recovered asynchronously. The information fed back by the user may be applied to the risk judgment in real time, and may also affect the judgment result of the previous transaction. The post-hoc interaction is more comprehensive and deeper in the scheme of the disclosure.
FIG. 4 is a schematic diagram illustrating a full link interactive mode wind control framework according to an embodiment of the present disclosure. The full link interactive mode wind framework will interact according to multiple dimensions. In the description of FIG. 4, interaction may be performed according to three dimensions of the stage at hand, the reach, and the depth of interaction. Those skilled in the art will appreciate that the three dimensions depicted in FIG. 4 are by way of example only, that the selection of interactions is not limited to only these three dimensions, and that the variety and number of dimensions may be altered as desired without departing from the scope of the present disclosure.
In the present embodiment, the stages can be divided into a prior stage, a middle stage and a later stage.
The prior phase refers to before the user's funds transfer occurs. If the system identifies that the user is at risk, the system immediately outputs a proper pre-interaction product to carry out bidirectional information transmission with the user, thereby completing risk release. The prior interaction usually does not affect the operation of the user, and the user does not wait for the feedback result online and carries out asynchronous interaction with the user. The information fed back by the user is applied to the risk judgment in real time. Products that interact in advance include teletext education, transaction confirmation, social messages, and the like.
The interim phase refers to when the user's funds are to be transferred. If the system identifies that the user is at risk, the system immediately outputs a proper in-flight interaction product to carry out two-way information transmission with the user, thereby completing risk release. The interaction in the process can influence the operation of the user, generally, the user is synchronously waited for the result feedback on line, the interaction with the user is synchronous, and the information fed back by the user can influence the current risk analysis result. Products in the in-affair stage comprise interactive products such as popup reminding, question answering reminding, full screen reminding, voice calling in affairs, image-text reminding, examination paper evaluation, intelligent answering, in-terminal service, account delay and the like.
And the post-event stage is after the user's funds are transferred. If the system identifies that the user is at risk in the subsequent whole-network scanning, a proper post-interaction product is output immediately to perform bidirectional information transmission with the user, so that risk release is completed. After-event interaction can be carried out on line to synchronously wait for the feedback result of the user, and the user information can be recovered asynchronously. The information fed back by the user may be applied to the risk judgment in real time, and may also affect the judgment result of the previous transaction. Products in the post stage comprise interactive products such as transaction suspension, intelligent outbound call, short message uplink, mail notification and the like.
In this embodiment, the access modes can be divided into end-in and end-out.
The terminal utilizes a terminal technology, firstly accesses conventional touch means such as service reminding, push pushing and the like, and can touch a user asynchronously in any scene. And then, establishing risk schematic touch capability when the user screenshot is constructed, and covering a user risk screenshot scene. Meanwhile, a suspension assistant is constructed, and when the potential risk behavior of the user is identified, the safety information appears under the condition that the user behavior is not blocked.
And constructing channels such as short message uplink, intelligent telephone, mail and the like outside the terminal. Even if the user does not use the payment treasure in the terminal, when the system actively scans the risks of the user, the user can be quickly touched, and the bidirectional information transmission is completed.
In this embodiment, the interaction depth can be divided into a shallow layer, a deep layer and a bottom layer. The shallow layer interaction carries out core management and control, and paying experience is emphasized for reminding products (such as weak reminding and the like) with simple interaction; deep layer interaction is used for carrying out safety service cut-in, complex interaction products are obtained, and risk release is emphasized; the underlying interaction carries out fund interception, which is to block the strongest interaction channel (for example, transaction blocking) and pay attention to the risk bottom line.
Based on the full-link interactive wind control mode framework shown in fig. 4, risks of the user operation class are released, and the user can verify the awareness and the operation intention of the user to the risks through the interaction with the security service of the user. The system safety information can be transmitted to the user, and more user information can be obtained for risk identification and risk release.
For users with risks, risk treatment is carried out as soon as possible, and user funds are guaranteed; for the risk-free users, the risk is quickly released, and the transaction/operation can be continued; for all users, products and services are combined, and service experience and risk protection are improved in a double-double mode.
Fig. 5 is a block diagram illustrating a full link interactive wind control system 500 according to an embodiment of the present disclosure.
The full link interactive wind control system 500 includes a receiving module 502, an analysis engine module 504, a risk detection module 506, and an interaction module 508.
The receiving module 502 receives a current operation of a user.
Analysis engine module 504 analyzes the phase in which the user's current operation is in the full link, where the phase includes a pre-event phase, and a post-event phase.
In the online shopping scenario, the full link of online shopping includes registration, login, authentication, goods/information browsing, shopping cart adding, ordering, payment, receiving, evaluation, promotion and marketing, etc. In this link, it can be considered that registration, login, authentication, merchandise/information browsing, shopping cart adding belong to a prior stage, ordering and payment belong to a period in the middle of the day, and receiving, evaluating, promoting and marketing belong to a period after the day. As mentioned earlier, the differences in the stages at which current operations are in full link can make the kinds of risks involved very different.
The risk detection module 506 initiates a corresponding risk detection request and obtains a risk detection result based on a stage in which the current operation of the user is in the full link.
The risk detection module 506 initiates a corresponding risk detection request based on the stage in the full link at which the current operation analyzed by the analysis engine module 504 is. The risk detection module 506 performs risk detection based on the risk detection request and obtains a risk detection result.
The interaction module 508 determines an interaction policy with the user based on the obtained risk detection result.
If at this point the system identifies that the user is at risk, the interaction policy with the user will be determined. The interaction policy includes an interaction product policy and an interaction content policy. The interactive product strategy is refined and determined according to factors such as scenes, risks, crowds and the like; on the other hand, the interactive content strategy is further determined according to interactive products, scenes, risks, crowds and other factors, so that the interactive effect is improved.
Further, the interaction module 508 reaches the user based on the interaction policy with the user and interacts with the user at different levels to release the risk.
The interaction module 508 interacts information with the user (i.e., bi-directional information transfer) based on the determined interaction policy with the user. The way to reach the user is usually divided into two ways, end-in reach and end-out reach.
After reaching the user, the user can be interacted with at different levels, namely shallow layer interaction, deep layer interaction and bottom layer interaction. The shallow layer interaction carries out core management and control, and paying experience is emphasized for products (such as asynchronous reminding, weak reminding and the like) with simple interaction in reminding type; deep level interaction performs security service cut-in, emphasizing risk release for complex interaction products (e.g., strong reminders); the underlying interaction carries out fund interception, which is to block the strongest interaction channel (for example, transaction blocking) and pay attention to the risk bottom line.
Therefore, the full-link interactive wind control system disclosed by the invention has full-scene touch ability and full-link interactive products, and has abundant ability of interacting with users and obtaining more user information, so that risk identification/risk release is performed.
The various steps and modules of the full link interactive wind control method and system described above may be implemented in hardware, software, or a combination thereof. If implemented in hardware, the various illustrative steps, modules, and circuits described in connection with the present invention may be implemented or performed with a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or other programmable logic component, hardware component, or any combination thereof. A general purpose processor may be a processor, microprocessor, controller, microcontroller, or state machine, among others. If implemented in software, the various illustrative steps, modules, etc. described in connection with the present invention may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Software modules implementing the various operations of the present invention may reside in storage media such as RAM, flash memory, ROM, EPROM, EEPROM, registers, hard disk, a removable disk, a CD-ROM, cloud storage, etc. A storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium, and execute the corresponding program modules to perform the steps of the present invention. Furthermore, software-based embodiments may be uploaded, downloaded, or accessed remotely through suitable communication means. Such suitable communication means include, for example, the internet, the world wide web, an intranet, software applications, cable (including fiber optic cable), magnetic communication, electromagnetic communication (including RF, microwave, and infrared communication), electronic communication, or other such communication means.
It is also noted that the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged.
The disclosed methods, apparatus, and systems should not be limited in any way. Rather, the invention encompasses all novel and non-obvious features and aspects of the various disclosed embodiments, both individually and in various combinations and sub-combinations with each other. The disclosed methods, apparatus, and systems are not limited to any specific aspect or feature or combination thereof, nor do any of the disclosed embodiments require that any one or more specific advantages be present or that a particular or all technical problem be solved.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes may be made in the embodiments without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (13)

1. A full-link interactive wind control method comprises the following steps:
receiving the current operation of a user;
analyzing the stages of the current operation of the user in the full link, wherein the stages comprise a pre-stage, a pre-stage and a post-stage;
initiating a corresponding risk detection request and acquiring a risk detection result based on the stage of the current operation of the user in the full link;
determining an interaction strategy with the user based on the obtained risk detection result; and
and reaching the user based on the interaction strategy of the user, and interacting with the user at different levels to release risks.
2. The method of claim 1, wherein the interaction policies with the user include an interaction product policy and an interaction content policy.
3. The method of claim 1, the different levels of interaction comprising shallow level interactions, deep level interactions, and underlying level interactions.
4. The method of claim 1, reaching the user through an in-and out-of-end reach channel based on an interaction policy with the user.
5. The method of claim 1, the different levels of interaction may be synchronous interaction or asynchronous interaction.
6. The method of claim 1, the current operation of the user comprising a transactional operation and a non-transactional operation.
7. A full link interactive wind control system comprising:
the receiving module is used for receiving the current operation of a user;
the analysis engine module is used for analyzing the stages of the current operation of the user in the full link, wherein the stages comprise a pre-stage, a pre-stage and a post-stage;
the risk detection module initiates a corresponding risk detection request and acquires a risk detection result based on the stage of the current operation of the user in the full link; and
an interaction module to:
determining an interaction strategy with the user based on the obtained risk detection result; and
and reaching the user based on the interaction strategy of the user, and interacting with the user at different levels to release risks.
8. The system of claim 8, the interaction policy with the user determined by the interaction module comprising an interaction product policy and an interaction content policy.
9. The system of claim 8, the different levels of interaction by the interaction module comprising shallow level interactions, deep level interactions, and underlying level interactions.
10. The system of claim 8, the interaction module reaching the user through an in-and out-of-end reach channel based on an interaction policy with the user.
11. The system of claim 8, wherein the interaction module performs a same level of interaction that may be synchronous or asynchronous.
12. The system of claim 8, wherein the current actions of the user received by the receiving module include transactional actions and non-transactional actions.
13. A computer-readable storage medium having stored thereon instructions that, when executed, cause a machine to perform the method of any of claims 1-6.
CN202110319221.5A 2021-03-25 2021-03-25 Full-link interactive wind control method and system Pending CN112907132A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110319221.5A CN112907132A (en) 2021-03-25 2021-03-25 Full-link interactive wind control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110319221.5A CN112907132A (en) 2021-03-25 2021-03-25 Full-link interactive wind control method and system

Publications (1)

Publication Number Publication Date
CN112907132A true CN112907132A (en) 2021-06-04

Family

ID=76106346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110319221.5A Pending CN112907132A (en) 2021-03-25 2021-03-25 Full-link interactive wind control method and system

Country Status (1)

Country Link
CN (1) CN112907132A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113421136A (en) * 2021-08-25 2021-09-21 深圳兆瑞优品科技有限公司 Online shopping wind control method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376999A (en) * 2018-09-20 2019-02-22 阿里巴巴集团控股有限公司 A kind of management-control method of transaction, device and equipment
CN110147967A (en) * 2019-05-28 2019-08-20 阿里巴巴集团控股有限公司 Risk prevention system method and device
CN110245941A (en) * 2019-04-25 2019-09-17 阿里巴巴集团控股有限公司 A kind of transaction risk recognition methods and device
CN112015578A (en) * 2020-10-26 2020-12-01 上海富友支付服务股份有限公司 Wind control system and method based on pre-synchronous processing and post-asynchronous processing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376999A (en) * 2018-09-20 2019-02-22 阿里巴巴集团控股有限公司 A kind of management-control method of transaction, device and equipment
CN110245941A (en) * 2019-04-25 2019-09-17 阿里巴巴集团控股有限公司 A kind of transaction risk recognition methods and device
CN110147967A (en) * 2019-05-28 2019-08-20 阿里巴巴集团控股有限公司 Risk prevention system method and device
CN112015578A (en) * 2020-10-26 2020-12-01 上海富友支付服务股份有限公司 Wind control system and method based on pre-synchronous processing and post-asynchronous processing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113421136A (en) * 2021-08-25 2021-09-21 深圳兆瑞优品科技有限公司 Online shopping wind control method, device and system

Similar Documents

Publication Publication Date Title
US10956987B2 (en) Applying multi-dimensional variables to determine fraud
US20230259927A1 (en) Secure account creation
CN107808289B (en) Electronic payment platform, control method and device
CN107707970A (en) A kind of electronic contract signature method, system and terminal
CN110598982B (en) Active wind control method and system based on intelligent interaction
US11605088B2 (en) Systems and methods for providing concurrent data loading and rules execution in risk evaluations
US11086991B2 (en) Method and system for active risk control based on intelligent interaction
CN108075962A (en) The scene recognition method of instant messaging dialogue, apparatus and system
KR20160013733A (en) System and method for realtime detection of abnormal financial transaction
CN108961034A (en) System and method, storage medium based on user behavior certification
Thisarani et al. Artificial intelligence for futuristic banking
US11281998B2 (en) Systems and methods for automatic labeling of clusters created by unsupervised machine learning methods
CN112907132A (en) Full-link interactive wind control method and system
CN109978317A (en) Abnormal transaction processing method, interaction platform and computer readable storage medium
CN101540031A (en) Confirmation method for ensuring data validity in network electronic trade
US11973756B2 (en) Systems and methods for improving computer identification
US11961071B2 (en) Secure transactions over communications sessions
CN114841698A (en) Transaction information processing method and device and computer readable storage medium
CN114363839A (en) Fraud data early warning method, device, equipment and storage medium
Singh et al. When social networks meet payment: a security perspective
US20240171674A1 (en) Computer-based systems having computing devices programmed for caller identity verification and methods of use thereof
CN109447649A (en) The processing method and system of transaction request
US20240169257A1 (en) Graph-based event-driven deep learning for entity classification
US20230385832A1 (en) Conserving computing resources during identity validation via a last used account
US11997082B2 (en) Computer-based systems configured for one-time passcode (OTP) protection and methods of use thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination