CN114841698A - Transaction information processing method and device and computer readable storage medium - Google Patents
Transaction information processing method and device and computer readable storage medium Download PDFInfo
- Publication number
- CN114841698A CN114841698A CN202210504360.XA CN202210504360A CN114841698A CN 114841698 A CN114841698 A CN 114841698A CN 202210504360 A CN202210504360 A CN 202210504360A CN 114841698 A CN114841698 A CN 114841698A
- Authority
- CN
- China
- Prior art keywords
- transaction
- information
- server
- verification result
- verifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000010365 information processing Effects 0.000 title abstract description 33
- 238000003672 processing method Methods 0.000 title abstract description 25
- 238000012795 verification Methods 0.000 claims abstract description 126
- 238000000034 method Methods 0.000 claims abstract description 45
- 230000006399 behavior Effects 0.000 claims abstract description 9
- 238000004590 computer program Methods 0.000 claims description 16
- 238000012545 processing Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 description 17
- 239000003999 initiator Substances 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 238000000605 extraction Methods 0.000 description 5
- 230000003993 interaction Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000005034 decoration Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000630 rising effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a transaction information processing method and device and a computer-readable storage medium, and relates to the technical field of cloud computing. Wherein, the method comprises the following steps: acquiring transaction information to be verified, wherein the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount; determining at least one target server for verifying transaction information based on the transaction amount, wherein the target server at least comprises a main server and an edge server; and verifying the transaction information based on at least one target server to generate a target verification result, wherein the target verification result represents whether the transaction between the first transaction object and the second transaction object has fraud behaviors. The invention solves the technical problem of overlarge server load pressure and concurrency pressure caused by that only the main server is adopted for anti-fraud identification in the prior art.
Description
Technical Field
The invention relates to the technical field of cloud computing, in particular to a transaction information processing method and device and a computer-readable storage medium.
Background
With the development of science and technology, the rising of payment modes such as two-dimensional codes and POS machines and the appearance of third-party payment platforms bring great convenience to the transaction of users, and more transaction fraud events are caused at the same time. Many lawbreakers steal the account information of the user through Trojan virus, phishing websites, disguising the identity of an administrator and other modes, and use the stolen account to conduct transaction to cause property loss of an account owner, and in addition, the lawbreakers replace the original collection account through modes of tampering transaction links, covering transaction two-dimensional codes and the like to cause property loss of the collection account.
At present, anti-fraud systems of financial institutions are all deployed on respective core servers, so that the problem that anti-fraud identification of transactions cannot be covered to all transactions exists, meanwhile, a large network delay exists between a transaction terminal and the financial institution core servers, and information interaction is easily influenced by network fluctuation. During peak hours of mobile transaction request initiation, highly concurrent transaction requests can increase the load pressure and concurrency pressure on the transaction core server.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a transaction information processing method, a transaction information processing device and a computer readable storage medium, which at least solve the technical problem of overlarge server load pressure and concurrency pressure caused by that only a main server is adopted for anti-fraud identification in the prior art.
According to an aspect of an embodiment of the present invention, there is provided a method for processing transaction information, including: acquiring transaction information to be verified, wherein the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount; determining at least one target server for verifying transaction information based on the transaction amount, wherein the target server at least comprises a main server and an edge server; and verifying the transaction information based on at least one target server to generate a target verification result, wherein the target verification result represents whether the transaction between the first transaction object and the second transaction object has fraud behaviors.
Further, the transaction information processing method further comprises the following steps: determining a transaction type corresponding to the transaction information according to the transaction amount; when the transaction type is a first transaction type, determining that the target server is an edge server; and when the transaction type is a second transaction type, determining the importance level of the transaction information, and determining the target server according to the importance level, wherein the transaction amount corresponding to the first transaction type is smaller than the transaction amount corresponding to the second transaction type.
Further, the processing method of the transaction information further comprises the following steps: when the importance level of the transaction information is a first importance level, determining that the target server is an edge server; and when the importance level of the transaction information is a second importance level, determining that the target server is the main server, wherein the first importance level is lower than the second importance level.
Further, the transaction information processing method further comprises the following steps: when the load of the edge server is smaller than or equal to a preset load threshold value, controlling the edge server to verify the transaction information; and when the load of the edge server is greater than a preset load threshold value, controlling the edge server to forward the transaction information to the main server so that the main server verifies the transaction information.
Further, the transaction information processing method further comprises the following steps: verifying the transaction information to obtain a verification result; counting the times of verification failure according to the verification result to obtain the counted times; and when the counting times are less than the preset times and the alarm times are less than the preset alarm times, determining that the transaction between the first transaction object and the second transaction object is a normal transaction, wherein the alarm times represent the transaction alarm times corresponding to the first transaction object within the preset time length.
Further, the transaction information processing method further comprises the following steps: and when the counting times are more than or equal to the preset times, generating alarm information, and adding one to the alarm times.
Further, the transaction information processing method further comprises the following steps: when the alarm times are greater than or equal to the preset alarm times, the identity information of the first transaction object is verified; when the identity information of the first transaction object does not meet the first verification condition, determining that the transaction between the first transaction object and the second transaction object is a fraud transaction; when the identity information of the first transaction object meets a first verification condition, verifying the identity information of the second transaction object; and when the identity information of the second transaction object meets a second verification condition, determining that the transaction between the first transaction object and the second transaction object is a normal transaction.
Further, the transaction information processing method further comprises the following steps: and verifying the transaction terminal information to obtain a first verification result, and adding one to the statistical times when the first verification result represents that the transaction terminal information is inconsistent with the preset terminal information of the first transaction object.
Further, the transaction information processing method further comprises the following steps: and verifying the transaction address information to obtain a second verification result, and adding one to the counting times when the second verification result represents that the transaction address information is inconsistent with the preset transaction address information of the first transaction object.
Further, the transaction information processing method further comprises the following steps: and verifying the network address information to obtain a third verification result, and adding one to the statistical times when the third verification result indicates that the network address information is inconsistent with the preset network address information of the first transaction object.
Further, the transaction information processing method further comprises the following steps: and verifying the transaction times to obtain a fourth verification result, and adding one to the statistical times when the fourth verification result indicates that the transaction times are inconsistent with the preset transaction times of the first transaction object.
Further, the transaction information processing method further comprises the following steps: and when the transaction between the first transaction object and the second transaction object is determined to be a fraudulent transaction, sending transaction information of the fraudulent transaction to the edge server, and updating the identity information of the transaction object for carrying out the fraudulent transaction, which is stored in the edge server.
According to another aspect of the embodiments of the present invention, there is also provided a transaction information processing apparatus, including: the acquisition module is used for acquiring transaction information to be verified, wherein the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount; the system comprises a determining module, a verifying module and a verifying module, wherein the determining module is used for determining at least one target server for verifying transaction information based on a transaction amount, and the target server at least comprises a main server and an edge server; and the verification module is used for verifying the transaction information based on at least one target server to generate a target verification result, wherein the target verification result represents whether the transaction between the first transaction object and the second transaction object has fraud behaviors.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the above-mentioned transaction information processing method when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including one or more processors; a memory for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement a processing method for executing the program, wherein the program is arranged to execute the above-mentioned transaction information processing method.
According to another aspect of the embodiments of the present invention, there is also provided a computer program product, which includes a computer program/instruction, when executed by a processor, the computer program/instruction implements the above-mentioned transaction information processing method.
In the embodiment of the invention, a mode of verifying the transaction information by different servers is adopted, the transaction information to be verified is firstly obtained, at least one target server for verifying the transaction information is determined based on the transaction amount, and then the transaction information is verified based on the at least one target server to generate a target verification result. The transaction information is information of transaction between the first transaction object and the second transaction object, the transaction information at least comprises transaction amount, the target server at least comprises a main server and an edge server, and the target verification result represents whether fraud exists in the transaction between the first transaction object and the second transaction object.
In the process, aiming at transactions with different transaction amounts, different servers are used for verifying transaction information, so that the load pressure and the concurrency pressure of the main server are reduced, rapid anti-fraud identification protection can be provided for the transactions, the property safety of both sides of the transactions is ensured, and the condition that the anti-fraud identification of the transactions cannot be covered to all transactions due to the fact that an anti-fraud system is deployed on the main server in the prior art is avoided. In addition, compared with the prior art that the distance between the main server and the user is a fixed distance, the transaction information is verified by using the edge server which is closer to the user, so that the interaction with the user can be rapidly carried out, the request of the user is responded, and the interaction time delay between the server and the user is reduced.
Therefore, through the technical scheme of the invention, the aim of expanding the transaction anti-fraud coverage is fulfilled, so that the technical effects of reducing the risk of transaction occurrence and improving the transaction anti-fraud identification speed are realized, and the technical problem of overlarge server load pressure and concurrency pressure caused by only adopting the main server for anti-fraud identification in the prior art is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow diagram of an alternative method of processing transaction information according to an embodiment of the invention;
FIG. 2 is a schematic diagram of an alternative transaction anti-fraud system according to an embodiment of the present invention;
FIG. 3 is a flow diagram of the operation of an alternative transaction anti-fraud system according to an embodiment of the present invention;
FIG. 4 is a flow diagram of an alternative transaction anti-fraud identification, according to an embodiment of the invention;
FIG. 5 is a flow diagram of an alternative anti-fraud data and roster update according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of an alternative transaction information processing arrangement according to an embodiment of the invention;
FIG. 7 is a schematic diagram of an alternative electronic device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the related information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for presentation, analyzed data, etc.) related to the present invention are information and data authorized by the user or sufficiently authorized by each party. For example, an interface is provided between the system and the relevant user or organization, before obtaining the relevant information, an obtaining request needs to be sent to the user or organization through the interface, and after receiving the consent information fed back by the user or organization, the relevant information is obtained.
Example 1
In accordance with an embodiment of the present invention, there is provided a method embodiment of a method of processing transaction information, it being noted that the steps illustrated in the flowchart of the figure may be performed in a computer system, such as a set of computer-executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than presented herein.
Fig. 1 is a flow chart of an alternative transaction information processing method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
and step S101, acquiring transaction information to be verified.
In the above step, the transaction information to be verified may be obtained through an electronic device, a computing device, an application system, and the like, and in this embodiment, the transaction information to be verified is obtained through a transaction anti-fraud system as shown in fig. 2, where the system includes a transaction information access module, an anti-fraud edge cloud module, and an anti-fraud core system module.
The transaction information access module can cover various payment scenarios, such as online payment and offline payment, and is generally deployed in a transaction terminal, such as a mobile terminal or a PC terminal for online transaction, and a merchant collection terminal or a mobile terminal for offline transaction. Optionally, as shown in the information acquisition flow shown in fig. 3, when two transaction parties perform a transaction, a transaction initiator sends transaction information, including but not limited to account numbers, transaction amounts, biological information such as face recognition and fingerprint recognition, information of a transaction terminal, a transaction address, network information, and the like of the two transaction parties, to a financial institution through a terminal device of the transaction, such as a mobile phone, a computer, and the like, and the financial institution may acquire the transaction information to be verified through the transaction information access module.
It should be noted that, in the above process, the acquired transaction information to be verified at least includes the transaction amount, which provides an information basis for subsequently determining the transaction type.
Step S102, at least one target server for verifying the transaction information is determined based on the transaction amount.
In the above step, at least one target server for verifying the transaction information may be determined by determining the transaction amount in the transaction information, where the target server at least includes a main server and an edge server.
Specifically, before transaction verification, the business department of the financial institution divides transactions into large-amount transactions and small-amount transactions according to the transaction amount, and the specific division principle is set by the business department autonomously, for example, a transaction with a transaction amount greater than 1 ten thousand yuan can be used as a large-amount transaction, and a transaction with a transaction amount less than or equal to 1 ten thousand yuan can be used as a small-amount transaction.
Optionally, the anti-fraud edge cloud module shown in fig. 2 is used as a server for performing transaction verification on a small amount transaction, that is, an edge server, and the anti-fraud core system module is used as a server for performing transaction verification on a large amount transaction, that is, a main server. After the transaction information to be verified is acquired, the transaction information access module performs a transaction information feature extraction process shown in fig. 3, judges whether the received transaction is a large-amount transaction or a small-amount transaction according to the transaction amount in the transaction information, and then sends the transaction to a corresponding server to perform a transaction verification operation, namely, the small-amount transaction is sent to a corresponding edge server to perform transaction verification, and the large-amount transaction is sent to a corresponding main server to perform transaction verification.
It should be noted that the target server corresponding to the verification of the transaction information can be determined through the transaction amount, so that an accurate basis is provided for subsequently judging whether fraudulent behaviors exist in the transaction.
Step S103, the transaction information is verified based on at least one target server, and a target verification result is generated.
In the above steps, after the large-amount transaction and the small-amount transaction are distinguished by the transaction amount and are respectively sent to the corresponding servers, the anti-fraud identification process shown in fig. 3 is performed, and the transaction information is verified by the anti-fraud edge cloud module and the anti-fraud core system module shown in fig. 2, so as to determine whether fraud behaviors exist in the transaction.
It should be noted that, the transaction with different transaction amounts is anti-fraud identified through different servers, compared with the prior art that anti-fraud identification is performed only by adopting a main server, rapid anti-fraud identification service can be provided for small transactions, the load pressure of an anti-fraud core system of a financial institution is effectively relieved, and in addition, large-amount transaction anti-fraud identification is realized on the anti-fraud core system of the financial system, so that the accuracy of large-amount transaction anti-fraud identification is improved, and the financial security of large-amount transactions is ensured.
Based on the schemes defined in steps S101 to S103, it can be seen that, in the embodiment of the present invention, in a manner that different servers verify transaction information, first, the transaction information to be verified is obtained, at least one target server for verifying the transaction information is determined based on a transaction amount, and then, the transaction information is verified based on the at least one target server, so as to generate a target verification result. The transaction information is information of transaction between the first transaction object and the second transaction object, the transaction information at least comprises transaction amount, the target server at least comprises a main server and an edge server, and the target verification result represents whether fraud exists in the transaction between the first transaction object and the second transaction object.
It is easy to notice that in the above process, aiming at the transactions with different transaction amounts, different servers are used for verifying the transaction information, so that the load pressure and the concurrency pressure of the main server are reduced, rapid anti-fraud identification protection can be provided for the transactions, the property safety of both sides of the transactions is ensured, and the condition that the transaction anti-fraud identification cannot be covered to all transactions due to the fact that the anti-fraud system is deployed on the main server in the prior art is avoided. In addition, compared with the prior art that the distance between the main server and the user is a fixed distance, the transaction information is verified by using the edge server which is closer to the user, so that the interaction with the user can be rapidly carried out, the request of the user is responded, and the interaction time delay between the server and the user is reduced.
Therefore, through the technical scheme of the invention, the aim of expanding the transaction anti-fraud coverage is fulfilled, so that the technical effects of reducing the risk of transaction occurrence and improving the transaction anti-fraud identification speed are realized, and the technical problem of overlarge server load pressure and concurrency pressure caused by only adopting the main server for anti-fraud identification in the prior art is solved.
In an optional embodiment, in the process of determining at least one target server for verifying the transaction information based on the transaction amount, the transaction type corresponding to the transaction information is determined according to the transaction amount, when the transaction type is a first transaction type, the target server is determined to be an edge server, when the transaction type is a second transaction type, the importance level of the transaction information is determined, and the target server is determined according to the importance level, wherein the transaction amount corresponding to the first transaction type is smaller than the transaction amount corresponding to the second transaction type.
Optionally, the first transaction type may refer to a small amount transaction, the second transaction type may refer to a large amount transaction, and when the transaction type is a large amount transaction, the transaction information may be continuously subdivided according to the importance level, for example, functions of biological feature extraction, device feature extraction, alarm short message transmission, and the like in the large amount transaction are used as non-core content in the transaction information of the large amount transaction, so that the corresponding server is determined according to the importance level.
It should be noted that, the target server is determined according to the importance level, so that further detailed classification of the transaction information is realized, and a basis is provided for accurate determination of the subsequent target server.
In an alternative embodiment, in the process of determining the target server according to the importance level, the target server is determined to be the edge server when the importance level of the transaction information is a first importance level, and the target server is determined to be the main server when the importance level of the transaction information is a second importance level, wherein the first importance level is lower than the second importance level.
Optionally, the biological feature extraction, the device feature extraction, the alarm short message sending and other functions in the large-amount transaction are used as the non-core content in the transaction information of the large-amount transaction, and the corresponding importance level may be the first importance level, that is, the server for processing the non-core content in the transaction information of the large-amount transaction may be an edge server. It is easy to note that the edge server can perform transaction verification on small transactions and can also process non-core content in transaction information of large transactions. In addition, the importance level corresponding to the core content in the transaction information of the large-amount transaction can be a second importance level, namely, the core content in the transaction information of the large-amount transaction is still processed in the main server.
It should be noted that, the target server is determined according to the importance level, and the non-core content in the large transaction can be processed in the edge server, so that the load pressure of the main server is further relieved, and the full utilization of the server resources is realized.
In an optional embodiment, after the target server is determined to be an edge server, when the load of the edge server is less than or equal to a preset load threshold, the edge server is controlled to verify the transaction information, and when the load of the edge server is greater than the preset load threshold, the edge server is controlled to forward the transaction information to the main server, so that the main server verifies the transaction information.
Optionally, the preset load threshold of the edge server may be the number of task requests in the task process to be processed by the edge server, for example, 100 task requests are used as the preset load threshold, and when the load of the edge server, that is, the number of task requests to be processed is less than or equal to 100, the edge server is controlled to verify the transaction information; when the number of the task requests to be processed by the edge server is more than 100, the edge server can be controlled to forward the transaction information to the main server, so that the transaction information is verified through the main server. The transaction type corresponding to the transaction information forwarded by the edge server may be the small-amount transaction or the non-core content in the transaction information of the large-amount transaction.
It should be noted that when the load of the edge server is too high, the transaction information is forwarded to the main server, so that the effect that the main server and the edge server relieve the load pressure of the other side is achieved, the overall recognition efficiency of the anti-fraud recognition system is further improved, and a safer guarantee is provided for the user transaction.
In an alternative embodiment, the transaction information includes at least one of: the method comprises the steps of verifying transaction information to obtain a verification result, counting the times of failure of verification according to the verification result to obtain the counted times, and determining that the transaction between a first transaction object and a second transaction object is a normal transaction when the counted times are less than the preset times and the alarm times are less than the preset alarm times, wherein the alarm times represent the transaction alarm times corresponding to the first transaction object within the preset time.
Optionally, the identity information of the transaction object may be biological information such as an account number, face recognition, fingerprint recognition, and the like of the transaction object; the transaction terminal information may be terminal equipment commonly used for transaction of a transaction object, such as a mobile phone, a computer and the like; the transaction address information may be a geographic location where the transaction object initiates an offline transaction; the network address information can be a commonly used network IP address when a transaction object initiates an online transaction; the transaction number may refer to the number of times that the transaction object initiates a transaction within a preset time period, i.e., the frequency of initiating transactions.
Specifically, in this embodiment, the transaction information of the transaction initiator is verified, the number of times of verification failure, i.e., the statistical number, is defined as a variable M, the threshold value of the initiator for the number of times of verification failure alarm, i.e., the preset number of times, is defined as a variable Mmax, the number of times of transaction alarm corresponding to the first transaction object within the preset time duration is defined as a variable D, the threshold value of the number of times of transaction alarm corresponding to the first transaction object within the preset time duration, i.e., the preset number of times of alarm, is defined as a variable Dmax, and initial values of the variables are all 0.
Optionally, as shown in fig. 4, the information is verified respectively, and values of M and D are obtained according to the verification result, and when M is less than Mmax and D is less than Dmax, that is, both the verification failure number and the alarm number are less than the threshold, the transaction between the first transaction object and the second transaction object may be determined as a normal transaction.
It should be noted that, by verifying the transaction information and obtaining the verification result according to the statistics times of the verification failure and the alarm times, the transaction information can be judged in many ways, and the accuracy and reliability of the transaction verification result can be ensured.
In an optional embodiment, when the counted times are greater than or equal to the preset times, alarm information is generated, and an operation is performed on the alarm times. Optionally, the alarm information may be a prompt message sent to a mobile phone number registered by the transaction object in the financial institution, so as to prompt that a fraud may exist in the transaction performed by the transaction object. Specifically, when M is greater than or equal to Mmax, the value of D is increased by 1.
It should be noted that when the counted number of times is greater than or equal to the preset number of times, the alarm information is generated, and the transaction object can be reminded of paying attention to possible fraudulent behaviors in the transaction in time, so that the loss of the transaction object is reduced.
In an optional embodiment, when the alarm frequency is greater than or equal to the preset alarm frequency, the identity information of the first transaction object is verified, when the identity information of the first transaction object does not meet a first verification condition, the transaction between the first transaction object and the second transaction object is determined to be a fraudulent transaction, when the identity information of the first transaction object meets the first verification condition, the identity information of the second transaction object is verified, and when the identity information of the second transaction object meets a second verification condition, the transaction between the first transaction object and the second transaction object is determined to be a normal transaction.
Optionally, the first transaction object may be an initiator of the transaction, and the second transaction object may be a recipient of the transaction; the verification of the identity information of the first transaction object may include inputting a dynamic verification code, inputting an identification number and other verification means; the first verification condition can indicate that verification means such as inputting a dynamic verification code and inputting an identity card number and the like are successful for the first transaction object; verifying the identity information of the second transaction object may refer to matching information such as an account number and a terminal of the second object with a blacklist stored by the edge server; the second verification condition may refer to a failure of the second transaction object to match the blacklist.
Specifically, when D is greater than or equal to Dmax, the identity information of the transaction initiator is verified for the second time through the verification means, when the verification fails, the transaction is determined to be a fraudulent transaction, when the verification succeeds, the identity information of the transaction receiver is verified, and when the matching of the account number, the terminal and other information of the second object and the blacklist stored by the edge server fails, the transaction is determined to be a normal transaction.
It should be noted that, by verifying the identity information of the transaction object, the property safety of both parties of the transaction is further ensured.
In an optional embodiment, in the process of verifying the transaction information to obtain a verification result, the transaction terminal information is verified to obtain a first verification result, and when the first verification result represents that the transaction terminal information is inconsistent with the preset terminal information of the first transaction object, an operation of adding one to the statistical frequency is performed. Optionally, the verifying the transaction terminal information may be matching a terminal device used when the first transaction object, i.e., the transaction initiator, performs a transaction with a terminal device commonly used by the first transaction object, and adding 1 to the value of M when the matching fails.
In an optional embodiment, in the process of verifying the transaction information to obtain a verification result, the transaction address information is verified to obtain a second verification result, and when the second verification result represents that the transaction address information is inconsistent with the preset transaction address information of the first transaction object, an operation of adding one to the statistical frequency is performed. Optionally, the verifying the transaction address information may be to match a geographic location where the first transaction object, i.e., the transaction initiator, initiates the offline transaction with an address where the transaction receiver is located, and add 1 to the value of M when the matching fails.
In an optional embodiment, in the process of verifying the transaction information to obtain a verification result, the network address information is verified to obtain a third verification result, and when the third verification result indicates that the network address information is inconsistent with the preset network address information of the first transaction object, an operation of adding one to the statistical frequency is performed. Optionally, the verifying the network address information may be matching a network IP address used when the first transaction object, i.e., the transaction initiator, initiates the online transaction with a commonly used network IP address, and adding 1 to the value of M when the matching fails.
In an optional embodiment, in the process of verifying the transaction information to obtain the verification result, the transaction times are verified to obtain a fourth verification result, and when the fourth verification result indicates that the transaction times are inconsistent with the preset transaction times of the first transaction object, an operation of adding one is performed on the statistical times. Optionally, the verifying the transaction frequency may be comparing the frequency of initiating the transaction by the first transaction object, i.e. the transaction initiator, within a preset time period with the historical transaction frequency, and if the transaction frequency is much greater than the historical transaction frequency, adding 1 to the value of M.
It should be noted that, in some other embodiments, other anti-fraud verification manners may also be extended, for example, the total amount of the transaction performed by the first transaction object, i.e., the transaction initiator, within a preset time period is verified, and if the total amount of the transaction is much larger than the historical average transaction amount, the value of M is increased by 1. The verification process may be performed in a serial manner or in a parallel manner, which is not limited in this embodiment.
It should be noted that, in some other embodiments, after verifying whether a fraudulent behavior exists in the transaction, an information pushing flow as shown in fig. 3 may also be performed, and the transaction information of the fraudulent transaction and the identity information of the transaction object performing the fraudulent transaction are sent to a financial institution or a judicial department.
In an alternative embodiment, when the transaction between the first transaction object and the second transaction object is determined to be a fraudulent transaction, the transaction information of the fraudulent transaction is sent to the edge server, and the identity information of the transaction object for performing the fraudulent transaction stored in the edge server is updated.
Optionally, fig. 5 is a flowchart of optional anti-fraud data and list update according to an embodiment of the present invention, and as shown in fig. 5, after receiving a transaction anti-fraud verification application submitted by both transaction parties, the verification process shown in fig. 3 is performed. The anti-fraud edge cloud module verifies the small-amount transaction, the anti-fraud core system module verifies the large-amount transaction and the small-amount transaction forwarded by the anti-fraud edge cloud module, and when the fact that fraud exists in the transaction is judged, the anti-fraud edge cloud module sends alarm information to the anti-fraud core system module through the asynchronous interface so as to warn that the transaction carried out by two transaction parties is a fraud transaction. The anti-fraud core system module sends the transaction information of the fraud transaction to the anti-fraud edge cloud module through a batch program, and updates the identity information of the transaction object for carrying out the fraud transaction, which is stored in the anti-fraud edge cloud module, namely updates a fraud object blacklist. Optionally, the transaction information of the fraudulent transaction and the data source of the blacklist of the fraudulent object stored in the anti-fraudulent edge cloud module include, but are not limited to, anti-fraudulent data of the ministry of public security and credit investigation data of the national people's bank. It should be noted that, in this embodiment, only a small amount transaction and a large amount transaction are taken as an example, and the core and non-core contents of the large amount transaction are not described, and it is easily noted that the core and non-core contents of the large amount transaction are also applicable to the above updating process, and are not described in detail in this embodiment.
It should be noted that, by updating the identity information of the transaction object performing the fraudulent transaction and the transaction information of the fraudulent transaction stored in the edge server, security guarantee can be further provided for the transaction object.
Therefore, through the technical scheme of the invention, the aim of expanding the transaction anti-fraud coverage is fulfilled, so that the technical effects of reducing the risk of transaction occurrence and improving the transaction anti-fraud identification speed are realized, and the technical problem of overlarge server load pressure and concurrency pressure caused by only adopting the main server for anti-fraud identification in the prior art is solved.
Example 2
According to an embodiment of the present invention, an embodiment of a transaction information processing apparatus is provided, where fig. 6 is a schematic diagram of an alternative transaction information processing apparatus according to an embodiment of the present invention, as shown in fig. 6, the apparatus includes: the acquisition module 601 is configured to acquire transaction information to be verified, where the transaction information is information of a transaction between a first transaction object and a second transaction object, and the transaction information at least includes a transaction amount; a determining module 602, configured to determine at least one target server for verifying transaction information based on a transaction amount, where the target server includes at least a main server and an edge server; the verifying module 603 is configured to verify the transaction information based on at least one target server, and generate a target verification result, where the target verification result represents whether a fraud is present in the transaction between the first transaction object and the second transaction object.
It should be noted that the acquiring module 601, the determining module 602, and the verifying module 603 correspond to steps S101 to S103 in the foregoing embodiment, and the three modules are the same as the corresponding steps in the implementation example and application scenario, but are not limited to the disclosure in embodiment 1.
Optionally, the determining module further includes: the first determining module is used for determining the transaction type corresponding to the transaction information according to the transaction amount; the second determining module is used for determining that the target server is an edge server when the transaction type is the first transaction type; and the third determining module is used for determining the importance level of the transaction information when the transaction type is the second transaction type, and determining the target server according to the importance level, wherein the transaction amount corresponding to the first transaction type is smaller than the transaction amount corresponding to the second transaction type.
Optionally, the transaction information processing apparatus further includes: the fourth determining module is used for determining the target server as the edge server when the importance level of the transaction information is the first importance level; and the fifth determining module is used for determining that the target server is the main server when the importance level of the transaction information is the second importance level, wherein the first importance level is lower than the second importance level.
Optionally, the transaction information processing apparatus further includes: the first control module is used for controlling the edge server to verify the transaction information when the load of the edge server is less than or equal to a preset load threshold value; and the second control module is used for controlling the edge server to forward the transaction information to the main server when the load of the edge server is greater than a preset load threshold value, so that the main server verifies the transaction information.
Optionally, the transaction information processing apparatus further includes: the first verification module is used for verifying the transaction information to obtain a verification result; the statistical module is used for counting the times of verification failure according to the verification result to obtain the statistical times; and the sixth determining module is used for determining that the transaction between the first transaction object and the second transaction object is a normal transaction when the counting times are smaller than the preset times and the alarm times are smaller than the preset alarm times, wherein the alarm times represent the transaction alarm times corresponding to the first transaction object within the preset time length.
Optionally, the transaction information processing apparatus further includes: and the alarm module is used for generating alarm information when the counting times are more than or equal to the preset times and adding one to the alarm times.
Optionally, the transaction information processing apparatus further includes: the second verification module is used for verifying the identity information of the first transaction object when the alarm frequency is greater than or equal to the preset alarm frequency; the seventh determining module is used for determining that the transaction between the first transaction object and the second transaction object is a fraud transaction when the identity information of the first transaction object does not meet the first verification condition; the third verification module is used for verifying the identity information of the second transaction object when the identity information of the first transaction object meets the first verification condition; and the eighth determining module is used for determining that the transaction between the first transaction object and the second transaction object is a normal transaction when the identity information of the second transaction object meets the second verification condition.
Optionally, the first verification module further includes: and the fourth verification module is used for verifying the transaction terminal information to obtain a first verification result, and adding one to the statistical times when the first verification result represents that the transaction terminal information is inconsistent with the preset terminal information of the first transaction object.
Optionally, the first verification module further includes: and the fifth verification module is used for verifying the transaction address information to obtain a second verification result, and when the second verification result represents that the transaction address information is inconsistent with the preset transaction address information of the first transaction object, adding one to the statistical frequency.
Optionally, the first verification module further includes: and the sixth verification module is used for verifying the network address information to obtain a third verification result, and adding one to the statistical times when the third verification result indicates that the network address information is inconsistent with the preset network address information of the first transaction object.
Optionally, the first verification module further includes: and the seventh verification module is used for verifying the transaction times to obtain a fourth verification result, and adding one to the statistical times when the fourth verification result represents that the transaction times are inconsistent with the preset transaction times of the first transaction object.
Optionally, the transaction information processing apparatus further includes: and the updating module is used for sending the transaction information of the fraudulent transaction to the edge server and updating the identity information of the transaction object for carrying out the fraudulent transaction, which is stored in the edge server, when the transaction between the first transaction object and the second transaction object is determined to be the fraudulent transaction.
Example 3
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the above-mentioned transaction information processing method when running.
Example 4
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, wherein fig. 7 is a schematic diagram of an alternative electronic device according to the embodiments of the present invention, as shown in fig. 7, the electronic device includes one or more processors; a memory for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement a processing method for executing the program, wherein the program is arranged to execute the above-mentioned transaction information processing method.
Example 5
According to another aspect of the embodiments of the present invention, there is also provided a computer program product, which includes a computer program/instruction, and the computer program/instruction when executed by a processor implements the above-mentioned transaction information processing method.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or may not be executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (16)
1. A method for processing transaction information, comprising:
acquiring transaction information to be verified, wherein the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount;
determining at least one target server for verifying the transaction information based on the transaction amount, wherein the target server at least comprises a main server and an edge server;
and verifying the transaction information based on the at least one target server to generate a target verification result, wherein the target verification result represents whether the transaction between the first transaction object and the second transaction object has fraud behaviors.
2. The method of claim 1, wherein determining at least one target server to validate the transaction information based on the transaction amount comprises:
determining a transaction type corresponding to the transaction information according to the transaction amount;
when the transaction type is a first transaction type, determining that the target server is the edge server;
and when the transaction type is a second transaction type, determining the importance level of the transaction information, and determining the target server according to the importance level, wherein the transaction amount corresponding to the first transaction type is smaller than the transaction amount corresponding to the second transaction type.
3. The method of claim 2, wherein determining the target server according to the importance level comprises:
when the importance level of the transaction information is a first importance level, determining that the target server is the edge server;
and when the importance level of the transaction information is a second importance level, determining that the target server is the main server, wherein the first importance level is lower than the second importance level.
4. The method of claim 2 or 3, wherein after determining that the target server is the edge server, the method further comprises:
when the load of the edge server is smaller than or equal to a preset load threshold value, controlling the edge server to verify the transaction information;
and when the load of the edge server is greater than the preset load threshold value, controlling the edge server to forward the transaction information to the main server so that the main server verifies the transaction information.
5. The method of claim 1, wherein the transaction information includes at least one of: the identity information of the first transaction object, the identity information of the second transaction object, transaction terminal information, transaction address information, network address information and transaction times, wherein the transaction information is verified based on the at least one target server to generate a target verification result, and the method comprises the following steps:
verifying the transaction information to obtain a verification result;
counting the times of verification failure according to the verification result to obtain the counted times;
and when the counting times are less than the preset times and the alarm times are less than the preset alarm times, determining that the transaction between the first transaction object and the second transaction object is a normal transaction, wherein the alarm times represent the transaction alarm times corresponding to the first transaction object within a preset time length.
6. The method of claim 5, further comprising:
and when the counting times are greater than or equal to the preset times, generating alarm information, and adding one to the alarm times.
7. The method of claim 5, further comprising:
when the alarm times are greater than or equal to the preset alarm times, verifying the identity information of the first transaction object;
when the identity information of the first transaction object does not meet a first verification condition, determining that the transaction between the first transaction object and the second transaction object is a fraud transaction;
when the identity information of the first transaction object meets the first verification condition, verifying the identity information of the second transaction object;
and when the identity information of the second transaction object meets a second verification condition, determining that the transaction between the first transaction object and the second transaction object is the normal transaction.
8. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the transaction terminal information to obtain a first verification result, and adding one to the counting times when the first verification result represents that the transaction terminal information is inconsistent with the preset terminal information of the first transaction object.
9. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the transaction address information to obtain a second verification result, and adding one to the counting times when the second verification result represents that the transaction address information is inconsistent with the preset transaction address information of the first transaction object.
10. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the network address information to obtain a third verification result, and adding one to the counting times when the third verification result indicates that the network address information is inconsistent with the preset network address information of the first transaction object.
11. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the transaction times to obtain a fourth verification result, and adding one to the statistical times when the fourth verification result indicates that the transaction times are inconsistent with the preset transaction times of the first transaction object.
12. The method of claim 1, further comprising:
and when the transaction between the first transaction object and the second transaction object is determined to be a fraudulent transaction, sending transaction information of the fraudulent transaction to the edge server, and updating the identity information of the transaction object for performing the fraudulent transaction, which is stored in the edge server.
13. An apparatus for processing transaction information, comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring transaction information to be verified, the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount;
a determination module, configured to determine at least one target server for verifying the transaction information based on the transaction amount, where the target server includes at least a main server and an edge server;
and the verification module is used for verifying the transaction information based on the at least one target server and generating a target verification result, wherein the target verification result represents whether fraud behaviors exist in the transaction between the first transaction object and the second transaction object.
14. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the method for processing transaction information according to any one of claims 1 to 12 when the computer program is executed.
15. An electronic device, wherein the electronic device comprises one or more processors; memory for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement a method for executing a program, wherein the program is arranged to, when executed, perform a method of processing transaction information as claimed in any of claims 1 to 12.
16. A computer program product comprising computer programs/instructions, characterized in that the computer programs/instructions, when executed by a processor, implement the method of processing transaction information according to any of claims 1 to 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210504360.XA CN114841698A (en) | 2022-05-10 | 2022-05-10 | Transaction information processing method and device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210504360.XA CN114841698A (en) | 2022-05-10 | 2022-05-10 | Transaction information processing method and device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114841698A true CN114841698A (en) | 2022-08-02 |
Family
ID=82569070
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210504360.XA Pending CN114841698A (en) | 2022-05-10 | 2022-05-10 | Transaction information processing method and device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114841698A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116402510A (en) * | 2023-04-14 | 2023-07-07 | 广东车卫士信息科技有限公司 | Non-inductive payment method, medium and equipment based on high concurrency network service |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104680376A (en) * | 2015-03-13 | 2015-06-03 | 中国工商银行股份有限公司 | Transaction information verification method and device |
CN108647972A (en) * | 2018-05-10 | 2018-10-12 | 中国工商银行股份有限公司 | Transaction authentication mode determines method, push server and system |
CN109087091A (en) * | 2018-06-29 | 2018-12-25 | 北京东方英卡数字信息技术有限公司 | A kind of account trading security system and method |
CN111507787A (en) * | 2019-01-30 | 2020-08-07 | 深圳富桂精密工业有限公司 | Commodity transaction method, commodity transaction system, computer device and readable storage medium |
CN111768185A (en) * | 2020-09-01 | 2020-10-13 | 腾讯科技(深圳)有限公司 | Transaction data processing method, related device and storage medium |
-
2022
- 2022-05-10 CN CN202210504360.XA patent/CN114841698A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104680376A (en) * | 2015-03-13 | 2015-06-03 | 中国工商银行股份有限公司 | Transaction information verification method and device |
CN108647972A (en) * | 2018-05-10 | 2018-10-12 | 中国工商银行股份有限公司 | Transaction authentication mode determines method, push server and system |
CN109087091A (en) * | 2018-06-29 | 2018-12-25 | 北京东方英卡数字信息技术有限公司 | A kind of account trading security system and method |
CN111507787A (en) * | 2019-01-30 | 2020-08-07 | 深圳富桂精密工业有限公司 | Commodity transaction method, commodity transaction system, computer device and readable storage medium |
CN111768185A (en) * | 2020-09-01 | 2020-10-13 | 腾讯科技(深圳)有限公司 | Transaction data processing method, related device and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116402510A (en) * | 2023-04-14 | 2023-07-07 | 广东车卫士信息科技有限公司 | Non-inductive payment method, medium and equipment based on high concurrency network service |
CN116402510B (en) * | 2023-04-14 | 2024-01-30 | 广东车卫士信息科技有限公司 | Non-inductive payment method, medium and equipment based on high concurrency network service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101814989B1 (en) | Method of detecting fraud financial trade and server performing the same | |
US10580009B2 (en) | Mobile communications message verification of financial transactions | |
CN105791255B (en) | Computer risk identification method and system based on account clustering | |
US11470116B2 (en) | Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity | |
CN104980402B (en) | Method and device for identifying malicious operation | |
CN112561633B (en) | Virtual object order data verification method, device and equipment | |
CN110874743B (en) | Method and device for determining account transaction risk | |
EP3750275B1 (en) | Method and apparatus for identity authentication, server and computer readable medium | |
CN104967553B (en) | Method for message interaction and relevant apparatus and communication system | |
CN109936556B (en) | Monitoring method and device for account stealing event | |
US20220150243A1 (en) | Authentication server, and non-transitory storage medium | |
WO2015188780A1 (en) | Method and apparatus for processing account information | |
CN111597538A (en) | Verification code generation method and system | |
CN108234454B (en) | Identity authentication method, server and client device | |
CN114841698A (en) | Transaction information processing method and device and computer readable storage medium | |
CN109426961B (en) | Card binding risk control method and device | |
CN113269570A (en) | Extraction result verification method and related device | |
CN109919767B (en) | Transaction risk management method, device and equipment | |
CN115099799A (en) | Transaction processing method and system for digital RMB | |
CN114118993A (en) | Payment method and electronic equipment | |
CN105654379B (en) | Abnormal account moving processing method and device | |
NL2034890B1 (en) | A method and a system for processing transactions between entities | |
CN114338216B (en) | Multidimensional brushing attack prevention and control method, device, equipment and medium | |
CN108924126B (en) | Authentication method, device and equipment for cheat-insurance user terminal and readable storage medium | |
CN106529947A (en) | Payment control method and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |