CN114862600A - Method and device for controlling risk of suspicious withdrawal transaction - Google Patents

Method and device for controlling risk of suspicious withdrawal transaction Download PDF

Info

Publication number
CN114862600A
CN114862600A CN202210540403.XA CN202210540403A CN114862600A CN 114862600 A CN114862600 A CN 114862600A CN 202210540403 A CN202210540403 A CN 202210540403A CN 114862600 A CN114862600 A CN 114862600A
Authority
CN
China
Prior art keywords
cash
customer
determining
client
customers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210540403.XA
Other languages
Chinese (zh)
Inventor
朱江波
高鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210540403.XA priority Critical patent/CN114862600A/en
Publication of CN114862600A publication Critical patent/CN114862600A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/288Entity relationship models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a risk control method and a risk control device for suspicious withdrawal transactions, which are suitable for the technical field of finance, and the method comprises the following steps: establishing a customer relationship diagram according to the payment transaction and transfer transaction data; when a client deposits at a bank, acquiring a cash crown word number corresponding to the deposited cash; acquiring the time for inputting the cash crown word number corresponding to the deposited cash into a bank system from the cash data stored in a bank database; selecting a plurality of withdrawal transactions, wherein the withdrawal transactions comprise that a gold crown word number corresponding to deposit cash is consistent with a cash crown word number corresponding to the deposit cash, and the transaction time is longer than the time recorded into a bank system; determining a plurality of customers corresponding to the selected plurality of withdrawal transactions; determining the relevance of the selected multiple clients and the client based on the client relation graph; and modifying the identity authentication threshold of the customer in the withdrawal transaction based on the correlation. The invention can realize risk control of suspicious withdrawal transactions.

Description

Method and device for controlling risk of suspicious withdrawal transaction
Technical Field
The invention relates to the technical field of finance, in particular to a risk control method and device for suspicious withdrawal transactions.
Background
If the information of the bank customer is revealed, such as the card number and the password are stolen by others, the fund is possibly stolen, for example, cash is withdrawn from a cash terminal of the bank, and the loss is caused to the customer. Currently, a risk control method for suspicious withdrawal transactions is lacking.
Disclosure of Invention
The embodiment of the invention provides a risk control method for suspicious withdrawal transactions, which is used for realizing the risk control of the suspicious withdrawal transactions and comprises the following steps:
establishing a customer relationship diagram according to the payment transaction and transfer transaction data;
when a client deposits at a bank, acquiring a cash crown word number corresponding to the deposited cash;
acquiring the time for inputting the cash crown word number corresponding to the deposited cash into a bank system from the cash data stored in a bank database;
selecting a plurality of withdrawal transactions, wherein the withdrawal transactions comprise that a gold crown word number corresponding to deposit cash is consistent with a cash crown word number corresponding to the deposit cash, and the transaction time is longer than the time recorded into a bank system;
determining a plurality of customers corresponding to the selected plurality of withdrawal transactions;
determining the relevance of the selected multiple clients and the client based on the client relation graph;
and modifying the identity authentication threshold of the client in the withdrawal transaction based on the relevance of the selected clients and the client.
The embodiment of the invention provides a risk control device for suspicious withdrawal transactions, which is used for realizing risk control of the suspicious withdrawal transactions and comprises the following components:
the customer relationship graph building module is used for building a customer relationship graph according to the payment transaction and the transfer transaction data;
the system comprises a cash crown word number acquisition module, a bank account number acquisition module and a bank account number acquisition module, wherein the cash crown word number acquisition module is used for acquiring a cash crown word number corresponding to deposit cash when a customer deposits in a bank;
the cash time recording module is used for acquiring the time for recording the cash crown word number corresponding to the deposit cash into the bank system from the cash data stored in the bank database;
the related withdrawal transaction selection module is used for selecting a plurality of withdrawal transactions, wherein the cash crown word number corresponding to the deposit cash is consistent with the cash crown word number corresponding to the deposit cash, and the transaction time is longer than the time recorded into the bank system, from the historical withdrawal transactions stored in the bank database;
a relevant customer determination module for determining a plurality of customers corresponding to the selected plurality of withdrawal transactions;
the client relevance determining module is used for determining the relevance of the selected multiple clients and the clients based on the client relation graph;
and the identity authentication threshold correction module is used for correcting the identity authentication threshold of the client in the withdrawal transaction based on the correlation degree of the selected multiple clients and the client.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can be run on the processor, wherein the processor executes the computer program to realize the risk control method for the suspicious withdrawal transaction.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for risk control of suspicious money withdrawal transactions is implemented.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when executed by a processor, the computer program implements the above risk control method for suspicious money withdrawal transaction.
In the embodiment of the invention, a customer relationship graph is established according to payment transaction and transfer transaction data; when a client deposits at a bank, acquiring a cash crown word number corresponding to the deposited cash; acquiring the time for inputting the cash crown word number corresponding to the deposited cash into a bank system from the cash data stored in a bank database; selecting a plurality of withdrawal transactions, wherein the withdrawal transactions comprise that a gold crown word number corresponding to deposit cash is consistent with a cash crown word number corresponding to the deposit cash, and the transaction time is longer than the time recorded into a bank system; determining a plurality of customers corresponding to the selected plurality of withdrawal transactions; determining the relevance of the selected multiple clients and the client based on the client relation graph; and modifying the identity authentication threshold of the client in the withdrawal transaction based on the relevance of the selected clients and the client. Through the steps, the current identity authentication threshold value of the customer during the withdrawal transaction can be obtained in real time during the deposit, so that the risk of the withdrawal transaction can be better controlled.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
FIG. 1 is a flow chart of a method for risk control of suspicious withdrawal transactions in accordance with an embodiment of the present invention;
FIG. 2 is a flow chart of establishing a customer relationship diagram in an embodiment of the present invention;
FIG. 3 is a flow chart of determining relevancy between customers in an embodiment of the present invention;
FIG. 4 is a flow chart illustrating the modification of a client's authentication threshold for a withdrawal transaction according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating an embodiment of determining a correspondence between an identity authentication threshold and a risk indicator;
FIG. 6 is a flow chart of determining a risk indicator for a customer in an embodiment of the present invention;
FIG. 7 is a first schematic diagram illustrating a risk control device for suspicious withdrawal transactions according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a risk control device for suspicious withdrawal transactions according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
In the description of the present specification, the terms "comprising," "including," "having," "containing," and the like are used in an open-ended fashion, i.e., to mean including, but not limited to. Reference to the description of the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," etc., means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. The sequence of steps involved in the embodiments is for illustrative purposes to illustrate the implementation of the present application, and the sequence of steps is not limited and can be adjusted as needed.
In the technical scheme of the invention, the data acquisition, storage, use, processing and the like all conform to relevant regulations of national laws and regulations.
Fig. 1 is a flow of a risk control method for a suspicious withdrawal transaction according to an embodiment of the present invention, including:
step 101, establishing a customer relationship diagram according to payment transaction and transfer transaction data;
step 102, when a customer deposits in a bank, obtaining a cash crown word number corresponding to the deposited cash;
103, acquiring the time for inputting the cash crown word number corresponding to the deposited cash into a bank system from the cash data stored in the bank database;
104, selecting a plurality of withdrawal transactions, wherein the withdrawal transactions comprise that the crown word number corresponding to the deposit cash is consistent with the cash crown word number corresponding to the deposit cash and the transaction time is longer than the time recorded into a bank system;
step 105, determining a plurality of customers corresponding to the selected plurality of withdrawal transactions;
step 106, determining the relevance of the selected multiple customers and the customer based on the customer relation graph;
and step 107, modifying the identity authentication threshold of the selected customers during the withdrawal transaction based on the correlation degree of the selected customers and the customers.
FIG. 2 is a flow diagram of establishing a customer relationship diagram in an embodiment of the invention, in one embodiment, based on payment transaction and transfer transaction data, including:
step 201, obtaining relevant clients of payment transaction and transfer transaction data;
step 202, determining the correlation degree between the related clients;
step 203, constructing a customer relationship graph, wherein each node of the customer relationship graph corresponds to one customer, an edge exists between two nodes, and only if two customers are related customers, the relevance corresponding to each edge is the relevance between the two customers.
Description of the drawings: the correlation is a real value of 0 or more and 1 or less.
Fig. 3 is a flowchart of determining the relevancy between clients in an embodiment of the present invention, and in an embodiment, determining the relevancy between a plurality of selected clients and the client based on a client relationship graph includes:
step 301, setting a correlation degree distance corresponding to each edge of a customer relationship graph as-lg (r), wherein r is the correlation degree of the edge;
step 302, for each selected customer, determining the shortest distance between the selected customer and the customer in the customer relationship graph;
step 303, determining the minimum value of the plurality of shortest distances as s;
step 304, determining the relevance of the selected multiple clients and the client as10 -s
Fig. 4 is a flowchart illustrating an embodiment of modifying an authentication threshold of a customer during a withdrawal transaction, where in an embodiment, modifying the authentication threshold of the customer during the withdrawal transaction based on a correlation between a plurality of selected customers and the customer includes:
step 401, determining matching degrees of the selected multiple customers and the facial images of the customers, and setting the maximum value of the matching degrees as a first threshold value;
step 402, determining a corresponding relation between an identity authentication threshold and a risk index according to the selected multiple clients and the correlation degree of the clients;
step 403, determining a risk indicator of the client;
step 404, determining a second threshold value according to the corresponding relationship between the risk index of the client and the identity authentication threshold value and risk index;
step 405, modifying the identity authentication threshold of the customer during the withdrawal transaction according to the first threshold and the second threshold.
Description of the drawings: identity authentication includes biometric identification, such as human face features, fingerprint features, and the like.
Fig. 5 is a flowchart illustrating an embodiment of determining a correspondence between an identity authentication threshold and a risk indicator, where in an embodiment of the present invention, determining the correspondence between the identity authentication threshold and the risk indicator according to the selected correlations between the multiple clients and the clients includes:
step 501, obtaining historical transaction data, wherein the historical transaction data comprises transfer transaction data and payment transaction data;
step 502, for each piece of historical transaction data, obtaining a client and a transaction opponent corresponding to the historical transaction data;
step 503, determining the correlation degree of the corresponding customer and the corresponding transaction opponent according to the customer relation graph, and determining the correlation degree as the correlation degree corresponding to the historical transaction data;
step 504, selecting a plurality of historical transaction data from the historical transaction data, wherein the corresponding relevancy of the plurality of selected clients is equal to the relevancy of the clients;
and 505, for each identity authentication threshold, determining a risk indicator corresponding to the identity authentication threshold according to the plurality of historical transaction data.
Fig. 6 is a flowchart of determining a risk indicator of a client in an embodiment of the present invention, where determining a risk indicator of the client includes:
step 601, determining a distance function corresponding to a customer, wherein the distance function is used for determining the distance between any two customers;
step 602, determining a plurality of clients whose distances from the client are smaller than a set threshold as associated clients corresponding to the client;
step 603, determining a risk indicator of the customer according to the transaction data of the customer and the corresponding associated customer.
In an embodiment, the method further comprises:
and storing a cash crown word number corresponding to the deposit cash, a plurality of selected customers corresponding to a plurality of withdrawal transactions and the identity authentication data of the customers during the withdrawal transactions in a block chain.
The block chain has non-tamper property, and the data is stored in the block chain, so that the safety of the data is ensured, and the query is facilitated.
In summary, in the method provided in the embodiment of the present invention, a customer relationship diagram is established according to the payment transaction data and the transfer transaction data; when a client deposits at a bank, acquiring a cash crown word number corresponding to the deposited cash; acquiring the time for inputting the cash crown word number corresponding to the deposited cash into a bank system from the cash data stored in a bank database; selecting a plurality of withdrawal transactions in which the crown word number corresponding to the deposit cash is consistent with the cash crown word number corresponding to the deposit cash and the transaction time is longer than the time recorded into a bank system from the historical withdrawal transactions stored in a bank database; determining a plurality of customers corresponding to the selected plurality of withdrawal transactions; determining the relevance of the selected multiple clients and the client based on the client relation graph; and modifying the identity authentication threshold of the client in the withdrawal transaction based on the relevance of the selected clients and the client. Through the steps, the current identity authentication threshold value of the customer during the withdrawal transaction can be obtained in real time during the deposit, so that the risk of the withdrawal transaction can be better controlled.
The embodiment of the invention also provides a risk control device for the suspicious withdrawal transaction, the principle of which is similar to that of the risk control method for the suspicious withdrawal transaction, and the details are not repeated here.
Fig. 7 is a first schematic diagram of a risk control device for suspicious withdrawal transactions according to an embodiment of the present invention, including:
a customer relationship diagram building module 701, configured to build a customer relationship diagram according to the payment transaction and the transfer transaction data;
a cash crown word number obtaining module 702, configured to obtain a cash crown word number corresponding to a deposit cash when a customer deposits at a bank;
the cash time recording module 703 is configured to obtain, from the cash data stored in the bank database, a time for recording a cash crown word number corresponding to the deposited cash into the bank system;
a related withdrawal transaction selecting module 704, configured to select, from historical withdrawal transactions stored in a bank database, a plurality of withdrawal transactions in which a crown word number corresponding to a deposit cash is consistent with a cash crown word number corresponding to the deposit cash and a transaction time is longer than a time recorded in a bank system;
a relevant customer determination module 705, configured to determine a plurality of customers corresponding to the selected plurality of withdrawal transactions;
a customer relevancy determination module 706, configured to determine relevancy between the selected multiple customers and the customer based on the customer relationship graph;
and an identity authentication threshold modification module 707, configured to modify an identity authentication threshold of the selected customer in the withdrawal transaction based on the correlation between the selected customers and the selected customer.
In an embodiment, the customer relationship graph building module is specifically configured to:
relevant customers who obtain payment transaction and transfer transaction data;
determining a degree of correlation between the related customers;
and constructing a customer relation graph, wherein each node of the customer relation graph corresponds to one customer, an edge exists between two nodes, and only if the two customers are related customers, the relevancy corresponding to each edge is the relevancy between the two customers.
In an embodiment, the customer relevance determining module is specifically configured to:
setting the corresponding correlation degree distance of each edge of the customer relationship graph as-lg (r), wherein r is the correlation degree of the edge;
for each selected customer, determining the shortest distance between the selected customer and the customer in a customer relationship graph;
determining the minimum value of the plurality of shortest distances as s;
determining the relevance of the selected multiple clients and the client as 10 -s
In an embodiment, the identity authentication threshold modification module is specifically configured to:
determining the matching degrees of the plurality of selected customers and the facial images of the customers, and setting the maximum value of the matching degrees as a first threshold value;
determining the corresponding relation between the identity authentication threshold value and the risk index according to the selected multiple clients and the correlation degree of the clients;
determining a risk indicator for the customer;
determining a second threshold value according to the corresponding relation between the risk index of the client and the identity authentication threshold value and the risk index;
and correcting the identity authentication threshold of the customer during the withdrawal transaction according to the first threshold and the second threshold.
In an embodiment, the identity authentication threshold modification module is specifically configured to:
acquiring historical transaction data, wherein the historical transaction data comprises transfer transaction data and payment transaction data;
for each piece of historical transaction data, obtaining a client and a transaction opponent corresponding to the historical transaction data;
determining the correlation degree of the corresponding customer and the corresponding transaction opponent according to the customer relation graph, and determining the correlation degree as the correlation degree corresponding to the historical transaction data;
selecting a plurality of historical transaction data of which the corresponding relevancy is equal to the relevancy of the selected plurality of clients and the client from the historical transaction data;
and for each identity authentication threshold, determining a risk index corresponding to the identity authentication threshold according to the plurality of historical transaction data.
In an embodiment, the identity authentication threshold modification module is specifically configured to:
determining a distance function corresponding to the client, wherein the distance function is used for determining the distance between any two clients;
determining a plurality of clients with the distance to the client smaller than a set threshold value as associated clients corresponding to the clients;
determining a risk indicator for the customer based on the transactional data for the customer and the corresponding associated customer.
Fig. 8 is a schematic diagram of a risk control apparatus for suspicious withdrawal transactions according to an embodiment of the present invention, in an embodiment, the apparatus further includes a block chain storage module 801, configured to:
and storing the cash crown word number corresponding to the deposit cash, a plurality of clients corresponding to a plurality of selected withdrawal transactions and the identity authentication data of the client in the withdrawal transaction in a block chain.
In summary, in the apparatus provided in the embodiment of the present invention, the customer relationship diagram building module is configured to build a customer relationship diagram according to the payment transaction data and the transfer transaction data; the system comprises a cash crown word number acquisition module, a bank account number acquisition module and a bank account number acquisition module, wherein the cash crown word number acquisition module is used for acquiring a cash crown word number corresponding to deposit cash when a customer deposits in a bank; the cash time recording module is used for acquiring the time for recording the cash crown word number corresponding to the deposit cash into the bank system from the cash data stored in the bank database; the related withdrawal transaction selection module is used for selecting a plurality of withdrawal transactions, wherein the cash crown word number corresponding to the deposit cash is consistent with the cash crown word number corresponding to the deposit cash, and the transaction time is longer than the time recorded into the bank system, from the historical withdrawal transactions stored in the bank database; a relevant customer determination module for determining a plurality of customers corresponding to the selected plurality of withdrawal transactions; the client relevance determining module is used for determining the relevance of the selected multiple clients and the clients based on the client relation graph; and the identity authentication threshold correction module is used for correcting the identity authentication threshold of the client in the withdrawal transaction based on the correlation degree of the selected multiple clients and the client. Through the steps, the current identity authentication threshold value of the customer during the withdrawal transaction can be obtained in real time during the deposit, so that the risk of the withdrawal transaction can be better controlled.
The embodiment of the invention also provides computer equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the risk control method for the suspicious money withdrawing transaction when executing the computer program.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for risk control of suspicious money withdrawal transactions is implemented.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when executed by a processor, the computer program implements the above risk control method for suspicious money withdrawal transaction.
As will be appreciated by one of skill in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program service system embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program business systems according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (12)

1. A method for risk control of a suspicious withdrawal transaction, comprising:
establishing a customer relationship diagram according to the payment transaction and transfer transaction data;
when a client deposits at a bank, acquiring a cash crown word number corresponding to the deposited cash;
acquiring the time for inputting the cash crown word number corresponding to the deposited cash into a bank system from the cash data stored in a bank database;
selecting a plurality of withdrawal transactions, wherein the withdrawal transactions comprise that a gold crown word number corresponding to deposit cash is consistent with a cash crown word number corresponding to the deposit cash, and the transaction time is longer than the time recorded into a bank system;
determining a plurality of customers corresponding to the selected plurality of withdrawal transactions;
determining the relevance of the selected multiple customers and the customer based on the customer relation graph;
and modifying the identity authentication threshold of the client in the withdrawal transaction based on the relevance of the selected clients and the client.
2. The method of claim 1, wherein establishing a customer relationship graph based on the payment transaction and transfer transaction data comprises:
relevant customers who obtain payment transaction and transfer transaction data;
determining a degree of correlation between the related customers;
and constructing a customer relationship graph, wherein each node of the customer relationship graph corresponds to one customer, edges exist between the two nodes, and only if the two customers are related customers, the relevance corresponding to each edge is the relevance between the two customers.
3. The method of claim 1, wherein determining the relevance of the selected plurality of customers to the customer based on a customer relationship graph comprises:
setting the corresponding correlation degree distance of each edge of the customer relationship graph as-lg (r), wherein r is the correlation degree of the edge;
for each selected customer, determining the shortest distance between the selected customer and the customer in a customer relationship graph;
determining the minimum value of the plurality of shortest distances as s;
determining the relevance of the selected multiple clients and the client as 10 -s
4. The method of claim 1, wherein modifying the authentication threshold of the customer for the withdrawal transaction based on the relevance of the selected plurality of customers to the customer comprises:
determining the matching degrees of the plurality of selected customers and the facial images of the customers, and setting the maximum value of the matching degrees as a first threshold value;
determining the corresponding relation between the identity authentication threshold value and the risk index according to the selected multiple clients and the correlation degree of the clients;
determining a risk indicator for the customer;
determining a second threshold value according to the corresponding relation between the risk index of the client and the identity authentication threshold value and the risk index;
and correcting the identity authentication threshold of the customer during the withdrawal transaction according to the first threshold and the second threshold.
5. The method of claim 4, wherein determining the correspondence between the authentication threshold and the risk indicator based on the selected plurality of clients and the correlation between the selected plurality of clients and the client comprises:
acquiring historical transaction data, wherein the historical transaction data comprises transfer transaction data and payment transaction data;
for each piece of historical transaction data, obtaining a client and a transaction opponent corresponding to the historical transaction data;
determining the correlation degree of the corresponding customer and the corresponding transaction opponent according to the customer relation graph, and determining the correlation degree as the correlation degree corresponding to the historical transaction data;
selecting a plurality of historical transaction data of which the corresponding relevancy is equal to the relevancy of the selected plurality of clients and the client from the historical transaction data;
and for each identity authentication threshold, determining a risk index corresponding to the identity authentication threshold according to the plurality of historical transaction data.
6. The method of claim 4, wherein determining the risk indicator for the client comprises:
determining a distance function corresponding to the client, wherein the distance function is used for determining the distance between any two clients;
determining a plurality of clients with the distance to the client smaller than a set threshold value as associated clients corresponding to the clients;
determining a risk indicator for the customer based on the transactional data for the customer and the corresponding associated customer.
7. The method of claim 1, further comprising:
and storing a cash crown word number corresponding to the deposit cash, a plurality of selected customers corresponding to a plurality of withdrawal transactions and the identity authentication data of the customers during the withdrawal transactions in a block chain.
8. A risk control device for suspicious withdrawal transactions, comprising:
the customer relationship graph building module is used for building a customer relationship graph according to the payment transaction and the transfer transaction data;
the system comprises a cash crown word number acquisition module, a bank account number acquisition module and a bank account number acquisition module, wherein the cash crown word number acquisition module is used for acquiring a cash crown word number corresponding to deposit cash when a customer deposits in a bank;
the cash time recording module is used for acquiring the time for recording the cash crown word number corresponding to the deposit cash into the bank system from the cash data stored in the bank database;
the related withdrawal transaction selection module is used for selecting a plurality of withdrawal transactions, wherein the cash crown word number corresponding to the deposit cash is consistent with the cash crown word number corresponding to the deposit cash, and the transaction time is longer than the time recorded into the bank system, from the historical withdrawal transactions stored in the bank database;
a relevant customer determination module for determining a plurality of customers corresponding to the selected plurality of withdrawal transactions;
the client relevance determining module is used for determining the relevance of the selected multiple clients and the clients based on the client relation graph;
and the identity authentication threshold correction module is used for correcting the identity authentication threshold of the client in the withdrawal transaction based on the correlation degree of the selected multiple clients and the client.
9. The apparatus of claim 8, further comprising a blockchain storage module to:
and storing a cash crown word number corresponding to the deposit cash, a plurality of selected customers corresponding to a plurality of withdrawal transactions and the identity authentication data of the customers during the withdrawal transactions in a block chain.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 7 when executing the computer program.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 7.
12. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
CN202210540403.XA 2022-05-17 2022-05-17 Method and device for controlling risk of suspicious withdrawal transaction Pending CN114862600A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210540403.XA CN114862600A (en) 2022-05-17 2022-05-17 Method and device for controlling risk of suspicious withdrawal transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210540403.XA CN114862600A (en) 2022-05-17 2022-05-17 Method and device for controlling risk of suspicious withdrawal transaction

Publications (1)

Publication Number Publication Date
CN114862600A true CN114862600A (en) 2022-08-05

Family

ID=82638644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210540403.XA Pending CN114862600A (en) 2022-05-17 2022-05-17 Method and device for controlling risk of suspicious withdrawal transaction

Country Status (1)

Country Link
CN (1) CN114862600A (en)

Similar Documents

Publication Publication Date Title
RU2635275C1 (en) System and method of identifying user's suspicious activity in user's interaction with various banking services
CN112036890B (en) Customer identity authentication method and device
CN107491965A (en) A kind of method for building up and device in biological characteristic storehouse
CN107491674A (en) Feature based information carries out the method and device of user's checking
CN114841820A (en) Transaction risk control method and system
CN114862600A (en) Method and device for controlling risk of suspicious withdrawal transaction
WO2019125618A1 (en) Centralized transaction limit management in payment account system
CN114926279A (en) Terminal payment method and system based on block chain
CN114998033A (en) Risk control method and device for bank independent terminal
CN113837741A (en) Counter business handling method and device based on mobile banking
CN115660682A (en) Risk control method and device for payment transaction
CN115170138A (en) Face recognition method and device for multi-account payment
CN115205015A (en) Client deposit risk control system and method
CN114943530A (en) Transaction processing method and device based on use scene
CN113129019A (en) Risk defense method and device
CN113610537A (en) Request execution method, server, computer device, and storage medium
CN114819664A (en) Method and device for determining bank teller authentication mode
CN114862408A (en) Payment method and system
CN114971908A (en) Cross-bank transaction processing method and device
CN114862551A (en) Bank branch mobile phone number risk control method and device
CN114897625A (en) Risk control method and device in bank online business handling
CN114862402A (en) Bank transaction amount modifying method and device
CN114782192A (en) Risk control method and system for bank account opening
CN117194719A (en) Anti-fraud MAC black-and-white list generation method, device, equipment and medium
CN115171228A (en) Method and system for using bank intelligent terminal across banks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination