CN113570378A - Wind control variable identification method and device, electronic equipment and storage medium - Google Patents

Wind control variable identification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113570378A
CN113570378A CN202110859442.1A CN202110859442A CN113570378A CN 113570378 A CN113570378 A CN 113570378A CN 202110859442 A CN202110859442 A CN 202110859442A CN 113570378 A CN113570378 A CN 113570378A
Authority
CN
China
Prior art keywords
information
payer
payee
transfer
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110859442.1A
Other languages
Chinese (zh)
Inventor
冀晓镭
申海勇
邢祎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Building Materials Xinyun Zhilian Technology Co ltd
Cnbm Technology Corp ltd
Original Assignee
China Building Materials Xinyun Zhilian Technology Co ltd
Cnbm Technology Corp ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Building Materials Xinyun Zhilian Technology Co ltd, Cnbm Technology Corp ltd filed Critical China Building Materials Xinyun Zhilian Technology Co ltd
Priority to CN202110859442.1A priority Critical patent/CN113570378A/en
Publication of CN113570378A publication Critical patent/CN113570378A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention is applicable to the technical field of electric digital data processing, and particularly relates to a wind control variable identification method, a wind control variable identification device, electronic equipment and a storage medium, wherein the method comprises the following steps: acquiring payer information and payee information; inquiring a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain an inquiry result; analyzing transfer information of the payee according to the information of the payee to obtain an analysis report; and judging whether the current account transfer has risks according to the analysis report and the query result, if so, intervening in the current account transfer transaction through a third party, and assisting the payer to verify the risks of the transaction. The invention analyzes the external environment of the payer and the identity information of the payer, judges whether the current transaction has risk or not by combining the identity information of the payee, and assists the payer to discriminate in a manual intervention mode when the risk exists so as to reduce the possibility that the payer encounters phishing.

Description

Wind control variable identification method and device, electronic equipment and storage medium
Technical Field
The invention belongs to the technical field of electric digital data processing, and particularly relates to a wind control variable identification method and device, electronic equipment and a storage medium.
Background
Risk control refers to the risk manager taking various measures and methods to eliminate or reduce the various possibilities of occurrence of a risk event, or the risk controller reducing the losses incurred when a risk event occurs. The risk is always present and cannot be completely eliminated by means of measures or methods.
Before any risk control is carried out, the source of the risk needs to be identified so as to establish a corresponding coping scheme. With the development of society, online transfer is more and more convenient, and on various mobile terminals, transactions can be completed only by inputting passwords.
Although mobile phone payment is more and more convenient, risks brought by the mobile phone payment are more and more serious, particularly for the old people, the situation of phishing is often existed, the mobile phone payment is very convenient, and once the money transfer is completed, the fund is difficult to recover, so that the current mobile phone payment has certain risks, and the phishing is easier to succeed.
Disclosure of Invention
The embodiment of the invention aims to provide a wind control variable identification method, and aims to solve the problems in the background art.
The embodiment of the invention is realized in such a way that the method for identifying the wind control variable comprises the following steps:
acquiring payer information and payee information, wherein the payer information at least comprises payer real-name authentication information, and the payee information at least comprises payee account information and payee real-name authentication information;
inquiring a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain an inquiry result, wherein the transfer risk data table comprises a safe transfer amount corresponding to the age of the payer;
analyzing transfer information of the payee according to the information of the payee to obtain an analysis report;
judging whether the current transfer has risks according to the analysis report and the query result,
if the risk exists, the current transfer transaction is intervened through a third party, and the payer is assisted to verify the risk of the transaction;
and if no risk exists, executing the transfer operation.
Preferably, the step of querying a preset transfer risk data table according to the payer real name authentication information and the transaction amount to obtain a query result specifically includes:
calculating the age value of the payer according to the real-name authentication information of the payer;
inquiring a transfer risk data table according to the age value of the payer to obtain a corresponding safe transfer amount;
and comparing the transaction amount with the safe transfer amount and generating a query result.
Preferably, the step of analyzing the transfer information of the payee according to the payee information to obtain an analysis report includes:
inquiring the current payee fund transfer record to obtain a fund flow direction account;
acquiring position information when the fund flow completes a transaction to an account;
inquiring the current payee fund transfer record to obtain a fund transfer account;
acquiring real-name authentication information of a transfer person corresponding to the fund transfer account;
and generating an analysis report by combining the position information and the real-name authentication information of the transfer person.
Preferably, the step of judging whether the current transfer is risky according to the analysis report and the query result specifically includes:
determining whether the current transaction amount is within the safety range of the current payer or not according to the query result;
and determining whether the current payee and the account related to the payee have fund risks according to the analysis report.
Preferably, after the step of acquiring the payer information and the payee information, the method further includes:
crawling corresponding payee-related information on the network according to the payee information, wherein the payee-related information at least comprises personal information of losing credit;
evaluating the payee according to the payee-related information of the payee to obtain an evaluation result;
the evaluation results are taken into account when generating the analysis report.
Preferably, in the step of intervening in the current transfer transaction by the third party and assisting the payer in verifying the risk of the transaction, the entire transaction process is recorded and persisted for a predetermined period of time after the transaction is completed.
Preferably, the secure transfer amount is determined according to the age of the payer in transaction with the payer.
Another object of an embodiment of the present invention is to provide a wind control variable identification apparatus, including:
the information acquisition module is used for acquiring payer information and payee information, wherein the payer information at least comprises payer real-name authentication information, and the payee information at least comprises payee account information and payee real-name authentication information;
the data query module is used for querying a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain a query result, wherein the transfer risk data table comprises a safe transfer amount corresponding to the age of the payer;
the information analysis module is used for analyzing the transfer information of the payee according to the information of the payee to obtain an analysis report;
a risk judging module for judging whether the current transfer has risk according to the analysis report and the query result,
the operation execution module is used for intervening in the current transfer transaction through a third party when the risk exists and assisting the payer to verify the risk of the transaction; when there is no risk, a transfer operation is performed.
It is a further object of an embodiment of the present invention to provide an electronic device, which includes a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the steps of the wind control variable identification method.
It is a further object of an embodiment of the present invention to provide a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, causes the processor to perform the steps of the wind control variable identification method as described above.
According to the wind control variable identification method provided by the embodiment of the invention, the external environment of the payer and the identity information of the payer are analyzed, whether the current transaction has risk is judged by combining the identity information of the payee, and when the risk exists, the payer is assisted to be screened in a manual intervention mode, so that the possibility that the payer suffers from phishing is reduced.
Drawings
Fig. 1 is a flowchart of a method for identifying a wind control variable according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of querying a pre-defined transfer risk data table according to payer real-name authentication information and a transaction amount to obtain a query result according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps of analyzing transfer information of a receiver according to receiver information to obtain an analysis report, according to an embodiment of the present invention;
FIG. 4 is a flowchart providing steps for determining if there is a risk in a current transfer based on an analysis report and a query result, according to an embodiment of the present invention;
FIG. 5 is a flowchart of steps included after the step of obtaining payer information and payee information according to an embodiment of the invention;
fig. 6 is an architecture diagram of a wind control variable recognition device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of the present application.
The mobile phone payment is more and more convenient, the risks brought by the mobile phone payment are more and more serious, particularly for the old people, the situation of phishing is often existed, the mobile phone payment is very convenient, and once the transfer is completed, the fund is difficult to recover, so that the current mobile phone payment has certain risks, and the phishing is easier to succeed.
In the invention, the external environment of the payer and the identity information of the payer are analyzed, whether the current transaction has risk is judged by combining the identity information of the payee, and when the risk exists, the payer is assisted to discriminate in a manual intervention mode, so that the possibility of the payer encountering phishing is reduced.
Fig. 1 is a flowchart of a method for identifying a wind control variable according to an embodiment of the present invention, where the method includes:
s100, information of a payer and information of a payee are obtained, wherein the information of the payer at least comprises real-name authentication information of the payer, and the information of the payee at least comprises account information of the payee and real-name authentication information of the payee.
In the current transaction system, the process of transferring funds is generally that a payer initiates transfer, the system performs identity verification on the payer, password verification or biological information verification is performed in the general identity verification process, the funds are transferred into a payee account after the verification is passed, and the payment process is simpler and simpler along with the gradual popularization of fingerprint identification and face identification, so that the old can gradually use a mobile phone to pay, and the payment can be completed only by swiping the face, but the old does not completely adapt to the complicated network world, which causes a large number of old people to suffer from network fraud.
In the step, firstly, payer information and payee information are obtained, wherein the payer information mainly comprises real-name authentication information of a payer, and the age of the payer is judged according to the real-name authentication information, so that whether the current payer belongs to the old is determined, if the payer belongs to the old, the probability of risk occurrence of the transaction is higher, and if the payer does not belong to the old, the risk of the transaction is considered to be low, and whether the payee has the possibility of fraud is judged according to the payee information, so that the risk degree of the whole transaction is evaluated.
And S200, inquiring a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain an inquiry result, wherein the transfer risk data table comprises a safe transfer amount corresponding to the age of the payer.
In this step, the actual age of the current payer is calculated according to the real-name authentication information of the payer, so that whether the current payer belongs to the old is judged, then the transfer risk data table is inquired according to the actual age of the payer, the transfer risk data table records the safe transfer amount corresponding to the age of the payer, for example, for the payer of 60 years, the safe transfer amount is set to 5000 yuan, and for the payer of 70 years, the safe transfer amount is set to 3000 yuan, if the current transfer amount exceeds the safe transfer amount corresponding to the payer of the current age, the existence of the transaction risk is preliminarily determined, of course, the safe transfer amount can be determined according to the age of the payer and the transaction condition of the payer, and if the transaction amount of the payer is generally large, the safe transfer amount can be adjusted to be increased or decreased.
And S300, analyzing the transfer information of the payee according to the information of the payee to obtain an analysis report.
In this step, payee information is analyzed to determine the condition of the payee, the payee information includes payee account information and payee real-name authentication information, and the payee is analyzed through the payee account information, such as creation time, creation location of the payee account, and object of performing fund transaction with the payee, if the creation time of the payee is very short, the creation location is in an area where phishing is frequently occurring, or the object of fund transaction is in an area where phishing is frequently occurring, the risk of transaction with the current payer is considered to be higher, and finally an analysis report is generated, which should be included in the analysis report.
And S400, judging whether the current account transfer has risks or not according to the analysis report and the query result.
In this step, the risk condition of the payee is determined according to the analysis report, and then whether the payer has the capability of judging the risk or not is determined according to the query result, if the payer does not have the capability of identifying the risk or has the risk in the transaction with the payer, the transaction cannot be directly carried out.
S500, if the risk exists, the current transfer transaction is intervened through a third party, and a payer is assisted to verify the risk of the transaction; and if no risk exists, executing the transfer operation.
In the step, different operations are executed according to the judgment of the current transfer risk, after the judgment is finished, if the current transfer risk is considered to be larger, the transaction is finished in a third party intervention mode, the third party is respectively in information communication with the payer and the payee, so that the risk of the transaction is further verified, if the information collected by the third party from the payer and the payee cannot correspond to each other or is asymmetric, the risk is shown to be larger, the emergency contact corresponding to the payer is notified, the situation is notified, and if the information collected by the third party from the payer and the payee can correspond to each other, the current transaction is finished; if no risk exists, executing the transfer operation without intervention of a third party; in the step of intervening the current transfer transaction by a third party and assisting the payer in verifying the risk of the transaction, the whole transaction process is recorded and kept within a preset time period after the transaction is completed.
As shown in fig. 2, as a preferred embodiment of the present invention, the step of querying a preset transfer risk data table according to the payer real name authentication information and the transaction amount to obtain a query result specifically includes:
and S101, calculating the age value of the payer according to the real-name authentication information of the payer.
In this step, real-name authentication information of the payer is acquired, and then the birth date of the payer is extracted therefrom, and then the age value of the payer is estimated according to the current real-time.
And S102, inquiring the transfer risk data table according to the age value of the payer to obtain the corresponding safe transfer amount.
In this step, the transfer risk data table is retrieved based on the age value of the payer as a retrieval basis to find the safe transfer amount corresponding to the age value of the payer, of course, the transfer risk data table should be changed, for example, adjusted according to the personal condition of the payer, and if the payer can authenticate the economic condition of the payer, the transfer risk data table can be adjusted.
S103, comparing the transaction amount with the safe transfer amount, and generating a query result.
In the step, the transaction amount and the safe transfer amount are compared, if the transaction amount is larger than the safe transfer amount, the transaction is indicated to have certain risk, judgment needs to be carried out, if the transaction amount is not larger than the safe transfer amount, the transaction is indicated to have no great loss to a payer even if the risk occurs, the risk does not need to be further judged, and the number of times of intervention of a third party is reduced.
As shown in fig. 3, as a preferred embodiment of the present invention, the step of analyzing the transfer information of the payee according to the payee information to obtain an analysis report specifically includes:
s201, inquiring the current payee fund transfer record to obtain a fund flow account.
In this step, the payee funds transfer-out record is queried, so as to locate the fund flow direction of the payee, and obtain the fund flow direction to the account, wherein the fund flow direction account is the account to which the current payee funds are transferred out.
S202, position information of the fund flow when the fund flow completes the transaction to the account is obtained.
In this step, according to the transaction information between the fund flow account and the payee, the position information of the fund flow account at that time is inquired.
And S203, inquiring the current payee fund transfer record to obtain the fund transfer account.
In this step, the current payee funds transfer record is queried, and for telecom fraud, the number of victims is often multiple, so that there may be a plurality of accounts in different areas to which the same amount of funds are transferred, and thus the funds transfer into the accounts is determined.
And S204, acquiring real-name authentication information of a transfer person corresponding to the fund transfer account.
In this step, the real-name authentication information of the transferor corresponding to the fund transfer account is obtained, and for phishing, the fund of the transferor is generally finally remitted into the final account number, for example, a is a victim, B is a fraud account, C is a background account number, then B defrauding a, the fund of a flows into B, and B quickly transfers the fund into C after the end of fraud.
And S205, generating an analysis report by combining the position information and the real-name authentication information of the transfer person.
In this step, the location information is analyzed, for telecommunication fraud, a fraud is usually set abroad for the security of the fraud, so that the judgment can be assisted by combining the location information, for the real-name authentication information of the money transfer person, the information of the money transfer person can be inquired from the network, and if the money transfer person belongs to the old people, the judgment on whether the fraud risk exists or not can be carried out from the side.
As shown in fig. 4, as a preferred embodiment of the present invention, the step of determining whether the current transfer is risky according to the analysis report and the query result specifically includes:
s301, determining whether the current transaction amount is within the safety range of the current payer or not according to the query result.
In this step, whether the current transaction amount is within the safety range is judged according to the inquiry result, namely, the influence of the current transaction amount on the payer is judged, and if the transaction amount exceeds the safety range of the payer, the transaction risk is relatively high.
And S302, determining whether the current payee and the account related to the payee have fund risks according to the analysis report.
In this step, the payee is determined whether the payee is likely to be fraud, and if the payee-related account has been reported recently or is a deceased person, the payee can be determined that the payee is at a fund risk.
As shown in fig. 5, as a preferred embodiment of the present invention, after the step of obtaining the payer information and the payee information, the method further includes:
s401, corresponding payee-related information is crawled on the network according to payee information, wherein the payee-related information at least comprises personal information of losing credit.
S402, evaluating the payee according to the payee-related information of the payee to obtain an evaluation result.
In the step, corresponding payee-related information is crawled, the payee is searched, whether the payee is on the lost letter list or not is judged, whether an enterprise exists or not is searched when the payee is in the name, and the payee is judged according to the state of the enterprise.
S403, taking the evaluation result into account when generating the analysis report.
In this step, if the payee is the loser, the current transaction is considered to be at a higher risk, otherwise there is no risk.
As shown in fig. 6, a device for identifying a wind control variable according to an embodiment of the present invention includes:
the information obtaining module 100 is configured to obtain payer information and payee information, where the payer information at least includes payer real-name authentication information, and the payee information at least includes payee account information and payee real-name authentication information.
In the present apparatus, the information obtaining module 100 obtains payer information and payee information, where the payer information mainly includes real-name authentication information of a payer, and the age of the payer is determined according to the real-name authentication information, thereby determining whether the current payer belongs to an elderly person.
And the data query module 200 is configured to query a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain a query result, wherein the transfer risk data table includes a safe transfer amount corresponding to the age of the payer.
In the present apparatus, the data query module 200 calculates the actual age of the current payer according to the real-name authentication information of the payer, thereby judging whether the current payer belongs to the old, and then queries the transfer risk data table according to the actual age of the payer, where the transfer risk data table records the safe transfer amount corresponding to the age of the payer.
And the information analysis module 300 is configured to analyze transfer information of the payee according to the payee information to obtain an analysis report.
In the present apparatus, the information analysis module 300 analyzes payee information including payee account information and payee real-name authentication information, and determines the condition of the payee, and analyzes the payee based on the payee account information.
And a risk judgment module 400, configured to judge whether a risk exists in the current transfer according to the analysis report and the query result.
In the present apparatus, the risk judgment module 400 determines the risk condition of the payee according to the analysis report, and further determines whether the payer has the capability of judging the risk according to the query result, and if the payer does not have the capability of recognizing the risk or has a risk in the transaction with the payer, the transaction cannot be directly performed.
An operation execution module 500 for intervening in the current transfer transaction through a third party when there is a risk and assisting the payer in verifying the risk of the transaction; when there is no risk, a transfer operation is performed.
In the device, the operation execution module 500 executes different operations according to the judgment of the current transfer risk, after the judgment is finished, if the current transfer risk is considered to be larger, the transaction is finished in a third party intervention mode, the third party is respectively in information communication with the payer and the payee, so that the risk of the transaction is further verified, if the information collected by the third party from the payer and the payee cannot correspond to each other or is asymmetric, the risk is described to be larger, the emergency contact corresponding to the payer is notified, and the situation is notified.
In one embodiment, an electronic device is proposed, which comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
acquiring payer information and payee information, wherein the payer information at least comprises payer real-name authentication information, and the payee information at least comprises payee account information and payee real-name authentication information;
inquiring a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain an inquiry result, wherein the transfer risk data table comprises a safe transfer amount corresponding to the age of the payer;
analyzing transfer information of the payee according to the information of the payee to obtain an analysis report;
judging whether the current transfer has risks according to the analysis report and the query result,
if the risk exists, the current transfer transaction is intervened through a third party, and the payer is assisted to verify the risk of the transaction;
and if no risk exists, executing the transfer operation.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which, when executed by a processor, causes the processor to perform the steps of:
acquiring payer information and payee information, wherein the payer information at least comprises payer real-name authentication information, and the payee information at least comprises payee account information and payee real-name authentication information;
inquiring a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain an inquiry result, wherein the transfer risk data table comprises a safe transfer amount corresponding to the age of the payer;
analyzing transfer information of the payee according to the information of the payee to obtain an analysis report;
judging whether the current transfer has risks according to the analysis report and the query result,
if the risk exists, the current transfer transaction is intervened through a third party, and the payer is assisted to verify the risk of the transaction;
and if no risk exists, executing the transfer operation.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. The wind control variable identification method is characterized by comprising the following steps:
acquiring payer information and payee information, wherein the payer information at least comprises payer real-name authentication information, and the payee information at least comprises payee account information and payee real-name authentication information;
inquiring a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain an inquiry result, wherein the transfer risk data table comprises a safe transfer amount corresponding to the age of the payer;
analyzing transfer information of the payee according to the information of the payee to obtain an analysis report;
judging whether the current account transfer has risks or not according to the analysis report and the query result;
if the risk exists, the current transfer transaction is intervened through a third party, and the payer is assisted to verify the risk of the transaction;
and if no risk exists, executing the transfer operation.
2. The method for identifying the wind control variable according to claim 1, wherein the step of querying a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain a query result specifically comprises the following steps:
calculating the age value of the payer according to the real-name authentication information of the payer;
inquiring a transfer risk data table according to the age value of the payer to obtain a corresponding safe transfer amount;
and comparing the transaction amount with the safe transfer amount and generating a query result.
3. The method for identifying the wind-controlled variable according to claim 1, wherein the step of analyzing the transfer information of the payee according to the payee information to obtain an analysis report specifically comprises:
inquiring the current payee fund transfer record to obtain a fund flow direction account;
acquiring position information when the fund flow completes a transaction to an account;
inquiring the current payee fund transfer record to obtain a fund transfer account;
acquiring real-name authentication information of a transfer person corresponding to the fund transfer account;
and generating an analysis report by combining the position information and the real-name authentication information of the transfer person.
4. The method for identifying the wind control variable according to claim 1, wherein the step of judging whether the current transfer is risky according to the analysis report and the query result specifically comprises:
determining whether the current transaction amount is within the safety range of the current payer or not according to the query result;
and determining whether the current payee and the account related to the payee have fund risks according to the analysis report.
5. The method of claim 1, wherein the step of obtaining the payer information and the payee information is followed by the step of:
crawling corresponding payee-related information on the network according to the payee information, wherein the payee-related information at least comprises personal information of losing credit;
evaluating the payee according to the payee-related information of the payee to obtain an evaluation result;
the evaluation results are taken into account when generating the analysis report.
6. The method of any of claims 1-5, wherein the step of intervening in the current transfer transaction by a third party and assisting the payer in verifying the risk of the transaction includes recording the entire transaction and persisting for a predetermined period of time after the transaction is completed.
7. The method of identifying a wind controlled variable of claim 2 wherein the amount of the secure transfer is determined based on the age of the payer transacting with the payer.
8. Wind control variable recognition device, characterized in that the device includes:
the information acquisition module is used for acquiring payer information and payee information, wherein the payer information at least comprises payer real-name authentication information, and the payee information at least comprises payee account information and payee real-name authentication information;
the data query module is used for querying a preset transfer risk data table according to the real-name authentication information of the payer and the transaction amount to obtain a query result, wherein the transfer risk data table comprises a safe transfer amount corresponding to the age of the payer;
the information analysis module is used for analyzing the transfer information of the payee according to the information of the payee to obtain an analysis report;
the risk judgment module is used for judging whether the current account transfer has risks according to the analysis report and the query result;
the operation execution module is used for intervening in the current transfer transaction through a third party when the risk exists and assisting the payer to verify the risk of the transaction; when there is no risk, a transfer operation is performed.
9. An electronic device, comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to perform the steps of the method for identifying a wind control variable according to any of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the computer program is stored thereon, which, when being executed by a processor, causes the processor to carry out the steps of the wind control variable identification method according to any one of claims 1 to 7.
CN202110859442.1A 2021-07-28 2021-07-28 Wind control variable identification method and device, electronic equipment and storage medium Pending CN113570378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110859442.1A CN113570378A (en) 2021-07-28 2021-07-28 Wind control variable identification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110859442.1A CN113570378A (en) 2021-07-28 2021-07-28 Wind control variable identification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113570378A true CN113570378A (en) 2021-10-29

Family

ID=78168656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110859442.1A Pending CN113570378A (en) 2021-07-28 2021-07-28 Wind control variable identification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113570378A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115439030A (en) * 2022-11-09 2022-12-06 山东民昊健康科技有限公司 Capital and current information management system based on big data analysis

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115439030A (en) * 2022-11-09 2022-12-06 山东民昊健康科技有限公司 Capital and current information management system based on big data analysis

Similar Documents

Publication Publication Date Title
US11263691B2 (en) System and method for secure transactions at a mobile device
CN108876133B (en) Risk assessment processing method, device, server and medium based on business information
US10275768B2 (en) System and method for selectively initiating biometric authentication for enhanced security of financial transactions
EP3605426A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
US8639016B2 (en) Mobile communication device-based check verification
US10776792B2 (en) Inactive blank checks
CN110489415B (en) Data updating method and related equipment
CN112036890B (en) Customer identity authentication method and device
TWI751499B (en) Transaction processing method, device, equipment, medium and system
US20200143377A1 (en) Systems and methods for user identity authentication
KR102139257B1 (en) System for providing non face to face authentication service
CN111553312A (en) Business handling method and device
CN112766974A (en) Risk account identification method and device, computer equipment and storage medium
CN113067820A (en) Method, device and equipment for early warning abnormal webpage and/or APP
CN113570378A (en) Wind control variable identification method and device, electronic equipment and storage medium
CN104809614A (en) Network and biological feature-based identity recognition and payment device and implementation method thereof
CN114239061A (en) Personal information protection method, personal information protection device, computer equipment and storage medium
KR102561237B1 (en) System for account transfer authentication
CN109493070B (en) Risk information back-checking method and device, computer equipment and storage medium
CN109829750B (en) Public transport transaction information processing method and device and computer equipment
CN114708086A (en) Banking business handling method and device
CN111461734B (en) Service control method and device
CN112801767A (en) Accounting data processing method and device for newly added channels
CN112184237A (en) Data processing method and device and computer readable storage medium
CN111429253A (en) Financial economy lending risk assessment method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination