CN113222611A - Card security level identification method, device, equipment, storage medium and product - Google Patents

Card security level identification method, device, equipment, storage medium and product Download PDF

Info

Publication number
CN113222611A
CN113222611A CN202110556009.0A CN202110556009A CN113222611A CN 113222611 A CN113222611 A CN 113222611A CN 202110556009 A CN202110556009 A CN 202110556009A CN 113222611 A CN113222611 A CN 113222611A
Authority
CN
China
Prior art keywords
security level
target
card
preset
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110556009.0A
Other languages
Chinese (zh)
Inventor
汪丹茹
韦岚
薛新美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202110556009.0A priority Critical patent/CN113222611A/en
Publication of CN113222611A publication Critical patent/CN113222611A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/354Card activation or deactivation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present disclosure provides a card security level identification method, apparatus, device, storage medium and product, the method comprising: when any target card is detected to trigger use operation, acquiring a target operation message corresponding to the use operation in real time; performing security level identification operation on the target operation message by adopting a preset security level identification model to obtain an identification result; and if the security level of the target operation message is determined not to meet the preset security requirement according to the identification result, performing management and control processing on a target card corresponding to the target operation message. Therefore, the real-time monitoring of the corresponding use operation of the target card can be realized, and the target card is quickly processed correspondingly when transaction risks exist, so that the loss of a cardholder is avoided.

Description

Card security level identification method, device, equipment, storage medium and product
Technical Field
The present disclosure relates to the field of data processing, and in particular, to a method, an apparatus, a device, a storage medium, and a product for identifying a security level of a card.
Background
Credit cards are subject to a number of risks, such as counterfeit card control, non-face-to-face fraud, account theft, telecommunications fraud, data tampering, and the like. Therefore, in order to secure the user's card usage, it is necessary to perform a monitoring operation for the risk of credit card usage immediately after the transaction occurs.
However, in the current credit card field, after a risk transaction occurs, a cardholder finds the risk transaction and contacts a bank, and the bank handles the risk transaction according to contents fed back by the cardholder.
However, the risk transaction processing in the above manner often causes great loss to the cardholder, is difficult to trace, and has high tracing cost.
Disclosure of Invention
The disclosure provides a card security level identification method, a device, equipment, a storage medium and a product, which are used for solving the technical problem that the prior art cannot monitor the transaction risk of a credit card in real time.
A first aspect of the present disclosure is to provide a card security level identification method, including:
when any target card is detected to trigger use operation, acquiring a target operation message corresponding to the use operation in real time;
performing security level identification operation on the target operation message by adopting a preset security level identification model to obtain an identification result;
and if the security level of the target operation message is determined not to meet the preset security requirement according to the identification result, performing management and control processing on a target card corresponding to the target operation message.
A second aspect of the present disclosure is to provide a card security level identification apparatus, including:
the acquisition module is used for acquiring a target operation message corresponding to the use operation in real time when the fact that the use operation is triggered by any target card is detected;
the identification module is used for carrying out security level identification operation on the target operation message by adopting a preset security level identification model to obtain an identification result;
and the processing module is used for managing and controlling a target card corresponding to the target operation message if the security level of the target operation message is determined to not meet the preset security requirement according to the identification result. A third aspect of the present disclosure is to provide a card security level identification device, including: a memory, a processor;
a memory; a memory for storing the processor-executable instructions;
wherein the processor is configured to call program instructions in the memory to perform the card security level identification method according to the first aspect.
A fourth aspect of the present disclosure is to provide a computer-readable storage medium having stored therein computer-executable instructions for implementing the card security level identification method according to the first aspect when executed by a processor.
A fifth aspect of the present disclosure is to provide a computer program product comprising a computer program which, when executed by a processor, implements the card security level identification method according to the first aspect.
According to the card security level identification method, the card security level identification device, the card security level identification equipment, the storage medium and the product, when any target card triggering use operation is detected, the target operation message corresponding to the use operation can be obtained in real time. And identifying the target operation message by adopting a preset security level identification model so as to determine whether the security level of the target operation message meets the preset security requirement, and when the security level of the target operation message does not meet the preset security requirement, representing that the target card of the cardholder possibly has a transaction risk, so that the target card corresponding to the target operation message can be directly managed and controlled in order to avoid unnecessary loss of the cardholder. Therefore, the real-time monitoring of the corresponding use operation of the target card can be realized, and the target card is quickly processed correspondingly when transaction risks exist, so that the loss of a cardholder is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a schematic diagram of a system architecture upon which the present disclosure is based;
fig. 2 is a schematic flowchart of a card security level identification method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a card security level identification method according to a second embodiment of the disclosure;
fig. 4 is a schematic flowchart of a card security level identification method according to a third embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a card security level identification apparatus provided in an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a card security level identification apparatus according to a fourth embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a card security level identification device according to a fifth embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. All other embodiments obtained based on the embodiments in the disclosure belong to the protection scope of the disclosure.
The noun explains:
DSS: decision Support System, the Decision Support System, is a computer-based information System for supporting business or organizing Decision-making activities.
An expert system: an intelligent computer program system which contains a large amount of knowledge and experience at the expert level in a certain field and can utilize the knowledge of human experts and a method for solving problems to process the problems in the field.
The regular expression is as follows: also known as regular expressions, is a concept of computer science. Are typically used to retrieve and replace text that conforms to a certain pattern (rule).
In view of the above-mentioned technical problem that the prior art cannot monitor the transaction risk of the credit card in real time, the present disclosure provides a card security level identification method, apparatus, device, storage medium and product.
It should be noted that the card security level identification method, device, equipment, storage medium and product provided by the present disclosure can be applied to a scenario of real-time monitoring of transaction operations of various cards.
In practical applications, there are many risks faced when using credit cards, and in order to avoid the loss of the cardholder, real-time identification of the risk transactions of the credit card is required. However, 1, there is no complete automatic quasi-real-time risk monitoring and processing method in the credit card field at present, after the risk transaction occurs, the cardholder finds and contacts the bank, and the bank processes the transaction again, so the loss is very large, the tracking is difficult, and the tracking cost is high.
In the process of solving the technical problem, the inventor finds, through research, that in order to realize real-time monitoring of risk transaction, when it is detected that any target card triggers a use operation, a target operation message corresponding to the use operation can be obtained in real time, and the security level of the use operation is identified according to the target operation message, so that whether transaction risk exists in the use operation can be determined according to the security level. And when the transaction risk exists, directly carrying out management and control processing on the target card corresponding to the target operation message.
Fig. 1 is a schematic diagram of a system architecture based on the present disclosure, as shown in fig. 1, the system architecture based on the present disclosure at least includes: the terminal equipment comprises terminal equipment 1, a server 2 and a data module 3, wherein the server 2 is internally provided with a card security level identification device which is written by C/C + +, Java, Shell or Python and other languages; the terminal device 1 may be a desktop computer, a tablet computer, or the like. The data module 3 may be a cloud server or a server cluster, and a large amount of data is stored therein.
Fig. 2 is a schematic flowchart of a card security level identification method according to an embodiment of the present disclosure, and as shown in fig. 2, the method includes:
step 201, when detecting that any target card triggers a use operation, obtaining a target operation message corresponding to the use operation in real time.
The execution subject of the embodiment is a card security level recognition device, and the card security level recognition device can be coupled to a server.
In this embodiment, in order to implement real-time monitoring operation on the target card, whether the target card triggers the use operation may be detected, and when the use operation is triggered, a target operation message corresponding to the use operation may be acquired in real time. The target operation message is an operation message for risk identification.
The target card may be a credit card, and the usage operation includes, but is not limited to, a query operation, a cash withdrawal operation, a payment operation, and the like.
As a real-time method, when the trigger use operation is detected, the target operation packet can be acquired by writing the target operation packet into the table. As shown in table 1, the target operation packet is written into the packet content field, the table is partitioned according to the partition condition (NUM _ MSG _ PION) field, and in order to average the number of the inserted records of each partition as much as possible and ensure the efficiency during insertion, the NUM _ MSG _ PION field is two bits after the transaction log number during insertion, that is, p is n%100Wherein p is a partition condition, n is a log number, starting from 100000000 every day, adding one for each transaction, and not repeating in one day.
Figure BDA0003077201410000051
TABLE 1
Due to different transaction scenes, target operation messages are different and are divided into common overdraft and intra-limit staging messages and special staging messages.
The common overdraft transaction refers to the transactions of consumption, cash withdrawal, transfer and the like, and the in-line staging transaction refers to the staging transaction in the credit card line approved by the client during the establishment of the account. The ordinary overdraft and in-credit staging messages refer to transaction messages generated by such transactions. The ordinary overdraft and in-credit staging messages mainly select input messages, card information, client information, transaction process information and ordinary account information to meet the requirement of risk monitoring.
The special installments are personal mortgage-free credit loan businesses provided by banks according to specific consumption requirements of customers and comprehensive customer qualifications. The special staging message is a message generated by such a transaction. The special staging message mainly selects input message, card information, client information, transaction process information, special staging limit information and special staging account information to meet the requirement of risk monitoring.
Step 202, performing security level identification operation on the target operation message by using a preset security level identification model to obtain an identification result.
In this embodiment, after the target operation packet is obtained, a preset security level identification model may be used to perform security level identification operation on the target operation packet, so as to obtain an identification result. The safety level identification model is obtained by adopting a large amount of data to be trained in advance.
Optionally, the security level identification model may be combined with a Decision Support System (DSS), and an expert System technology may be applied to evaluate whether the target operation packet has a transaction risk. The DSS can more fully apply human knowledge, such as descriptive knowledge about decision-making problems, procedural knowledge in the decision-making process, reasoning knowledge for solving problems, and a system for helping to solve complex decision-making problems through logical reasoning. Where the model base provides analytical capability for decision making, rule-based expressions can quickly achieve complex control of strings in a very simple manner.
And 203, if the security level of the target operation message is determined not to meet the preset security requirement according to the identification result, performing management and control processing on a target card corresponding to the target operation message.
In this embodiment, after the identification result is obtained, whether the security level of the target operation packet meets the preset security requirement may be determined according to the identification result. If yes, the use operation is represented as a normal card use operation. Otherwise, the transaction risk exists in the use operation, and at this time, the control processing needs to be performed on the target card corresponding to the target operation message.
Further, on the basis of the first embodiment, the step 202 specifically includes:
and inputting the target operation message into a preset security level identification model, determining the security level of the target operation message through the preset security level identification model, and outputting an identification result.
In this embodiment, part of transaction risks exist in practical application, and the target operation message can be identified only according to one target operation message, so that the target operation message can be directly input to the preset security level identification model, the security level of the target operation message is determined through the preset security level identification model, and an identification result is output.
Further, on the basis of the first embodiment, the step 201 specifically includes:
acquiring all target operation messages in the preset time interval of the target card;
correspondingly, step 202 specifically includes:
and inputting all target operation messages in the preset time interval into a preset security level identification model to obtain an identification result.
In this embodiment, there is a part of transaction risk in practical application, and the identification can be performed according to the target operation packet within a certain time. For example, when a credit card is at risk of illegal use, the operation of frequently inquiring the balance and swiping the card may occur within a certain time.
Therefore, all target operation messages in the preset time interval of the target card can be acquired. And inputting all target operation messages in a preset time interval into a preset security level identification model to obtain an identification result.
According to the card security level identification method provided by the embodiment, when any target card triggering use operation is detected, a target operation message corresponding to the use operation can be acquired in real time. And identifying the target operation message by adopting a preset security level identification model so as to determine whether the security level of the target operation message meets the preset security requirement, and when the security level of the target operation message does not meet the preset security requirement, representing that the target card of the cardholder possibly has a transaction risk, so that the target card corresponding to the target operation message can be directly managed and controlled in order to avoid unnecessary loss of the cardholder. Therefore, the real-time monitoring of the corresponding use operation of the target card can be realized, and the target card is quickly processed correspondingly when transaction risks exist, so that the loss of a cardholder is avoided.
Fig. 3 is a schematic flow chart of a card security level identification method provided in the second embodiment of the present disclosure, where on the basis of the first embodiment, step 201 specifically includes:
step 301, obtaining an operation message corresponding to the use operation.
Step 302, detecting whether the operation message includes a preset target character.
Step 303, if yes, determining the operation message as the target operation message.
In this embodiment, an operation packet corresponding to the use operation may be obtained, and whether the operation packet includes a preset target character is detected, and if the operation packet includes the preset target character, the operation packet may be determined as the target operation packet. Otherwise, the operation message is represented to be incapable of being used for evaluating the security level.
According to the card security level identification method provided by the embodiment, the operation message corresponding to the use operation is obtained, whether the operation message includes the preset target character or not is detected, and the target operation message is screened according to the detection result, so that the target operation message can be accurately obtained, and the efficiency of security level identification is improved.
Fig. 4 is a schematic flow chart of a card security level identification method provided in a third embodiment of the present disclosure, on the basis of any one of the above embodiments, before step 202, the method further includes:
step 401, a data set to be trained is obtained, the data set to be trained includes a plurality of groups of marking information, and each group of marking information includes an operation message to be trained and a security level marking corresponding to the operation message to be trained.
Step 402, training a preset model to be trained by using the data set to be trained to obtain the security level identification model.
In this embodiment, in order to perform an identification operation on a target operation packet by using a security level identification model, first, model training is required to obtain the security level identification model.
Specifically, a data set to be trained may be obtained, where the data set to be trained includes a plurality of sets of label information, and each set of label information includes an operation packet to be trained and a security level label corresponding to the operation packet to be trained. And training a preset model to be trained by adopting the data set to be trained to obtain a security level identification model.
Further, on the basis of any of the above embodiments, after the step 202, the method further includes:
and if the security level of the target operation message is determined not to meet the preset security requirement according to the identification result, storing the target operation message and the corresponding security level into a preset data module, so that the data module determines a list of high-frequency accesses corresponding to the security level not meeting the preset security requirement according to the stored target operation message.
In this embodiment, after obtaining the recognition result output by the security level recognition model, if it is determined according to the recognition result that the security level of the target operation packet does not meet the preset security requirement, the target operation packet and the security level corresponding to the target operation packet are stored in a preset data module, so that the data module determines, according to the stored target operation packet, that the security level does not meet the high-frequency access list corresponding to the preset security requirement. By determining the high-frequency access list, the target card recorded in the high-frequency access list can be monitored in a follow-up manner, so that the transaction risk of a card holder is avoided.
Further, on the basis of any of the above embodiments, step 203 specifically includes:
setting a locking code and/or an operation safety lock for the target card; alternatively, the first and second electrodes may be,
sending a short message prompt to the terminal equipment bound with the target card, wherein the short message prompt comprises an uplink code; alternatively, the first and second electrodes may be,
and calling the terminal equipment corresponding to the target card.
In this embodiment, when it is detected that there is a transaction risk in the use operation, the management and control processing needs to be performed on the target card corresponding to the target operation message. Specifically, one may choose to set the lock code and/or operate the security lock directly on the target card. Or, a short message prompt may be sent to the terminal device bound to the target card, where the short message prompt includes the uplink code. Or, the calling operation can be performed to the terminal device corresponding to the target card. The corresponding processing mode can be selected according to actual requirements, and the method is not limited by the disclosure.
Further, on the basis of any of the above embodiments, after sending the short message prompt to the terminal device bound to the target card, the method further includes:
acquiring a card locking request triggered by a user at a terminal device;
setting a lock code and/or a transaction security lock for the target transaction card according to a lock card request.
In this embodiment, after obtaining the short message prompt, the user may request to lock the target card when it is determined that the target card has a transaction risk. Specifically, a card locking request triggered by a user at a terminal device may be obtained, where the card locking request may specifically be an uplink code. When the uplink code is detected to be consistent with the uplink code in the short message prompt, a locking code and/or a transaction safety lock can be set for the target transaction card according to the card locking request, so that the safety of the target card is ensured.
Fig. 5 is a schematic structural diagram of a card security level identification device according to an embodiment of the present disclosure, and as shown in fig. 5, the card security level identification device specifically includes a core system 51, a transaction cooperation management system 52, a risk monitoring system 53, and a message service platform 54. The core system 51 is specifically configured to obtain an operation packet corresponding to a use operation in real time, and forward the operation packet to the transaction coordination management system 52. The transaction coordination management system 52 may be specifically configured to screen the target operation packet, and forward the screened target operation packet to the risk monitoring system 53. Risk monitoring system 53 is configured to identify the target operation message to determine whether the usage operation is at risk for the transaction. When the security level of the target operation message does not meet the preset security requirement, the message service platform 54 sends a short message prompt to the terminal device bound to the target card.
In practical application, operation messages generated by different card operations are often different, so that in order to realize identification of a target operation message, screening operation can be performed on all operation messages. Specifically, the operation packet includes, but is not limited to, an operation packet for risk control and a packet for sending a short message by a debit card, so that the transaction coordination management system 52 may detect whether a target character is included in the operation packet, determine the packet including the target character as a target operation packet, and forward the target operation packet to the risk monitoring system 53 for data processing. The core system 51 may select the key fields for risk monitoring to send to the transaction coordination management system 52, and the transaction coordination management system 52 forwards the key fields to the risk monitoring system 53. The subsequent risk monitoring system 53 may determine whether the target card has an operational risk according to the target operation message. In addition, the transaction coordination management system 52 may send different operation messages to different operating systems for processing.
According to the card security level identification method provided by the embodiment, the locking code and/or the transaction security lock are/is set for the target transaction card according to the card locking request, so that the security of the target card can be further ensured, and unnecessary loss of a card holder is avoided.
Fig. 6 is a schematic structural diagram of a card security level identification apparatus according to a fourth embodiment of the present disclosure, and as shown in fig. 6, the card security level identification apparatus includes: an acquisition module 61, an identification module 62 and a processing module 63. The obtaining module 61 is configured to obtain, in real time, a target operation message corresponding to a use operation when it is detected that any target card triggers the use operation. And the identification module 62 is configured to perform security level identification operation on the target operation packet by using a preset security level identification model to obtain an identification result. And the processing module 63 is configured to perform management and control processing on the target card corresponding to the target operation packet if it is determined according to the identification result that the security level of the target operation packet does not meet the preset security requirement.
Further, on the basis of the fourth embodiment, the identification module is configured to: and inputting the target operation message into a preset security level identification model, determining the security level of the target operation message through the preset security level identification model, and outputting an identification result.
Further, on the basis of the fourth embodiment, the obtaining module is configured to: and acquiring all target operation messages in the preset time interval of the target card. The identification module is configured to: and inputting all target operation messages in the preset time interval into a preset security level identification model to obtain an identification result.
Further, on the basis of the fourth embodiment, the obtaining module is configured to: and acquiring an operation message corresponding to the use operation. And detecting whether the operation message comprises a preset target character or not. And if so, determining the operation message as the target operation message.
Further, on the basis of any one of the above embodiments, the apparatus further includes: the data set acquisition module is used for acquiring a data set to be trained, the data set to be trained comprises a plurality of groups of marking information, and each group of marking information comprises an operation message to be trained and a security level marking corresponding to the operation message to be trained. And the training module is used for training a preset model to be trained by adopting the data set to be trained to obtain the security level identification model.
Further, on the basis of any one of the above embodiments, the apparatus further includes: and the storage module is used for storing the target operation message and the corresponding security level into a preset data module if the security level of the target operation message is determined to not meet the preset security requirement according to the identification result, so that the data module determines a high-frequency access list corresponding to the security level not meeting the preset security requirement according to the stored target operation message.
Further, on the basis of any of the above embodiments, the processing module is configured to: setting a locking code and/or an operation safety lock for the target card; or sending a short message prompt to the terminal equipment bound with the target card, wherein the short message prompt comprises an uplink code; or, calling operation is carried out on the terminal equipment corresponding to the target card.
Further, on the basis of any of the above embodiments, the processing module is configured to: acquiring a card locking request triggered by a user at a terminal device; setting a lock code and/or a transaction security lock for the target transaction card according to a lock card request.
Fig. 7 is a schematic structural diagram of a card security level identification device according to a fifth embodiment of the present disclosure, and as shown in fig. 7, the card security level identification device includes: a memory 71 and a processor 72.
The memory 71 stores programs. In particular, the program may include program code comprising computer operating instructions. The memory 71 may comprise a high-speed RAM memory, and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
The processor 72 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement the embodiments of the present disclosure.
Alternatively, in a specific implementation, if the memory 71 and the processor 72 are implemented independently, the memory 71 and the processor 72 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 7, but this is not intended to represent only one bus or type of bus.
Alternatively, in a specific implementation, if the memory 71 and the processor 72 are integrated on a chip, the memory 71 and the processor 72 may perform the same communication through an internal interface.
Further, an embodiment of the present disclosure also provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-readable storage medium is used for implementing the card security level identification method according to any one of the above embodiments.
Further, an embodiment of the present disclosure also provides a computer program product, including a computer program, which when executed by a processor implements the card security level identification method according to any of the above embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present disclosure, and not for limiting the same; while the present disclosure has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present disclosure.

Claims (19)

1. A card security level identification method is characterized by comprising the following steps:
when any target card is detected to trigger use operation, acquiring a target operation message corresponding to the use operation in real time;
performing security level identification operation on the target operation message by adopting a preset security level identification model to obtain an identification result;
and if the security level of the target operation message is determined not to meet the preset security requirement according to the identification result, performing management and control processing on a target card corresponding to the target operation message.
2. The method according to claim 1, wherein the obtaining the target operation packet corresponding to the usage operation in real time includes:
acquiring an operation message corresponding to the use operation;
detecting whether the operation message comprises preset target characters or not;
and if so, determining the operation message as the target operation message.
3. The method according to claim 1, wherein the performing security level identification operation on the target operation packet by using a preset security level identification model to obtain an identification result comprises:
and inputting the target operation message into a preset security level identification model, determining the security level of the target operation message through the preset security level identification model, and outputting an identification result.
4. The method according to claim 1, wherein the obtaining the target operation packet corresponding to the usage operation in real time includes:
acquiring all target operation messages in the preset time interval of the target card;
the method for performing security level identification operation on the target operation message by using a preset security level identification model to obtain an identification result includes:
and inputting all target operation messages in the preset time interval into a preset security level identification model to obtain an identification result.
5. The method according to any one of claims 1 to 4, wherein before performing the security level identification operation on the target operation packet by using a preset security level identification model and obtaining the identification result, the method further comprises:
acquiring a data set to be trained, wherein the data set to be trained comprises a plurality of groups of marking information, and each group of marking information comprises an operation message to be trained and a security level mark corresponding to the operation message to be trained;
and training a preset model to be trained by adopting the data set to be trained to obtain the security level identification model.
6. The method according to any one of claims 1 to 4, wherein the performing security level identification operation on the target operation packet by using a preset security level identification model further includes, after obtaining an identification result:
and if the security level of the target operation message is determined not to meet the preset security requirement according to the identification result, storing the target operation message and the corresponding security level into a preset data module, so that the data module determines a list of high-frequency accesses corresponding to the security level not meeting the preset security requirement according to the stored target operation message.
7. The method according to any one of claims 1 to 4, wherein the performing management and control processing on the target card corresponding to the target operation packet includes:
setting a locking code and/or an operation safety lock for the target card; alternatively, the first and second electrodes may be,
sending a short message prompt to the terminal equipment bound with the target card, wherein the short message prompt comprises an uplink code; alternatively, the first and second electrodes may be,
and calling the terminal equipment corresponding to the target card.
8. The method according to claim 7, wherein after sending the short message prompt to the terminal device bound to the target card, the method further comprises:
acquiring a card locking request triggered by a user at a terminal device;
setting a lock code and/or a transaction security lock for the target transaction card according to a lock card request.
9. An apparatus for recognizing security level of a card, comprising:
the acquisition module is used for acquiring a target operation message corresponding to the use operation in real time when the fact that the use operation is triggered by any target card is detected;
the identification module is used for carrying out security level identification operation on the target operation message by adopting a preset security level identification model to obtain an identification result;
and the processing module is used for managing and controlling a target card corresponding to the target operation message if the security level of the target operation message is determined to not meet the preset security requirement according to the identification result.
10. The apparatus of claim 9, wherein the obtaining module is configured to:
acquiring an operation message corresponding to the use operation;
detecting whether the operation message comprises preset target characters or not;
and if so, determining the operation message as the target operation message.
11. The apparatus of claim 9, wherein the identification module is configured to:
and inputting the target operation message into a preset security level identification model, determining the security level of the target operation message through the preset security level identification model, and outputting an identification result.
12. The apparatus of claim 9, wherein the obtaining module is configured to:
acquiring all target operation messages in the preset time interval of the target card;
the identification module is configured to:
and inputting all target operation messages in the preset time interval into a preset security level identification model to obtain an identification result.
13. The apparatus according to any one of claims 9-12, further comprising:
the training system comprises a data set acquisition module, a training module and a training module, wherein the data set acquisition module is used for acquiring a data set to be trained, the data set to be trained comprises a plurality of groups of marking information, and each group of marking information comprises an operation message to be trained and a security level mark corresponding to the operation message to be trained;
and the training module is used for training a preset model to be trained by adopting the data set to be trained to obtain the security level identification model.
14. The apparatus according to any one of claims 9-12, further comprising:
and the storage module is used for storing the target operation message and the corresponding security level into a preset data module if the security level of the target operation message is determined to not meet the preset security requirement according to the identification result, so that the data module determines a high-frequency access list corresponding to the security level not meeting the preset security requirement according to the stored target operation message.
15. The apparatus of any one of claims 9-12, wherein the processing module is configured to:
setting a locking code and/or an operation safety lock for the target card; alternatively, the first and second electrodes may be,
sending a short message prompt to the terminal equipment bound with the target card, wherein the short message prompt comprises an uplink code; alternatively, the first and second electrodes may be,
and calling the terminal equipment corresponding to the target card.
16. The apparatus of claim 15, wherein the processing module is configured to:
acquiring a card locking request triggered by a user at a terminal device;
setting a lock code and/or a transaction security lock for the target transaction card according to a lock card request.
17. A card security level identification device, comprising: a memory, a processor;
a memory; a memory for storing the processor-executable instructions;
wherein the processor is configured to invoke program instructions in the memory to perform the card security level identification method of any of claims 1-8.
18. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, are configured to implement the card security level identification method of any one of claims 1 to 8.
19. A computer program product, characterized in that it comprises a computer program which, when executed by a processor, implements a card security level identification method according to any one of claims 1 to 8.
CN202110556009.0A 2021-05-21 2021-05-21 Card security level identification method, device, equipment, storage medium and product Pending CN113222611A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110556009.0A CN113222611A (en) 2021-05-21 2021-05-21 Card security level identification method, device, equipment, storage medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110556009.0A CN113222611A (en) 2021-05-21 2021-05-21 Card security level identification method, device, equipment, storage medium and product

Publications (1)

Publication Number Publication Date
CN113222611A true CN113222611A (en) 2021-08-06

Family

ID=77093647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110556009.0A Pending CN113222611A (en) 2021-05-21 2021-05-21 Card security level identification method, device, equipment, storage medium and product

Country Status (1)

Country Link
CN (1) CN113222611A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109086975A (en) * 2018-07-10 2018-12-25 阿里巴巴集团控股有限公司 A kind of recognition methods of transaction risk and device
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior
CN111401911A (en) * 2020-03-16 2020-07-10 中国建设银行股份有限公司 Transaction security management and control method, device, equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109086975A (en) * 2018-07-10 2018-12-25 阿里巴巴集团控股有限公司 A kind of recognition methods of transaction risk and device
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior
CN111401911A (en) * 2020-03-16 2020-07-10 中国建设银行股份有限公司 Transaction security management and control method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US6016963A (en) Integrated circuit card with means for performing risk management
US10127554B2 (en) Fraud early warning system and method
US20100169151A1 (en) Alarming system and method for protecting malicious access to bank accounts
CN102509238A (en) Bank non-cash business processing method, apparatus and system
JPWO2018179586A1 (en) Analysis system, analysis method and program
CN110503545A (en) Loan is independently into part method, terminal device, storage medium and device
CN110084561A (en) Breakpoint follow-up method, electronic device and readable storage medium storing program for executing
CN111179066A (en) Batch processing method and device of service data, server and storage medium
CN107644263A (en) Method and server are handled in banking reservation
CN111353891A (en) Auxiliary method and device for identifying suspicious groups in fund transaction data
CN106997528A (en) Control is insured the method and apparatus of payment
JP6947185B2 (en) Anomaly detectors, control methods, and programs
CN106708869B (en) Group data processing method and device
CN113222611A (en) Card security level identification method, device, equipment, storage medium and product
KR20110093398A (en) Device and method for managing mobile terminated service
CN107547614A (en) The Numerical Methods and device of investment platform
CN110943982B (en) Document data encryption method and device, electronic equipment and storage medium
CN114626341A (en) Document conversion method, device and storage medium
CN113934727A (en) Adaptive acquisition and processing system and method for multi-source heterogeneous financial data
CN111445325B (en) Credit card information processing method, device, system and storage medium
Kang Fraud Detection in Mobile Money Transactions Using Machine Learning
CN107169760A (en) Mapping card management method, data processing method and device based on multimedium
CN115641199A (en) Information auditing system and method
CN114119032A (en) Service processing method and device
CN116578681A (en) Service method, device, computer equipment and system for improving user experience

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination