CN114841698A - Transaction information processing method and device and computer readable storage medium - Google Patents

Transaction information processing method and device and computer readable storage medium Download PDF

Info

Publication number
CN114841698A
CN114841698A CN202210504360.XA CN202210504360A CN114841698A CN 114841698 A CN114841698 A CN 114841698A CN 202210504360 A CN202210504360 A CN 202210504360A CN 114841698 A CN114841698 A CN 114841698A
Authority
CN
China
Prior art keywords
transaction
information
server
verification result
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210504360.XA
Other languages
Chinese (zh)
Inventor
杨煜坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210504360.XA priority Critical patent/CN114841698A/en
Publication of CN114841698A publication Critical patent/CN114841698A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a transaction information processing method and device and a computer-readable storage medium, and relates to the technical field of cloud computing. Wherein, the method comprises the following steps: acquiring transaction information to be verified, wherein the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount; determining at least one target server for verifying transaction information based on the transaction amount, wherein the target server at least comprises a main server and an edge server; and verifying the transaction information based on at least one target server to generate a target verification result, wherein the target verification result represents whether the transaction between the first transaction object and the second transaction object has fraud behaviors. The invention solves the technical problem of overlarge server load pressure and concurrency pressure caused by that only the main server is adopted for anti-fraud identification in the prior art.

Description

交易信息的处理方法、装置及计算机可读存储介质Transaction information processing method, device and computer-readable storage medium

技术领域technical field

本发明涉及云计算技术领域,具体而言,涉及一种交易信息的处理方法、装置及计算机可读存储介质。The present invention relates to the technical field of cloud computing, and in particular, to a method, device and computer-readable storage medium for processing transaction information.

背景技术Background technique

随着科技的发展,二维码、POS机等支付方式的兴起和第三方支付平台的出现为用户的交易带来了极大的便利性,同时也引发了越来越多的交易欺诈事件。许多不法分子通过木马病毒、钓鱼网站、伪装管理员身份等方式盗取用户的账户信息,并使用盗取的账户进行交易造成账户所有人的财产损失,此外,不法分子通过篡改交易链接、覆盖交易二维码等方式替代原收款账户,造成收款账户的财产损失。With the development of science and technology, the rise of payment methods such as QR codes and POS machines and the emergence of third-party payment platforms have brought great convenience to users' transactions, but also triggered more and more transaction fraud incidents. Many criminals steal users' account information through Trojan viruses, phishing websites, disguised administrator identity, etc., and use the stolen accounts to conduct transactions, causing property losses to the account owners. In addition, criminals tamper with transaction links and overwrite transactions. The original collection account is replaced by QR code and other methods, resulting in property loss of the collection account.

目前,金融机构的反欺诈系统均部署在各自的核心服务器上,存在无法将交易反欺诈识别覆盖至所有的交易的问题,同时交易终端和金融机构核心服务器间存在较大的网络延时,信息交互易受网络波动影响。在移动交易请求发起的高峰时段,高并发的交易请求会增加交易核心服务器的负载压力和并发压力。At present, the anti-fraud systems of financial institutions are deployed on their respective core servers, and there is a problem that the transaction anti-fraud identification cannot be covered to all transactions. At the same time, there is a large network delay between the transaction terminal and the core server of the financial institution. Interactions are susceptible to network fluctuations. During the peak period when mobile transaction requests are initiated, high concurrent transaction requests will increase the load pressure and concurrency pressure on the transaction core server.

针对上述的问题,目前尚未提出有效的解决方案。For the above problems, no effective solution has been proposed yet.

发明内容SUMMARY OF THE INVENTION

本发明实施例提供了一种交易信息的处理方法、装置及计算机可读存储介质,以至少解决现有技术中只采用主服务器进行反欺诈识别导致的服务器负载压力和并发压力过大的技术问题。Embodiments of the present invention provide a transaction information processing method, device, and computer-readable storage medium, so as to at least solve the technical problem of excessive server load pressure and concurrency pressure caused by only using the main server for anti-fraud identification in the prior art .

根据本发明实施例的一个方面,提供了一种交易信息的处理方法,包括:获取待验证的交易信息,其中,交易信息为第一交易对象和第二交易对象之间进行交易的信息,交易信息至少包括交易金额;基于交易金额确定对交易信息进行验证的至少一个目标服务器,其中,目标服务器至少包括主服务器和边缘服务器;基于至少一个目标服务器对交易信息进行验证,生成目标验证结果,其中,目标验证结果表征第一交易对象与第二交易对象之间的交易是否存在欺诈行为。According to an aspect of the embodiments of the present invention, a method for processing transaction information is provided, including: acquiring transaction information to be verified, wherein the transaction information is information of a transaction between a first transaction object and a second transaction object, and the transaction The information includes at least the transaction amount; at least one target server for verifying the transaction information is determined based on the transaction amount, wherein the target server at least includes a main server and an edge server; the transaction information is verified based on the at least one target server, and a target verification result is generated, wherein , and the target verification result indicates whether there is fraud in the transaction between the first transaction object and the second transaction object.

进一步地,交易信息的处理方法还包括:根据交易金额确定交易信息所对应的交易类型;在交易类型为第一交易类型时,确定目标服务器为边缘服务器;在交易类型为第二交易类型时,确定交易信息的重要等级,并根据重要等级确定目标服务器,其中,第一交易类型所对应的交易金额小于第二交易类型所对应的交易金额。Further, the processing method of transaction information further includes: determining the transaction type corresponding to the transaction information according to the transaction amount; when the transaction type is the first transaction type, determining that the target server is an edge server; when the transaction type is the second transaction type, The importance level of the transaction information is determined, and the target server is determined according to the importance level, wherein the transaction amount corresponding to the first transaction type is smaller than the transaction amount corresponding to the second transaction type.

进一步地,交易信息的处理方法还包括:在交易信息的重要等级为第一重要等级时,确定目标服务器为边缘服务器;在交易信息的重要等级为第二重要等级时,确定目标服务器为主服务器,其中,第一重要等级低于第二重要等级。Further, the processing method of transaction information also includes: when the importance level of the transaction information is the first importance level, determining the target server as the edge server; when the importance level of the transaction information is the second importance level, determining the target server is the main server. , where the first importance level is lower than the second importance level.

进一步地,交易信息的处理方法还包括:在边缘服务器的负载小于或等于预设负载阈值时,控制边缘服务器对交易信息进行验证;在边缘服务器的负载大于预设负载阈值时,控制边缘服务器转发交易信息至主服务器,以使主服务器对交易信息进行验证。Further, the method for processing transaction information further includes: when the load of the edge server is less than or equal to a preset load threshold, controlling the edge server to verify the transaction information; when the load of the edge server is greater than the preset load threshold, controlling the edge server to forward The transaction information is sent to the main server, so that the main server can verify the transaction information.

进一步地,交易信息的处理方法还包括:对交易信息进行验证,得到验证结果;根据验证结果统计验证失败的次数,得到统计次数;在统计次数小于预设次数,并且,报警次数小于预设报警次数时,确定第一交易对象与第二交易对象之间的交易为正常交易,其中,报警次数表征预设时长内,第一交易对象所对应的交易报警次数。Further, the transaction information processing method further includes: verifying the transaction information to obtain a verification result; counting the number of failed verifications according to the verification result to obtain a statistical number; when the statistical number is less than a preset number, and the alarm number is less than a preset alarm number When the number of times is, it is determined that the transaction between the first transaction object and the second transaction object is a normal transaction, wherein the number of alarms represents the number of transaction alarms corresponding to the first transaction object within a preset time period.

进一步地,交易信息的处理方法还包括:在统计次数大于或等于预设次数时,生成报警信息,并对报警次数进行加一操作。Further, the method for processing transaction information further includes: when the counted number of times is greater than or equal to a preset number of times, generating alarm information, and performing an operation of adding one to the number of alarms.

进一步地,交易信息的处理方法还包括:在报警次数大于或等于预设报警次数时,对第一交易对象的身份信息进行验证;在第一交易对象的身份信息不满足第一验证条件时,确定第一交易对象与第二交易对象之间的交易为欺诈交易;在第一交易对象的身份信息满足第一验证条件时,对第二交易对象的身份信息进行验证;在第二交易对象的身份信息满足第二验证条件时,确定第一交易对象与第二交易对象之间的交易为正常交易。Further, the method for processing transaction information further includes: when the number of alarms is greater than or equal to the preset number of alarms, verifying the identity information of the first transaction object; when the identity information of the first transaction object does not meet the first verification condition, Determine that the transaction between the first transaction object and the second transaction object is a fraudulent transaction; when the identity information of the first transaction object meets the first verification condition, verify the identity information of the second transaction object; When the identity information satisfies the second verification condition, it is determined that the transaction between the first transaction object and the second transaction object is a normal transaction.

进一步地,交易信息的处理方法还包括:对交易终端信息进行验证,得到第一验证结果,在第一验证结果表征交易终端信息与第一交易对象的预设终端信息不一致时,对统计次数进行加一操作。Further, the method for processing transaction information further includes: verifying the transaction terminal information to obtain a first verification result, and when the first verification result indicates that the transaction terminal information is inconsistent with the preset terminal information of the first transaction object, performing the counting of times. Add one operation.

进一步地,交易信息的处理方法还包括:对交易地址信息进行验证,得到第二验证结果,在第二验证结果表征交易地址信息与第一交易对象的预设交易地址信息不一致时,对统计次数进行加一操作。Further, the method for processing transaction information further includes: verifying the transaction address information to obtain a second verification result, and when the second verification result indicates that the transaction address information is inconsistent with the preset transaction address information of the first transaction object, count the number of times. Add one operation.

进一步地,交易信息的处理方法还包括:对网络地址信息进行验证,得到第三验证结果,在第三验证结果表征网络地址信息与第一交易对象的预设网络地址信息不一致时,对统计次数进行加一操作。Further, the method for processing transaction information further includes: verifying the network address information to obtain a third verification result, and when the third verification result indicates that the network address information is inconsistent with the preset network address information of the first transaction object, count the number of times. Add one operation.

进一步地,交易信息的处理方法还包括:对交易次数进行验证,得到第四验证结果,在第四验证结果表征交易次数与第一交易对象的预设交易次数不一致时,对统计次数进行加一操作。Further, the method for processing transaction information further includes: verifying the number of transactions to obtain a fourth verification result, and when the fourth verification result indicates that the number of transactions is inconsistent with the preset number of transactions for the first transaction object, adding one to the number of statistics. operate.

进一步地,交易信息的处理方法还包括:在确定第一交易对象与第二交易对象之间的交易为欺诈交易时,向边缘服务器发送欺诈交易的交易信息,并更新边缘服务器中存储的进行欺诈交易的交易对象的身份信息。Further, the method for processing transaction information further includes: when it is determined that the transaction between the first transaction object and the second transaction object is a fraudulent transaction, sending transaction information of the fraudulent transaction to the edge server, and updating the fraudulent transaction stored in the edge server. The identity information of the transaction object of the transaction.

根据本发明实施例的另一方面,还提供了一种交易信息的处理装置,包括:获取模块,用于获取待验证的交易信息,其中,交易信息为第一交易对象和第二交易对象之间进行交易的信息,交易信息至少包括交易金额;确定模块,用于基于交易金额确定对交易信息进行验证的至少一个目标服务器,其中,目标服务器至少包括主服务器和边缘服务器;验证模块,用于基于至少一个目标服务器对交易信息进行验证,生成目标验证结果,其中,目标验证结果表征第一交易对象与第二交易对象之间的交易是否存在欺诈行为。According to another aspect of the embodiment of the present invention, there is also provided a transaction information processing device, comprising: an acquisition module for acquiring transaction information to be verified, wherein the transaction information is the difference between the first transaction object and the second transaction object The transaction information includes at least the transaction amount; the determination module is used to determine at least one target server that verifies the transaction information based on the transaction amount, wherein the target server at least includes the main server and the edge server; the verification module is used for The transaction information is verified based on at least one target server, and a target verification result is generated, wherein the target verification result represents whether there is fraud in the transaction between the first transaction object and the second transaction object.

根据本发明实施例的另一方面,还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,其中,计算机程序被设置为运行时执行上述的交易信息的处理方法。According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute the above-mentioned transaction information processing method when running. .

根据本发明实施例的另一方面,还提供了一种电子设备,该电子设备包括一个或多个处理器;存储器,用于存储一个或多个程序,当一个或多个程序被一个或多个处理器执行时,使得一个或多个处理器实现用于运行程序,其中,程序被设置为运行时执行上述的交易信息的处理方法。According to another aspect of the embodiments of the present invention, there is also provided an electronic device, the electronic device includes one or more processors; a memory for storing one or more programs, when the one or more programs are processed by one or more When each processor is executed, one or more processors are implemented to run a program, wherein the program is configured to execute the above-mentioned transaction information processing method when running.

根据本发明实施例的另一方面,还提供了一种计算机程序产品,包括计算机程序/指令,该计算机程序/指令被处理器执行时实现上述的交易信息的处理方法。According to another aspect of the embodiments of the present invention, a computer program product is also provided, including a computer program/instruction, when the computer program/instruction is executed by a processor, the above-mentioned processing method of transaction information is implemented.

在本发明实施例中,采用不同服务器对交易信息进行验证的方式,首先获取待验证的交易信息,并基于交易金额确定对交易信息进行验证的至少一个目标服务器,再基于至少一个目标服务器对交易信息进行验证,生成目标验证结果。其中,交易信息为第一交易对象和第二交易对象之间进行交易的信息,交易信息至少包括交易金额,目标服务器至少包括主服务器和边缘服务器,目标验证结果表征第一交易对象与第二交易对象之间的交易是否存在欺诈行为。In the embodiment of the present invention, different servers are used to verify the transaction information. First, the transaction information to be verified is obtained, and at least one target server for verifying the transaction information is determined based on the transaction amount, and then the transaction information is verified based on the at least one target server. The information is verified, and the target verification result is generated. Wherein, the transaction information is the transaction information between the first transaction object and the second transaction object, the transaction information at least includes the transaction amount, the target server includes at least the main server and the edge server, and the target verification result represents the first transaction object and the second transaction. Whether transactions between objects are fraudulent.

在上述过程中,针对不同交易金额的交易,使用不同的服务器对交易信息进行验证,减轻了主服务器的负载压力和并发压力,能够为交易提供快速的反欺诈识别防护,保证了交易双方的财产安全,避免了现有技术中将反欺诈系统部署在主服务器上导致的无法将交易反欺诈识别覆盖至所有的交易的情况。此外,与现在技术中主服务器与用户的距离为固定距离相比,通过使用离用户距离更近的边缘服务器对交易信息进行验证,能够快速地与用户进行交互,并响应用户的请求,降低了服务器与用户之间的交互时延。In the above process, for transactions with different transaction amounts, different servers are used to verify the transaction information, which reduces the load pressure and concurrency pressure of the main server, provides fast anti-fraud identification protection for transactions, and ensures the property of both parties. It is safe, avoiding the situation that the anti-fraud identification of transactions cannot be covered to all transactions caused by deploying the anti-fraud system on the main server in the prior art. In addition, compared with the fixed distance between the main server and the user in the current technology, by using the edge server closer to the user to verify the transaction information, it is possible to quickly interact with the user and respond to the user's request. Interaction delay between server and user.

由此可见,通过本发明的技术方案,达到了扩大交易反欺诈覆盖范围的目的,从而实现了降低交易发生的风险,提高交易反欺诈识别速度的技术效果,进而解决了现有技术中只采用主服务器进行反欺诈识别导致的服务器负载压力和并发压力过大的技术问题。It can be seen that, through the technical solution of the present invention, the purpose of expanding the coverage of transaction anti-fraud is achieved, thereby achieving the technical effect of reducing the risk of transaction occurrence and improving the speed of transaction anti-fraud identification, thereby solving the problem of only using The technical problem of excessive server load pressure and concurrency pressure caused by the main server's anti-fraud identification.

附图说明Description of drawings

此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described herein are used to provide a further understanding of the present invention and constitute a part of the present application. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention. In the attached image:

图1是根据本发明实施例的一种可选的交易信息的处理方法的流程图;1 is a flowchart of an optional transaction information processing method according to an embodiment of the present invention;

图2是根据本发明实施例的一种可选的交易反欺诈系统的示意图;2 is a schematic diagram of an optional transaction anti-fraud system according to an embodiment of the present invention;

图3是根据本发明实施例的一种可选的交易反欺诈系统的工作流程图;3 is a flow chart of an optional transaction anti-fraud system according to an embodiment of the present invention;

图4是根据本发明实施例的一种可选的交易反欺诈识别的流程图;4 is a flowchart of an optional transaction anti-fraud identification according to an embodiment of the present invention;

图5是根据本发明实施例的一种可选的反欺诈数据及名单更新的流程图;5 is a flowchart of an optional anti-fraud data and list update according to an embodiment of the present invention;

图6是根据本发明实施例的一种可选的交易信息的处理装置的示意图;6 is a schematic diagram of an optional transaction information processing apparatus according to an embodiment of the present invention;

图7是根据本发明实施例的一种可选的电子设备的示意图。FIG. 7 is a schematic diagram of an optional electronic device according to an embodiment of the present invention.

具体实施方式Detailed ways

为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。In order to make those skilled in the art better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only Embodiments are part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used may be interchanged under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having" and any variations thereof, are intended to cover non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units is not necessarily limited to those expressly listed Rather, those steps or units may include other steps or units not expressly listed or inherent to these processes, methods, products or devices.

需要说明的是,本发明所涉及的相关信息(包括但不限于用户设备信息、用户个人信息等)和数据(包括但不限于用于展示的数据、分析的数据等),均为经用户授权或者经过各方充分授权的信息和数据。例如,本系统和相关用户或机构间设置有接口,在获取相关信息之前,需要通过接口向前述的用户或机构发送获取请求,并在接收到前述的用户或机构反馈的同意信息后,获取相关信息。It should be noted that the relevant information (including but not limited to user equipment information, user personal information, etc.) and data (including but not limited to display data, analysis data, etc.) involved in the present invention are all authorized by the user or information and data fully authorized by the parties. For example, there is an interface between the system and relevant users or institutions. Before obtaining relevant information, it is necessary to send an acquisition request to the aforementioned users or institutions through the interface, and after receiving the consent information fed back by the aforementioned users or institutions, obtain relevant information. information.

实施例1Example 1

根据本发明实施例,提供了一种交易信息的处理方法的方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。According to an embodiment of the present invention, a method embodiment of a method for processing transaction information is provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.

图1是根据本发明实施例的一种可选的交易信息的处理方法的流程图,如图1所示,该方法包括如下步骤:FIG. 1 is a flowchart of an optional transaction information processing method according to an embodiment of the present invention. As shown in FIG. 1 , the method includes the following steps:

步骤S101,获取待验证的交易信息。Step S101, acquiring transaction information to be verified.

在上述步骤中,可以通过电子设备、计算设备、应用系统等装置获取待验证的交易信息,在本实施例中,通过如图2所示的交易反欺诈系统获取待验证的交易信息,此系统包含交易信息接入模块、反欺诈边缘云模块以及反欺诈核心系统模块。In the above steps, the transaction information to be verified can be obtained through electronic equipment, computing equipment, application systems and other devices. In this embodiment, the transaction information to be verified is obtained through the transaction anti-fraud system shown in FIG. 2 . It includes transaction information access module, anti-fraud edge cloud module and anti-fraud core system module.

其中,上述交易信息接入模块能够覆盖多种支付场景,例如线上支付、线下支付,通常部署在交易的终端中,例如线上交易的移动终端或PC终端、线下交易的商家收款终端或移动终端。可选的,如图3所示的信息采集流程,交易双方在进行交易时,交易发起方会通过交易的终端,例如,手机、电脑等终端设备,向金融机构发送交易信息,包括但不限于交易双方的账号、交易金额、人脸识别、指纹识别等生物信息、交易终端信息、交易地址、网络信息等信息,金融机构通过上述交易信息接入模块可以获取到待验证的交易信息。Among them, the above-mentioned transaction information access module can cover a variety of payment scenarios, such as online payment and offline payment, and is usually deployed in transaction terminals, such as mobile terminals or PC terminals for online transactions, and merchants for offline transactions. terminal or mobile terminal. Optionally, as shown in the information collection process shown in Figure 3, when both parties to a transaction conduct a transaction, the transaction initiator will send transaction information to the financial institution through the transaction terminal, such as a mobile phone, computer and other terminal equipment, including but not limited to. The account number, transaction amount, biometric information such as face recognition, fingerprint recognition, transaction terminal information, transaction address, network information and other information of both parties to the transaction, financial institutions can obtain transaction information to be verified through the above transaction information access module.

需要说明的是,在上述过程中,获取到的待验证的交易信息至少包括交易金额,为后续对交易类型进行判断提供了信息基础。It should be noted that, in the above process, the acquired transaction information to be verified includes at least the transaction amount, which provides an information basis for the subsequent judgment of the transaction type.

步骤S102,基于交易金额确定对交易信息进行验证的至少一个目标服务器。Step S102, at least one target server for verifying the transaction information is determined based on the transaction amount.

在上述步骤中,通过对交易信息中的交易金额进行判断,可以确定出对交易信息进行验证的至少一个目标服务器,目标服务器至少包括主服务器和边缘服务器。In the above steps, by judging the transaction amount in the transaction information, at least one target server for verifying the transaction information can be determined, and the target server at least includes a main server and an edge server.

具体的,在进行交易验证之前,金融机构的业务部门根据交易金额的大小将交易划分为大额交易和小额交易,具体划分原则由业务部门自主设定,例如,可以将交易金额大于1万元的交易作为大额交易,将交易金额小于或等于1万元的交易作为小额交易。Specifically, before the transaction verification, the business department of the financial institution divides the transaction into large-value transactions and small-value transactions according to the size of the transaction amount. The specific division principle is independently set by the business department. A transaction of RMB 10,000 is regarded as a large-value transaction, and a transaction with a transaction amount less than or equal to 10,000 yuan is regarded as a small-value transaction.

可选的,将如图2所示的反欺诈边缘云模块作为对小额交易进行交易验证的服务器,即边缘服务器,将反欺诈核心系统模块作为对大额交易进行交易验证的服务器,即主服务器。交易信息接入模块在获取到待验证的交易信息之后,进行如图3所示的交易信息特征提取流程,根据交易信息中的交易金额判断出接收到的交易是大额交易还是小额交易,然后将交易发送到对应的服务器上进行交易验证操作,即将小额交易发送到其所对应的边缘服务器上进行交易验证,将大额交易发送到其所对应的主服务器上进行交易验证。Optionally, the anti-fraud edge cloud module as shown in Figure 2 is used as the server for transaction verification for small-value transactions, that is, the edge server, and the anti-fraud core system module is used as the server for transaction verification for large-value transactions, that is, the main server. server. After acquiring the transaction information to be verified, the transaction information access module performs the transaction information feature extraction process as shown in Figure 3, and determines whether the received transaction is a large-value transaction or a small-value transaction according to the transaction amount in the transaction information, Then, the transaction is sent to the corresponding server for transaction verification, that is, the small transaction is sent to its corresponding edge server for transaction verification, and the large transaction is sent to its corresponding main server for transaction verification.

需要说明的是,通过交易金额可以确定出对交易信息进行验证所对应的目标服务器,从而为后续对交易中是否存在欺诈行为进行判断提供了准确的基础。It should be noted that the target server corresponding to the verification of the transaction information can be determined through the transaction amount, thereby providing an accurate basis for the subsequent judgment on whether there is fraud in the transaction.

步骤S103,基于至少一个目标服务器对交易信息进行验证,生成目标验证结果。Step S103, verifying the transaction information based on at least one target server, and generating a target verification result.

在上述步骤中,在通过交易金额区分出大额、小额交易并分别发送给对应的服务器之后,进行如图3所示的反欺诈识别流程,通过如图2所示的反欺诈边缘云模块和反欺诈核心系统模块对交易信息进行验证,从而判断出交易中是否存在欺诈行为。In the above steps, after distinguishing large-value and small-value transactions according to the transaction amount and sending them to the corresponding servers, the anti-fraud identification process shown in Figure 3 is performed, and the anti-fraud edge cloud module shown in Figure 2 is used. And the anti-fraud core system module verifies the transaction information to determine whether there is fraud in the transaction.

需要说明的是,通过不同服务器对不同交易金额的交易进行反欺诈识别,与现有技术中只采用主服务器进行反欺诈识别相比,能够为小额交易提供快速的反欺诈识别服务,有效的缓解了金融机构反欺诈核心系统的负载压力,此外,大额交易反欺诈识别在金融系统的反欺诈核心系统上实现,提升了大额交易反欺诈识别的准确性,保证了大额交易的金融安全。It should be noted that, using different servers to perform anti-fraud identification on transactions with different transaction amounts, compared with the prior art using only the main server for anti-fraud identification, it can provide fast anti-fraud identification services for small-value transactions, and is effective. The load pressure of the anti-fraud core system of financial institutions is relieved. In addition, the anti-fraud recognition of large-value transactions is implemented on the anti-fraud core system of the financial system, which improves the accuracy of anti-fraud recognition of large-value transactions and ensures the financial stability of large-value transactions. Safety.

基于上述步骤S101至步骤S103所限定的方案,可以获知,在本发明实施例中,采用不同服务器对交易信息进行验证的方式,首先获取待验证的交易信息,并基于交易金额确定对交易信息进行验证的至少一个目标服务器,再基于至少一个目标服务器对交易信息进行验证,生成目标验证结果。其中,交易信息为第一交易对象和第二交易对象之间进行交易的信息,交易信息至少包括交易金额,目标服务器至少包括主服务器和边缘服务器,目标验证结果表征第一交易对象与第二交易对象之间的交易是否存在欺诈行为。Based on the solutions defined in the above steps S101 to S103, it can be known that, in this embodiment of the present invention, different servers are used to verify the transaction information, and the transaction information to be verified is first obtained, and the transaction information is determined based on the transaction amount. The verified at least one target server verifies the transaction information based on the at least one target server to generate a target verification result. Wherein, the transaction information is the transaction information between the first transaction object and the second transaction object, the transaction information at least includes the transaction amount, the target server includes at least the main server and the edge server, and the target verification result represents the first transaction object and the second transaction. Whether transactions between objects are fraudulent.

容易注意到的是,在上述过程中,针对不同交易金额的交易,使用不同的服务器对交易信息进行验证,减轻了主服务器的负载压力和并发压力,能够为交易提供快速的反欺诈识别防护,保证了交易双方的财产安全,避免了现有技术中将反欺诈系统部署在主服务器上导致的无法将交易反欺诈识别覆盖至所有的交易的情况。此外,与现在技术中主服务器与用户的距离为固定距离相比,通过使用离用户距离更近的边缘服务器对交易信息进行验证,能够快速地与用户进行交互,并响应用户的请求,降低了服务器与用户之间的交互时延。It is easy to notice that in the above process, for transactions of different transaction amounts, different servers are used to verify transaction information, which reduces the load pressure and concurrency pressure of the main server, and can provide fast anti-fraud identification protection for transactions. The property safety of both parties of the transaction is ensured, and the situation in which the anti-fraud identification of the transaction cannot be covered to all transactions caused by deploying the anti-fraud system on the main server in the prior art is avoided. In addition, compared with the fixed distance between the main server and the user in the current technology, by using the edge server closer to the user to verify the transaction information, it is possible to quickly interact with the user and respond to the user's request. Interaction delay between server and user.

由此可见,通过本发明的技术方案,达到了扩大交易反欺诈覆盖范围的目的,从而实现了降低交易发生的风险,提高交易反欺诈识别速度的技术效果,进而解决了现有技术中只采用主服务器进行反欺诈识别导致的服务器负载压力和并发压力过大的技术问题。It can be seen that, through the technical solution of the present invention, the purpose of expanding the coverage of transaction anti-fraud is achieved, thereby achieving the technical effect of reducing the risk of transaction occurrence and improving the speed of transaction anti-fraud identification, thereby solving the problem of only using The technical problem of excessive server load pressure and concurrency pressure caused by the main server's anti-fraud identification.

在一种可选的实施例中,在基于交易金额确定对交易信息进行验证的至少一个目标服务器的过程中,根据交易金额确定交易信息所对应的交易类型,在交易类型为第一交易类型时,确定目标服务器为边缘服务器,在交易类型为第二交易类型时,确定交易信息的重要等级,并根据重要等级确定目标服务器,其中,第一交易类型所对应的交易金额小于第二交易类型所对应的交易金额。In an optional embodiment, in the process of determining at least one target server that verifies the transaction information based on the transaction amount, the transaction type corresponding to the transaction information is determined according to the transaction amount, and when the transaction type is the first transaction type , determine that the target server is an edge server, and when the transaction type is the second transaction type, determine the importance level of the transaction information, and determine the target server according to the importance level, wherein the transaction amount corresponding to the first transaction type is less than that of the second transaction type. the corresponding transaction amount.

可选的,第一交易类型可以指小额交易,第二交易类型可以指大额交易,当交易类型为大额交易时,可以根据重要等级继续对交易信息进行细分,例如,将大额交易中的生物特征提取、设备特征提取、报警短信发送等功能作为大额交易的交易信息中的非核心内容,从而根据重要等级确定对应的服务器。Optionally, the first transaction type may refer to a small-value transaction, and the second transaction type may refer to a large-value transaction. When the transaction type is a large-value transaction, the transaction information may be further subdivided according to the importance level. The functions of biometric feature extraction, device feature extraction, and alarm SMS sending in transactions are regarded as non-core content in transaction information of large-value transactions, so that the corresponding server is determined according to the importance level.

需要说明的是,根据重要等级确定目标服务器,实现了对交易信息的进一步细致分类,从而为后续目标服务器的准确确定提供了基础。It should be noted that determining the target server according to the importance level realizes further detailed classification of transaction information, thereby providing a basis for the subsequent accurate determination of the target server.

在一种可选的实施例中,在根据重要等级确定目标服务器的过程中,在交易信息的重要等级为第一重要等级时,确定目标服务器为边缘服务器,在交易信息的重要等级为第二重要等级时,确定目标服务器为主服务器,其中,第一重要等级低于第二重要等级。In an optional embodiment, in the process of determining the target server according to the importance level, when the importance level of the transaction information is the first importance level, the target server is determined to be the edge server, and when the importance level of the transaction information is the second importance level When the importance level is determined, the target server is determined as the master server, wherein the first importance level is lower than the second importance level.

可选的,将大额交易中的生物特征提取、设备特征提取、报警短信发送等功能作为大额交易的交易信息中的非核心内容,其所对应的重要等级可以是第一重要等级,即对大额交易的交易信息中的非核心内容进行处理的服务器可以是边缘服务器。容易注意到的是,上述边缘服务器可以对小额交易进行交易验证,还可以对大额交易的交易信息中的非核心内容进行处理。另外,大额交易的交易信息中的核心内容所对应的重要等级可以是第二重要等级,即大额交易的交易信息中的核心内容仍然在主服务器中进行处理。Optionally, functions such as biometric feature extraction, device feature extraction, and alarm SMS sending in large-value transactions are regarded as non-core content in the transaction information of large-value transactions, and the corresponding importance level may be the first importance level, that is, The server that processes the non-core content in the transaction information of the large-value transaction may be an edge server. It is easy to notice that the above-mentioned edge server can perform transaction verification for small-value transactions, and can also process non-core content in the transaction information of large-value transactions. In addition, the importance level corresponding to the core content in the transaction information of the large-value transaction may be the second importance level, that is, the core content in the transaction information of the large-value transaction is still processed in the main server.

需要说明的是,根据重要等级确定目标服务器,可以将大额交易中的非核心内容在边缘服务器中进行处理,进一步缓解了主服务器的负载压力,实现了服务器资源的充分利用。It should be noted that by determining the target server according to the importance level, the non-core content in the large-value transaction can be processed in the edge server, which further relieves the load pressure of the main server and realizes the full utilization of server resources.

在一种可选的实施例中,在确定目标服务器为边缘服务器之后,在边缘服务器的负载小于或等于预设负载阈值时,控制边缘服务器对交易信息进行验证,在边缘服务器的负载大于预设负载阈值时,控制边缘服务器转发交易信息至主服务器,以使主服务器对交易信息进行验证。In an optional embodiment, after determining that the target server is an edge server, when the load of the edge server is less than or equal to a preset load threshold, the edge server is controlled to verify the transaction information, and when the load of the edge server is greater than the preset load threshold When the load threshold is reached, the edge server is controlled to forward the transaction information to the main server, so that the main server can verify the transaction information.

可选的,边缘服务器的预设负载阈值可以是边缘服务器待处理任务进程中的任务请求的个数,例如,将100件任务请求作为预设负载阈值,当边缘服务器的负载即待处理的任务请求个数小于或等于100件时,控制边缘服务器对交易信息进行验证;当边缘服务器待处理的任务请求个数大于100件时,可以控制边缘服务器将交易信息转发至主服务器,从而通过主服务器对交易信息进行验证。其中,边缘服务器转发的交易信息所对应的交易类型可以是上述小额交易,也可以是上述大额交易的交易信息中的非核心内容。Optionally, the preset load threshold of the edge server may be the number of task requests in the task process to be processed by the edge server. For example, 100 task requests are used as the preset load threshold, and the load of the edge server is the task to be processed. When the number of requests is less than or equal to 100 pieces, the edge server is controlled to verify the transaction information; when the number of task requests to be processed by the edge server is greater than 100 pieces, the edge server can be controlled to forward the transaction information to the main server, so as to pass the main server Verify transaction information. The transaction type corresponding to the transaction information forwarded by the edge server may be the above-mentioned small-value transaction, or may be non-core content in the transaction information of the above-mentioned large-value transaction.

需要说明的是,在边缘服务器的负载过高时,将交易信息转发至主服务器,实现了主服务器和边缘服务器相互缓解对方的负载压力的效果,进一步提升了反欺诈识别系统整体的识别效率,为用户交易提供了更安全的保障。It should be noted that when the load of the edge server is too high, the transaction information is forwarded to the main server, so that the main server and the edge server can relieve each other's load pressure, and further improve the overall identification efficiency of the anti-fraud identification system. Provides a more secure guarantee for user transactions.

在一种可选的实施例中,交易信息包括如下至少之一:第一交易对象的身份信息、第二交易对象的身份信息、交易终端信息、交易地址信息、网络地址信息、交易次数,其中,在基于至少一个目标服务器对交易信息进行验证,生成目标验证结果的过程中,首先对交易信息进行验证,得到验证结果,再根据验证结果统计验证失败的次数,得到统计次数,在统计次数小于预设次数,并且,报警次数小于预设报警次数时,确定第一交易对象与第二交易对象之间的交易为正常交易,其中,报警次数表征预设时长内,第一交易对象所对应的交易报警次数。In an optional embodiment, the transaction information includes at least one of the following: identity information of the first transaction object, identity information of the second transaction object, transaction terminal information, transaction address information, network address information, and transaction times, wherein , in the process of verifying the transaction information based on at least one target server and generating the target verification result, first verify the transaction information to obtain the verification result, and then count the number of verification failures according to the verification result, and obtain the statistical number, if the statistical number is less than The preset number of times, and when the number of alarms is less than the preset number of alarms, it is determined that the transaction between the first transaction object and the second transaction object is a normal transaction, wherein the number of alarms represents the number of alarms corresponding to the first transaction object within the preset time period. Number of transaction alerts.

可选的,交易对象的身份信息可以是交易对象的账号、人脸识别、指纹识别等生物信息;交易终端信息可以是交易对象进行交易常用的终端设备,例如,手机、电脑等;交易地址信息可以是交易对象发起线下交易时所处的地理位置;网络地址信息可以是交易对象发起线上交易时常用的网络IP地址;交易次数可以指在预设时长内交易对象发起的交易次数即发起交易的频率。Optionally, the identity information of the transaction object may be the transaction object's account number, face recognition, fingerprint recognition and other biological information; the transaction terminal information may be the terminal equipment commonly used by the transaction object for transactions, such as mobile phones, computers, etc.; transaction address information It can be the geographic location where the transaction object initiates the offline transaction; the network address information can be the network IP address commonly used by the transaction object when the transaction object initiates the online transaction; the number of transactions can refer to the number of transactions initiated by the transaction object within the preset time period. The frequency of transactions.

具体的,在本实施例中,将对交易发起方的交易信息进行验证,验证失败的次数即统计次数定义为变量M,将发起方验证失败次数报警的阈值即预设次数定义为变量Mmax,将预设时长内,第一交易对象所对应的交易报警次数定义为变量D,将预设时长内,第一交易对象所对应的交易报警次数的阈值即预设报警次数定义为变量Dmax,上述变量的初始值均为0。Specifically, in this embodiment, the transaction information of the transaction initiator will be verified, the number of verification failures, that is, the counted number of times is defined as the variable M, and the threshold of the initiator's verification failure number of alarms, that is, the preset number of times is defined as the variable Mmax, The number of transaction alarms corresponding to the first transaction object within the preset time period is defined as variable D, and the threshold value of the number of transaction alarms corresponding to the first transaction object within the preset time period, that is, the preset number of alarms is defined as variable Dmax. The initial value of the variable is 0.

可选的,如图4所示,分别对上述信息进行验证,并根据验证结果得到M和D的数值,在M小于Mmax且D小于Dmax时,即验证失败次数和报警次数均小于阈值时,可以将第一交易对象与第二交易对象之间的交易确定为正常交易。Optionally, as shown in Figure 4, the above information is verified respectively, and the values of M and D are obtained according to the verification results. When M is less than Mmax and D is less than Dmax, that is, when the number of verification failures and the number of alarms are both less than the threshold, The transaction between the first transaction object and the second transaction object may be determined as a normal transaction.

需要说明的是,通过对交易信息进行验证,并根据验证失败的统计次数以及报警次数得到验证结果,实现了对交易信息的多方面判断,保证了交易验证结果的准确性及可靠性。It should be noted that, by verifying the transaction information, and obtaining the verification result according to the number of failed verifications and the number of alarms, various judgments on the transaction information are realized, and the accuracy and reliability of the transaction verification results are ensured.

在一种可选的实施例中,在统计次数大于或等于预设次数时,生成报警信息,并对报警次数进行加一操作。可选的,报警信息可以是向交易对象在金融机构注册的手机号发送提示信息,以提示交易对象正在进行的交易可能存在欺诈行为。具体的,当M大于或等于Mmax时,将D的数值加1。In an optional embodiment, when the counted number of times is greater than or equal to a preset number of times, alarm information is generated, and an operation of adding one to the number of alarms is performed. Optionally, the alarm information may be sending prompt information to the mobile phone number registered by the transaction object in the financial institution, so as to remind the transaction object that the transaction being performed by the transaction object may be fraudulent. Specifically, when M is greater than or equal to Mmax, the value of D is increased by 1.

需要说明的是,在统计次数大于或等于预设次数时,生成报警信息,可以及时提醒交易对象关注交易中可能存在的欺诈行为,从而降低了交易对象的损失。It should be noted that, when the counted number of times is greater than or equal to the preset number of times, alarm information is generated, which can timely remind the transaction object to pay attention to the possible fraudulent behavior in the transaction, thereby reducing the loss of the transaction object.

在一种可选的实施例中,在报警次数大于或等于预设报警次数时,对第一交易对象的身份信息进行验证,在第一交易对象的身份信息不满足第一验证条件时,确定第一交易对象与第二交易对象之间的交易为欺诈交易,在第一交易对象的身份信息满足第一验证条件时,对第二交易对象的身份信息进行验证,在第二交易对象的身份信息满足第二验证条件时,确定第一交易对象与第二交易对象之间的交易为正常交易。In an optional embodiment, when the number of alarms is greater than or equal to the preset number of alarms, the identity information of the first transaction object is verified, and when the identity information of the first transaction object does not meet the first verification condition, it is determined that The transaction between the first transaction object and the second transaction object is a fraudulent transaction. When the identity information of the first transaction object satisfies the first verification condition, the identity information of the second transaction object is verified, and the identity information of the second transaction object is verified. When the information satisfies the second verification condition, it is determined that the transaction between the first transaction object and the second transaction object is a normal transaction.

可选的,第一交易对象可以是交易的发起方,第二交易对象可以是交易的接收方;对第一交易对象的身份信息进行验证可以包括输入动态验证码、输入身份证号码等验证手段;第一验证条件可以指对第一交易对象进行输入动态验证码、输入身份证号码等验证手段均验证成功;对第二交易对象的身份信息进行验证可以指将第二对象的账号、终端等信息与边缘服务器存储的黑名单进行匹配;第二验证条件可以指第二交易对象与黑名单匹配失败。Optionally, the first transaction object may be the initiator of the transaction, and the second transaction object may be the receiver of the transaction; verifying the identity information of the first transaction object may include inputting a dynamic verification code, inputting an ID card number and other verification means. ; The first verification condition may refer to the successful verification of the first transaction object by inputting dynamic verification code, inputting ID card number and other verification means; verifying the identity information of the second transaction object may refer to the second object's account number, terminal, etc. The information is matched with the blacklist stored in the edge server; the second verification condition may refer to the failure to match the second transaction object with the blacklist.

具体的,在D大于或等于Dmax时,通过上述验证手段对交易发起方的身份信息进行二次验证,当验证失败时,确定该交易为欺诈交易,当验证成功时,对交易接收方的身份信息进行验证,在将第二对象的账号、终端等信息与边缘服务器存储的黑名单匹配失败时,确定该交易为正常交易。Specifically, when D is greater than or equal to Dmax, the identity information of the transaction initiator is re-verified by the above verification means. When the verification fails, it is determined that the transaction is a fraudulent transaction. When the verification is successful, the identity of the transaction recipient is verified. The information is verified, and the transaction is determined to be a normal transaction when it fails to match the account, terminal and other information of the second object with the blacklist stored in the edge server.

需要说明的是,通过对交易对象的身份信息进行验证,进一步保证了交易双方的财产安全。It should be noted that by verifying the identity information of the transaction object, the property security of both parties to the transaction is further ensured.

在一种可选的实施例中,在对交易信息进行验证,得到验证结果的过程中,对交易终端信息进行验证,得到第一验证结果,在第一验证结果表征交易终端信息与第一交易对象的预设终端信息不一致时,对统计次数进行加一操作。可选的,对交易终端信息进行验证可以是将第一交易对象即交易发起方进行交易时使用的终端设备与其常用的终端设备进行匹配,匹配失败时,将M的数值加1。In an optional embodiment, in the process of verifying the transaction information and obtaining the verification result, verifying the transaction terminal information to obtain a first verification result, where the first verification result represents the transaction terminal information and the first transaction. When the preset terminal information of the object is inconsistent, add one to the counted times. Optionally, the verification of the transaction terminal information may be to match the terminal device used by the first transaction object, that is, the transaction initiator, with the terminal device commonly used in the transaction. When the matching fails, the value of M is increased by 1.

在一种可选的实施例中,在对交易信息进行验证,得到验证结果的过程中,对交易地址信息进行验证,得到第二验证结果,在第二验证结果表征交易地址信息与第一交易对象的预设交易地址信息不一致时,对统计次数进行加一操作。可选的,对交易地址信息进行验证可以是将第一交易对象即交易发起方发起线下交易时所处的地理位置与交易接收方所在地址进行匹配,匹配失败时,将M的数值加1。In an optional embodiment, in the process of verifying the transaction information and obtaining the verification result, verifying the transaction address information to obtain a second verification result, where the second verification result represents the transaction address information and the first transaction. When the preset transaction address information of the object is inconsistent, add one to the counted times. Optionally, the verification of the transaction address information may be to match the geographic location of the first transaction object, that is, the transaction initiator, when the offline transaction is initiated, and the address of the transaction recipient. When the matching fails, add 1 to the value of M. .

在一种可选的实施例中,在对交易信息进行验证,得到验证结果的过程中,对网络地址信息进行验证,得到第三验证结果,在第三验证结果表征网络地址信息与第一交易对象的预设网络地址信息不一致时,对统计次数进行加一操作。可选的,对网络地址信息进行验证可以是将第一交易对象即交易发起方发起线上交易时使用的网络IP地址与其常用的网络IP地址进行匹配,匹配失败时,将M的数值加1。In an optional embodiment, in the process of verifying the transaction information and obtaining the verification result, the network address information is verified to obtain a third verification result, where the third verification result represents the network address information and the first transaction. When the preset network address information of the object is inconsistent, the counted times are incremented by one. Optionally, the verification of the network address information may be to match the network IP address used by the first transaction object, that is, the transaction initiator, when initiating an online transaction with its commonly used network IP address, and when the matching fails, add 1 to the value of M. .

在一种可选的实施例中,在对交易信息进行验证,得到验证结果的过程中,对交易次数进行验证,得到第四验证结果,在第四验证结果表征交易次数与第一交易对象的预设交易次数不一致时,对统计次数进行加一操作。可选的,对交易次数进行验证可以是将第一交易对象即交易发起方在预设时长内发起交易的频率与其历史交易频率进行对比,如果交易频率远大于历史交易频率,将M的数值加1。In an optional embodiment, in the process of verifying the transaction information and obtaining the verification result, the number of transactions is verified to obtain a fourth verification result, where the fourth verification result represents the number of transactions and the relationship between the first transaction object When the preset number of transactions is inconsistent, add one to the number of statistics. Optionally, the number of transactions can be verified by comparing the frequency of transactions initiated by the first transaction object, that is, the transaction initiator, with its historical transaction frequency within a preset time period. If the transaction frequency is much greater than the historical transaction frequency, add the value of M to the value of M. 1.

需要说明的是,在一些其他实施例中,还可以扩展其他反欺诈验证方式,例如,对第一交易对象即交易发起方在预设时长内进行交易的总金额进行验证,如果交易总金额远大于历史的平均交易金额,则将M的数值加1。上述验证过程可以采用串行的方式、也可以采用并行的方式,本实施例中不做限定。It should be noted that, in some other embodiments, other anti-fraud verification methods may also be extended, for example, the total amount of the transaction performed by the first transaction object, that is, the transaction initiator, within a preset period of time is verified. For the historical average transaction amount, add 1 to the value of M. The foregoing verification process may be performed in a serial manner or in a parallel manner, which is not limited in this embodiment.

需要说明的是,在一些其他实施例中,在验证出交易中是否存在欺诈行为之后,还可以进行如图3所示的信息推送流程,将欺诈交易的交易信息以及进行欺诈交易的交易对象的身份信息发送给金融机构或司法部门。It should be noted that, in some other embodiments, after verifying whether there is fraud in the transaction, the information push process shown in FIG. 3 may also be performed, and the transaction information of the fraudulent transaction and the transaction object of the fraudulent transaction Sending identifying information to financial institutions or judicial authorities.

在一种可选的实施例中,在确定第一交易对象与第二交易对象之间的交易为欺诈交易时,向边缘服务器发送欺诈交易的交易信息,并更新边缘服务器中存储的进行欺诈交易的交易对象的身份信息。In an optional embodiment, when it is determined that the transaction between the first transaction object and the second transaction object is a fraudulent transaction, the transaction information of the fraudulent transaction is sent to the edge server, and the fraudulent transaction stored in the edge server is updated. The identity information of the transaction object.

可选的,图5是根据本发明实施例的一种可选的反欺诈数据及名单更新的流程图,如图5所示,在接收到交易双方提交的交易反欺诈验证申请之后,进行如图3所示的验证过程。通过反欺诈边缘云模块对小额交易进行验证,通过反欺诈核心系统模块对大额交易以及反欺诈边缘云模块转发的小额交易进行验证,在判断出交易中存在欺诈行为时,反欺诈边缘云模块通过异步接口向反欺诈核心系统模块发送报警信息,以警示交易双方正在进行的交易是欺诈交易。反欺诈核心系统模块通过批量程序向反欺诈边缘云模块发送欺诈交易的交易信息,并更新反欺诈边缘云模块中存储的进行欺诈交易的交易对象的身份信息即更新欺诈对象黑名单。可选的,反欺诈边缘云模块中存储的欺诈交易的交易信息及欺诈对象黑名单的数据来源,包括但不限于公安部的反欺诈数据、中国人民银行征信数据。需要说明的是,在本实施例中仅以小额交易和大额交易为例,并未对大额交易的核心、非核心内容进行说明,容易注意到的是,大额交易的核心、非核心内容同样适用于上述更新过程,本实施例中不再赘述。Optionally, FIG. 5 is a flowchart of an optional anti-fraud data and list update according to an embodiment of the present invention. As shown in FIG. 5 , after receiving the transaction anti-fraud verification application submitted by both parties of the transaction, the following steps are performed. The verification process shown in Figure 3. The anti-fraud edge cloud module verifies small-value transactions, and the anti-fraud core system module verifies large-value transactions and small-value transactions forwarded by the anti-fraud edge cloud module. When judging that there is fraud in the transaction, the anti-fraud edge The cloud module sends alarm information to the anti-fraud core system module through an asynchronous interface to warn both parties that the ongoing transaction is a fraudulent transaction. The anti-fraud core system module sends the transaction information of the fraudulent transaction to the anti-fraud edge cloud module through a batch program, and updates the identity information of the transaction object of the fraudulent transaction stored in the anti-fraud edge cloud module, that is, updates the fraud object blacklist. Optionally, the transaction information of fraudulent transactions and the data source of the fraud object blacklist stored in the anti-fraud edge cloud module include but are not limited to the anti-fraud data of the Ministry of Public Security and the credit data of the People's Bank of China. It should be noted that, in this embodiment, only small-value transactions and large-value transactions are used as examples, and the core and non-core contents of large-value transactions are not described. The core content is also applicable to the above-mentioned update process, which is not repeated in this embodiment.

需要说明的是,通过更新边缘服务器中存储的进行欺诈交易的交易对象的身份信息和欺诈交易的交易信息,能够进一步为交易对象提供安全保障。It should be noted that, by updating the identity information of the transaction object of the fraudulent transaction and the transaction information of the fraudulent transaction stored in the edge server, the security guarantee for the transaction object can be further provided.

由此可见,通过本发明的技术方案,达到了扩大交易反欺诈覆盖范围的目的,从而实现了降低交易发生的风险,提高交易反欺诈识别速度的技术效果,进而解决了现有技术中只采用主服务器进行反欺诈识别导致的服务器负载压力和并发压力过大的技术问题。It can be seen that, through the technical solution of the present invention, the purpose of expanding the coverage of transaction anti-fraud is achieved, thereby achieving the technical effect of reducing the risk of transaction occurrence and improving the speed of transaction anti-fraud identification, thereby solving the problem of only using The technical problem of excessive server load pressure and concurrency pressure caused by the main server's anti-fraud identification.

实施例2Example 2

根据本发明实施例,提供了一种交易信息的处理装置的实施例,其中,图6是根据本发明实施例的一种可选的交易信息的处理装置的示意图,如图6所示,该装置包括:获取模块601,用于获取待验证的交易信息,其中,交易信息为第一交易对象和第二交易对象之间进行交易的信息,交易信息至少包括交易金额;确定模块602,用于基于交易金额确定对交易信息进行验证的至少一个目标服务器,其中,目标服务器至少包括主服务器和边缘服务器;验证模块603,用于基于至少一个目标服务器对交易信息进行验证,生成目标验证结果,其中,目标验证结果表征第一交易对象与第二交易对象之间的交易是否存在欺诈行为。According to an embodiment of the present invention, an embodiment of an apparatus for processing transaction information is provided, wherein FIG. 6 is a schematic diagram of an optional apparatus for processing transaction information according to an embodiment of the present invention. As shown in FIG. 6 , the The device includes: an acquisition module 601 for acquiring transaction information to be verified, wherein the transaction information is the transaction information between the first transaction object and the second transaction object, and the transaction information at least includes the transaction amount; the determination module 602 is used for At least one target server for verifying transaction information is determined based on the transaction amount, wherein the target server at least includes a main server and an edge server; the verification module 603 is configured to verify the transaction information based on the at least one target server, and generate a target verification result, wherein , and the target verification result indicates whether there is fraud in the transaction between the first transaction object and the second transaction object.

需要说明的是,上述获取模块601、确定模块602以及验证模块603对应于上述实施例中的步骤S101至步骤S103,三个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例1所公开的内容。It should be noted that the acquisition module 601, the determination module 602, and the verification module 603 correspond to steps S101 to S103 in the above embodiment, and the three modules have the same examples and application scenarios as the corresponding steps, but are not limited to the above What is disclosed in Example 1.

可选的,确定模块还包括:第一确定模块,用于根据交易金额确定交易信息所对应的交易类型;第二确定模块,用于在交易类型为第一交易类型时,确定目标服务器为边缘服务器;第三确定模块,用于在交易类型为第二交易类型时,确定交易信息的重要等级,并根据重要等级确定目标服务器,其中,第一交易类型所对应的交易金额小于第二交易类型所对应的交易金额。Optionally, the determining module further includes: a first determining module for determining a transaction type corresponding to the transaction information according to the transaction amount; a second determining module for determining that the target server is an edge when the transaction type is the first transaction type. server; a third determining module, configured to determine the importance level of the transaction information when the transaction type is the second transaction type, and determine the target server according to the importance level, wherein the transaction amount corresponding to the first transaction type is smaller than the second transaction type the corresponding transaction amount.

可选的,交易信息的处理装置还包括:第四确定模块,用于在交易信息的重要等级为第一重要等级时,确定目标服务器为边缘服务器;第五确定模块,用于在交易信息的重要等级为第二重要等级时,确定目标服务器为主服务器,其中,第一重要等级低于第二重要等级。Optionally, the device for processing transaction information further includes: a fourth determination module for determining the target server as an edge server when the importance level of the transaction information is the first importance level; a fifth determination module for determining the target server as an edge server when the transaction information is of the first importance level; When the importance level is the second importance level, the target server is determined as the master server, wherein the first importance level is lower than the second importance level.

可选的,交易信息的处理装置还包括:第一控制模块,用于在边缘服务器的负载小于或等于预设负载阈值时,控制边缘服务器对交易信息进行验证;第二控制模块,用于在边缘服务器的负载大于预设负载阈值时,控制边缘服务器转发交易信息至主服务器,以使主服务器对交易信息进行验证。Optionally, the transaction information processing device further includes: a first control module for controlling the edge server to verify the transaction information when the load of the edge server is less than or equal to a preset load threshold; a second control module for When the load of the edge server is greater than the preset load threshold, the edge server is controlled to forward the transaction information to the main server, so that the main server verifies the transaction information.

可选的,交易信息的处理装置还包括:第一验证模块,用于对交易信息进行验证,得到验证结果;统计模块,用于根据验证结果统计验证失败的次数,得到统计次数;第六确定模块,用于在统计次数小于预设次数,并且,报警次数小于预设报警次数时,确定第一交易对象与第二交易对象之间的交易为正常交易,其中,报警次数表征预设时长内,第一交易对象所对应的交易报警次数。Optionally, the transaction information processing device further includes: a first verification module for verifying the transaction information to obtain a verification result; a statistics module for counting the number of verification failures according to the verification result to obtain the statistical number; a sixth determination The module is used to determine that the transaction between the first transaction object and the second transaction object is a normal transaction when the number of statistics is less than the preset number of times and the number of alarms is less than the preset number of alarms, wherein the number of alarms represents a preset time period. , the number of transaction alarms corresponding to the first transaction object.

可选的,交易信息的处理装置还包括:报警模块,用于在统计次数大于或等于预设次数时,生成报警信息,并对报警次数进行加一操作。Optionally, the apparatus for processing transaction information further includes: an alarm module, configured to generate alarm information when the counted number of times is greater than or equal to a preset number of times, and perform an operation of adding one to the number of alarms.

可选的,交易信息的处理装置还包括:第二验证模块,用于在报警次数大于或等于预设报警次数时,对第一交易对象的身份信息进行验证;第七确定模块,用于在第一交易对象的身份信息不满足第一验证条件时,确定第一交易对象与第二交易对象之间的交易为欺诈交易;第三验证模块,用于在第一交易对象的身份信息满足第一验证条件时,对第二交易对象的身份信息进行验证;第八确定模块,用于在第二交易对象的身份信息满足第二验证条件时,确定第一交易对象与第二交易对象之间的交易为正常交易。Optionally, the transaction information processing device further includes: a second verification module for verifying the identity information of the first transaction object when the number of alarms is greater than or equal to the preset number of alarms; a seventh determination module for verifying the identity information of the first transaction object; When the identity information of the first transaction object does not meet the first verification condition, it is determined that the transaction between the first transaction object and the second transaction object is a fraudulent transaction; In the case of a verification condition, verify the identity information of the second transaction object; the eighth determination module is used for determining the relationship between the first transaction object and the second transaction object when the identity information of the second transaction object satisfies the second verification condition transactions are normal transactions.

可选的,第一验证模块还包括:第四验证模块,用于对交易终端信息进行验证,得到第一验证结果,在第一验证结果表征交易终端信息与第一交易对象的预设终端信息不一致时,对统计次数进行加一操作。Optionally, the first verification module further includes: a fourth verification module, configured to verify the transaction terminal information to obtain a first verification result, where the first verification result represents the transaction terminal information and the preset terminal information of the first transaction object. If they are inconsistent, add one to the count.

可选的,第一验证模块还包括:第五验证模块,用于对交易地址信息进行验证,得到第二验证结果,在第二验证结果表征交易地址信息与第一交易对象的预设交易地址信息不一致时,对统计次数进行加一操作。Optionally, the first verification module further includes: a fifth verification module, configured to verify the transaction address information to obtain a second verification result, where the second verification result represents the transaction address information and the preset transaction address of the first transaction object. When the information is inconsistent, add one to the count.

可选的,第一验证模块还包括:第六验证模块,用于对网络地址信息进行验证,得到第三验证结果,在第三验证结果表征网络地址信息与第一交易对象的预设网络地址信息不一致时,对统计次数进行加一操作。Optionally, the first verification module further includes: a sixth verification module, configured to verify the network address information to obtain a third verification result, where the third verification result represents the network address information and the preset network address of the first transaction object. When the information is inconsistent, add one to the count.

可选的,第一验证模块还包括:第七验证模块,用于对交易次数进行验证,得到第四验证结果,在第四验证结果表征交易次数与第一交易对象的预设交易次数不一致时,对统计次数进行加一操作。Optionally, the first verification module further includes: a seventh verification module, configured to verify the number of transactions to obtain a fourth verification result, when the fourth verification result indicates that the number of transactions is inconsistent with the preset number of transactions for the first transaction object , add one to the count.

可选的,交易信息的处理装置还包括:更新模块,用于在确定第一交易对象与第二交易对象之间的交易为欺诈交易时,向边缘服务器发送欺诈交易的交易信息,并更新边缘服务器中存储的进行欺诈交易的交易对象的身份信息。Optionally, the device for processing transaction information further includes: an update module, configured to send the transaction information of the fraudulent transaction to the edge server when it is determined that the transaction between the first transaction object and the second transaction object is a fraudulent transaction, and update the edge server. The identity information of the transaction object of the fraudulent transaction stored in the server.

实施例3Example 3

根据本发明实施例的另一方面,还提供了一种计算机可读存储介质,计算机可读存储介质中存储有计算机程序,其中,计算机程序被设置为运行时执行上述的交易信息的处理方法。According to another aspect of the embodiments of the present invention, a computer-readable storage medium is also provided, where a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to execute the above-mentioned transaction information processing method when running.

实施例4Example 4

根据本发明实施例的另一方面,还提供了一种电子设备,其中,图7是根据本发明实施例的一种可选的电子设备的示意图,如图7所示,电子设备包括一个或多个处理器;存储器,用于存储一个或多个程序,当一个或多个程序被一个或多个处理器执行时,使得一个或多个处理器实现用于运行程序,其中,程序被设置为运行时执行上述的交易信息的处理方法。According to another aspect of an embodiment of the present invention, an electronic device is also provided, wherein FIG. 7 is a schematic diagram of an optional electronic device according to an embodiment of the present invention. As shown in FIG. 7 , the electronic device includes an or a plurality of processors; a memory for storing one or more programs which, when executed by one or more processors, cause the one or more processors to be implemented for running the program, wherein the program is arranged The above-mentioned processing method of transaction information is executed at runtime.

实施例5Example 5

根据本发明实施例的另一方面,还提供了一种计算机程序产品,包括计算机程序/指令,计算机程序/指令被处理器执行时实现上述的交易信息的处理方法。According to another aspect of the embodiments of the present invention, a computer program product is also provided, including a computer program/instruction, and when the computer program/instruction is executed by a processor, the above-mentioned method for processing transaction information is implemented.

上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The above-mentioned serial numbers of the embodiments of the present invention are only for description, and do not represent the advantages or disadvantages of the embodiments.

在本发明的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above-mentioned embodiments of the present invention, the description of each embodiment has its own emphasis. For parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.

在本申请所提供的几个实施例中,应该理解到,所揭露的技术内容,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,可以为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed technical content may be implemented in other ways. The device embodiments described above are only illustrative. For example, the division of the units may be a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or may be Integration into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of units or modules, and may be in electrical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and components shown as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。The integrated unit, if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention is essentially or the part that contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present invention. The aforementioned storage medium includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk and other media that can store program codes .

以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above are only the preferred embodiments of the present invention. It should be pointed out that for those skilled in the art, without departing from the principles of the present invention, several improvements and modifications can be made. It should be regarded as the protection scope of the present invention.

Claims (16)

1. A method for processing transaction information, comprising:
acquiring transaction information to be verified, wherein the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount;
determining at least one target server for verifying the transaction information based on the transaction amount, wherein the target server at least comprises a main server and an edge server;
and verifying the transaction information based on the at least one target server to generate a target verification result, wherein the target verification result represents whether the transaction between the first transaction object and the second transaction object has fraud behaviors.
2. The method of claim 1, wherein determining at least one target server to validate the transaction information based on the transaction amount comprises:
determining a transaction type corresponding to the transaction information according to the transaction amount;
when the transaction type is a first transaction type, determining that the target server is the edge server;
and when the transaction type is a second transaction type, determining the importance level of the transaction information, and determining the target server according to the importance level, wherein the transaction amount corresponding to the first transaction type is smaller than the transaction amount corresponding to the second transaction type.
3. The method of claim 2, wherein determining the target server according to the importance level comprises:
when the importance level of the transaction information is a first importance level, determining that the target server is the edge server;
and when the importance level of the transaction information is a second importance level, determining that the target server is the main server, wherein the first importance level is lower than the second importance level.
4. The method of claim 2 or 3, wherein after determining that the target server is the edge server, the method further comprises:
when the load of the edge server is smaller than or equal to a preset load threshold value, controlling the edge server to verify the transaction information;
and when the load of the edge server is greater than the preset load threshold value, controlling the edge server to forward the transaction information to the main server so that the main server verifies the transaction information.
5. The method of claim 1, wherein the transaction information includes at least one of: the identity information of the first transaction object, the identity information of the second transaction object, transaction terminal information, transaction address information, network address information and transaction times, wherein the transaction information is verified based on the at least one target server to generate a target verification result, and the method comprises the following steps:
verifying the transaction information to obtain a verification result;
counting the times of verification failure according to the verification result to obtain the counted times;
and when the counting times are less than the preset times and the alarm times are less than the preset alarm times, determining that the transaction between the first transaction object and the second transaction object is a normal transaction, wherein the alarm times represent the transaction alarm times corresponding to the first transaction object within a preset time length.
6. The method of claim 5, further comprising:
and when the counting times are greater than or equal to the preset times, generating alarm information, and adding one to the alarm times.
7. The method of claim 5, further comprising:
when the alarm times are greater than or equal to the preset alarm times, verifying the identity information of the first transaction object;
when the identity information of the first transaction object does not meet a first verification condition, determining that the transaction between the first transaction object and the second transaction object is a fraud transaction;
when the identity information of the first transaction object meets the first verification condition, verifying the identity information of the second transaction object;
and when the identity information of the second transaction object meets a second verification condition, determining that the transaction between the first transaction object and the second transaction object is the normal transaction.
8. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the transaction terminal information to obtain a first verification result, and adding one to the counting times when the first verification result represents that the transaction terminal information is inconsistent with the preset terminal information of the first transaction object.
9. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the transaction address information to obtain a second verification result, and adding one to the counting times when the second verification result represents that the transaction address information is inconsistent with the preset transaction address information of the first transaction object.
10. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the network address information to obtain a third verification result, and adding one to the counting times when the third verification result indicates that the network address information is inconsistent with the preset network address information of the first transaction object.
11. The method of claim 5, wherein verifying the transaction information to obtain a verification result comprises:
and verifying the transaction times to obtain a fourth verification result, and adding one to the statistical times when the fourth verification result indicates that the transaction times are inconsistent with the preset transaction times of the first transaction object.
12. The method of claim 1, further comprising:
and when the transaction between the first transaction object and the second transaction object is determined to be a fraudulent transaction, sending transaction information of the fraudulent transaction to the edge server, and updating the identity information of the transaction object for performing the fraudulent transaction, which is stored in the edge server.
13. An apparatus for processing transaction information, comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring transaction information to be verified, the transaction information is information for performing transaction between a first transaction object and a second transaction object, and the transaction information at least comprises transaction amount;
a determination module, configured to determine at least one target server for verifying the transaction information based on the transaction amount, where the target server includes at least a main server and an edge server;
and the verification module is used for verifying the transaction information based on the at least one target server and generating a target verification result, wherein the target verification result represents whether fraud behaviors exist in the transaction between the first transaction object and the second transaction object.
14. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the method for processing transaction information according to any one of claims 1 to 12 when the computer program is executed.
15. An electronic device, wherein the electronic device comprises one or more processors; memory for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement a method for executing a program, wherein the program is arranged to, when executed, perform a method of processing transaction information as claimed in any of claims 1 to 12.
16. A computer program product comprising computer programs/instructions, characterized in that the computer programs/instructions, when executed by a processor, implement the method of processing transaction information according to any of claims 1 to 12.
CN202210504360.XA 2022-05-10 2022-05-10 Transaction information processing method and device and computer readable storage medium Pending CN114841698A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210504360.XA CN114841698A (en) 2022-05-10 2022-05-10 Transaction information processing method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210504360.XA CN114841698A (en) 2022-05-10 2022-05-10 Transaction information processing method and device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114841698A true CN114841698A (en) 2022-08-02

Family

ID=82569070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210504360.XA Pending CN114841698A (en) 2022-05-10 2022-05-10 Transaction information processing method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114841698A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116402510A (en) * 2023-04-14 2023-07-07 广东车卫士信息科技有限公司 Non-inductive payment method, medium and equipment based on high concurrency network service

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680376A (en) * 2015-03-13 2015-06-03 中国工商银行股份有限公司 Transaction information verification method and device
CN108647972A (en) * 2018-05-10 2018-10-12 中国工商银行股份有限公司 Transaction authentication mode determines method, push server and system
CN109087091A (en) * 2018-06-29 2018-12-25 北京东方英卡数字信息技术有限公司 A kind of account trading security system and method
CN111507787A (en) * 2019-01-30 2020-08-07 深圳富桂精密工业有限公司 Commodity transaction method, commodity transaction system, computer device and readable storage medium
CN111768185A (en) * 2020-09-01 2020-10-13 腾讯科技(深圳)有限公司 Transaction data processing method, related device and storage medium
CN112801665A (en) * 2021-03-19 2021-05-14 北京万物智链科技有限公司 Cross-chain transaction method and system based on server relay
CN113034288A (en) * 2021-04-29 2021-06-25 中国工商银行股份有限公司 Transaction processing method, device and system
CN114170022A (en) * 2021-12-22 2022-03-11 中国建设银行股份有限公司 Method, apparatus, storage medium and product for processing money fund transaction in real time

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104680376A (en) * 2015-03-13 2015-06-03 中国工商银行股份有限公司 Transaction information verification method and device
CN108647972A (en) * 2018-05-10 2018-10-12 中国工商银行股份有限公司 Transaction authentication mode determines method, push server and system
CN109087091A (en) * 2018-06-29 2018-12-25 北京东方英卡数字信息技术有限公司 A kind of account trading security system and method
CN111507787A (en) * 2019-01-30 2020-08-07 深圳富桂精密工业有限公司 Commodity transaction method, commodity transaction system, computer device and readable storage medium
CN111768185A (en) * 2020-09-01 2020-10-13 腾讯科技(深圳)有限公司 Transaction data processing method, related device and storage medium
CN112801665A (en) * 2021-03-19 2021-05-14 北京万物智链科技有限公司 Cross-chain transaction method and system based on server relay
CN113034288A (en) * 2021-04-29 2021-06-25 中国工商银行股份有限公司 Transaction processing method, device and system
CN114170022A (en) * 2021-12-22 2022-03-11 中国建设银行股份有限公司 Method, apparatus, storage medium and product for processing money fund transaction in real time

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116402510A (en) * 2023-04-14 2023-07-07 广东车卫士信息科技有限公司 Non-inductive payment method, medium and equipment based on high concurrency network service
CN116402510B (en) * 2023-04-14 2024-01-30 广东车卫士信息科技有限公司 Non-inductive payment method, medium and equipment based on high concurrency network service

Similar Documents

Publication Publication Date Title
US11470116B2 (en) Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity
US9818121B2 (en) Mobile communications message verification of financial transactions
CN101651675B (en) By the method and system that authentication code is verified client
WO2019127834A1 (en) Transaction event processing method and device, terminal apparatus, and medium
CN110266676B (en) Method and device for preventing malicious attack
CN104980402B (en) Method and device for identifying malicious operation
US20130185191A1 (en) Systems and method for correlating transaction events
EP3547243A1 (en) Methods and apparatuses for fraud handling
CN110874743A (en) Method and device for determining account transaction risk
WO2015188780A1 (en) Method and apparatus for processing account information
WO2023283349A1 (en) Fraud detection and prevention system
CN113191892A (en) Account risk prevention and control method, device, system and medium based on equipment fingerprint
CN114841698A (en) Transaction information processing method and device and computer readable storage medium
CN110795715A (en) Data entry method, device and system and storage medium
TWM663501U (en) Anti-fraud trading system
CN109919767B (en) Transaction risk management method, device and equipment
CN106998315B (en) Method, device and system for registration authentication
US20170098220A1 (en) Method for securing an electronic transaction request from a computing device for fraud detection
CN111681010A (en) A transaction verification method and device
CN111612486A (en) Online electronic coupon deduction method based on tamper-proof encryption algorithm
CN115345615A (en) Request verification method and device, electronic equipment and storage medium
CN113723944A (en) Method and device for setting transfer amount, electronic equipment and computer storage medium
CN106961417A (en) Auth method based on ciphertext
CN105654379B (en) Abnormal account moving processing method and device
TWI718541B (en) Identity verification system and method for financial transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination