CN115731029A - Account data supervision method, device, equipment and storage medium - Google Patents

Account data supervision method, device, equipment and storage medium Download PDF

Info

Publication number
CN115731029A
CN115731029A CN202211555734.7A CN202211555734A CN115731029A CN 115731029 A CN115731029 A CN 115731029A CN 202211555734 A CN202211555734 A CN 202211555734A CN 115731029 A CN115731029 A CN 115731029A
Authority
CN
China
Prior art keywords
account
user
data
target
source account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211555734.7A
Other languages
Chinese (zh)
Inventor
涂贤玲
曾亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202211555734.7A priority Critical patent/CN115731029A/en
Publication of CN115731029A publication Critical patent/CN115731029A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides an account data supervision method, an account data supervision device, account data supervision equipment and a storage medium, wherein the account data supervision method comprises the following steps: under the condition that a transfer instruction associated with a source account is received, a first user corresponding to the source account is obtained, wherein the transfer instruction is used for transferring the account amount of the source account to a target account, and the source account is a credit card account; terminating the response to the tie-back instruction in the event that the first user satisfies at least one of the preset conditions; the preset conditions include: the first user and a second user corresponding to the target account are the same user; the security level corresponding to the first user is lower than a preset level. In the embodiment of the disclosure, when the transfer instruction is received and the first user of the source account corresponding to the transfer instruction meets at least one of the preset conditions, the response to the transfer instruction is terminated, so that the account amount of the source account is prevented from being illegally transferred, and the risk monitoring effect obtained by the credit card is improved.

Description

Account data supervision method, device, equipment and storage medium
Technical Field
The disclosure relates to the technical field of internet of things, and in particular relates to an account data supervision method, device, equipment and storage medium.
Background
At present, a credit card supports two modes Of bank cash withdrawal and Point Of Sale (POS) consumption, wherein the bank cash withdrawal needs to collect certain commission charge, the cash withdrawal amount does not exceed 30% Of the top amount, and meanwhile certain interest needs to be paid; while the consumption of the POS machine only requires the merchant to pay a small charge.
In application, the POS machine consumption tracing difficulty is high, so that part of users can use the POS machine consumption mode to cash credit cards, and the risk monitoring effect of banks on the credit cards is poor.
Disclosure of Invention
The embodiment of the disclosure aims to provide an account data monitoring method, an account data monitoring device, account data monitoring equipment and a storage medium, and solves the technical problem that the credit card risk monitoring effect is poor in the related technology.
The specific technical scheme is as follows:
in a first aspect of the disclosed embodiment, there is provided an account data monitoring method, including:
under the condition that a transfer instruction associated with a source account is received, acquiring a first user corresponding to the source account, wherein the transfer instruction is used for transferring the account amount of the source account to a target account, and the source account is a credit card account;
terminating a response to the transfer instruction in the event that the first user satisfies at least one of preset conditions;
wherein the preset conditions include:
the first user and a second user corresponding to the target account are the same user;
and the safety level corresponding to the first user is lower than a preset level.
In a second aspect of the disclosed embodiments, there is also provided an account data monitoring apparatus, including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first user corresponding to a source account under the condition that a transfer instruction associated with the source account is received, the transfer instruction is used for transferring the account amount of the source account to a target account, and the source account is a credit card account;
a termination module for terminating a response to the transfer instruction if the first user satisfies at least one of preset conditions;
wherein the preset conditions include:
the first user and a second user corresponding to the target account are the same user;
and the safety level corresponding to the first user is lower than a preset level.
In a third aspect of the embodiments of the present disclosure, there is further provided an electronic device, where a computer program is stored in the electronic device, and when the computer program runs on a computer, the computer is caused to execute the account data monitoring method according to any one of the embodiments.
In a fourth aspect of the embodiments of the present disclosure, there is further provided a computer-readable storage medium, in which instructions are stored, and when the computer-readable storage medium runs on a computer, the computer is caused to execute the account data supervision method according to any one of the above embodiments.
In a fifth aspect of the embodiments of the present disclosure, there is also provided a computer program product containing instructions, which when run on a computer, causes the computer to execute the account data supervision method according to any of the above embodiments.
In the embodiment of the disclosure, when the transfer instruction is received and the first user of the source account corresponding to the transfer instruction meets at least one of the preset conditions, the response to the transfer instruction is terminated, so that the account amount of the source account is prevented from being illegally transferred, that is, the account amount of the credit card account is prevented from being illegally transferred, and the risk monitoring effect obtained by the credit card is improved.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a schematic flow chart diagram illustrating an account data monitoring method according to an embodiment of the present disclosure;
FIG. 2 is a schematic structural diagram of an account data monitoring apparatus according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device in an embodiment of the disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be described below with reference to the drawings in the embodiments of the present disclosure.
Referring to fig. 1, fig. 1 is a flowchart of an account data monitoring method according to an embodiment of the present disclosure. As shown in fig. 1, the account data monitoring method according to the embodiment of the present disclosure includes:
s101, under the condition that a transfer instruction associated with a source account is received, a first user corresponding to the source account is obtained.
Wherein the transfer instructions are for transferring an account amount of the source account to a target account, the source account being a credit card account.
The account data supervision method can be applied to a server, the server is in communication connection with a POS machine, when a credit card is inserted into the POS machine and a card swiping action is executed, the POS machine correspondingly generates the transfer instruction, and the transfer instruction is transmitted to the server. The transfer instruction associated with the source account can be a transfer instruction of which the fund transfer-out account is the source account.
For example, the first user corresponding to the source account may be a card-opening user of a credit card indicated by the source account.
S102, under the condition that the first user meets at least one of preset conditions, stopping responding to the transfer instruction.
Wherein the preset conditions include:
the first user and a second user corresponding to the target account are the same user;
and the safety level corresponding to the first user is lower than a preset level.
As described above, after the first user corresponding to the source account is obtained, the rationality of the transfer transaction corresponding to the transfer instruction may be verified through a user identity verification mechanism, and the transfer transaction corresponding to the transfer instruction is terminated under the condition that the first user fails to verify, that is, under the condition that the first user satisfies at least one of the preset conditions, the funds in the credit card are prevented from being illegally transferred out, the use safety of the funds in the credit card is ensured, and the risk monitoring effect obtained by the credit card is improved.
For example, the second user corresponding to the target account may be a user applying for a POS device, or may be a card-opening user of a collection bank card bound to the POS device.
The user may refer to the identification by applying a unique identifier, for example, the user identification number, and at this time, the first user may be the same user as the second user corresponding to the target account, and the first identification number used for indicating the first user is the same as the second identification number used for indicating the second user.
The server sets a corresponding security level for each user, the higher the security level is, the lower the probability of indicating the illegal transaction of the account corresponding to the user is, and similarly, the lower the security level is, the higher the probability of indicating the illegal transaction of the account corresponding to the user is; the initial security levels of different users are the same preset value, and the security level of the user is reduced under the condition that the account corresponding to the user has illegal transaction behaviors.
The illegal transaction behavior includes a credit card cash register behavior, the preset level may be adaptively selected according to the setting of the security level and actual requirements, for example, in the case that the security level includes 1 to 5 levels, the preset level may be set to 3 levels, and the disclosure does not limit specific values of the preset level.
It should be noted that, when the security level corresponding to the first user is lower than the preset level, the first user may raise the security level of the first user by means of complaint or by means of continuously maintaining normal transactions in the supervision period.
In one embodiment, the preset conditions further include:
the first user and a third user are the same user, wherein the third user is an associated user of the second user.
The associated user of the second user may be a user having a relationship with the second user, for example: parents of the second user, tertiary brothers of the second user, etc.; the associated user of the second user may also be a user having a geographical relevance with the second user, where the geographical relevance indicates that a distance between home addresses of the two users is less than or equal to a preset distance, for example: and when the second user is a user A, the household registration address of the user A is an A village B place, the household registration address of a user B in the same village as the user A is an A village C place, and the distance between the A village B place and the A village C place is smaller than a preset distance, the user B can be understood as the associated user of the user A.
As described above, when verifying the identity of the first user, the situation that the user opening the credit card alone performs the cash register of the credit card can be avoided by comparing whether the first user and the second user are the same user, and in this situation, the situation that the user opening the credit card performs the cash register of the credit card with the assistance of the third party user can be avoided by comparing whether the first user and the third user are the same user, which can further improve the risk monitoring effect obtained by the credit card.
In one embodiment, the method further comprises:
and under the condition that the first user does not meet any one of preset conditions, responding to the transfer instruction, and transferring the account amount of the source account to a target account.
As described above, in the case that the first user passes the user identity verification, that is, in the case that the first user does not satisfy any of the preset conditions, the account amount of the source account may be transferred to the target account in response to the transfer instruction, so as to ensure smooth execution of the transfer transaction of the source account.
In one embodiment, the method further comprises:
after the account amount of the source account is transferred to a target account, acquiring N income data and expenditure data of the source account, wherein the N income data correspond to N third users one to one, the third users are associated users of the second users, and N is an integer greater than 1;
calculating the difference between the N income data and the expenditure data respectively to obtain N income and expenditure deviation data;
and adding a first risk mark for the source account and/or adding a second risk mark for the target account when the N pieces of break-in-take data comprise target deviation data, wherein the target deviation data are break-in-take data which are smaller than or equal to a deviation threshold value in the N pieces of break-in-take data.
After the server responds to the transfer instruction and transfers the account amount of the source account to the target account, N income data and expense data of the source account are obtained, and differences between the N income data and the expense data are respectively calculated to obtain N balance deviation data so as to monitor the fund outflow destination of the source account, wherein the N balance deviation data comprise the target deviation data, and can be used for indicating the probability that the expense fund of the source account enters the account of a third user corresponding to the target deviation data, namely indicating the probability that the transfer transaction completed by the source account has illegal cash register behavior.
For example, if a plurality of income data sets are 5000, 6000 and 29500 respectively and the expenditure data is 30000, the income data 5000 corresponds to a deviation of revenue 25000, the income data 6000 corresponds to a deviation of revenue 24000 and the income data 29500 corresponds to a deviation of revenue 500, and when the deviation threshold is 1000, the income data 29500 corresponding to the deviation of revenue 500 may be determined as the target deviation data.
It should be noted that the expenditure data may be a transaction amount that the source account paid out in the latest transfer transaction; the revenue data may be a transaction amount transferred to the account of the corresponding third user during the current monitoring period.
In one embodiment, the obtaining N revenue data includes:
acquiring average income of a target user in a plurality of monitoring periods and target income of the target user in the current monitoring period, wherein the target user is any third user in the N third users;
determining the difference between the target revenue and the average revenue as the revenue data corresponding to the target user when the difference between the target revenue and the average revenue is greater than a fluctuation threshold.
In this embodiment, the income data may be an abnormal transaction amount transferred to an account of a corresponding third user in a current monitoring period, and by comparing a difference between an average income of the target user and a target income in the current monitoring period and taking the difference between the average income of the target user and the target income in the current monitoring period as income data corresponding to the target user when the difference between the average income of the target user and the target income is greater than a fluctuation threshold, risk assessment interference caused by normal income of the target user is avoided, and the calculated income-expense deviation data is more reliable.
For example, if the average revenue of the target user in a plurality of monitoring periods is set to 10000, the target revenue of the target user in the current monitoring period is set to 30000, and the fluctuation threshold is set to 3500, the revenue data corresponding to the target user may be determined to be 20000.
The monitoring period may be adaptively selected according to actual requirements, for example: one month, half month, one week, one day, etc., the present disclosure does not limit the specific duration of the monitoring period.
In one embodiment, the method further comprises:
acquiring the risk marking times of the source account added with the first risk mark in a preset risk monitoring period;
in the event that the risk indicia number is greater than or equal to a number threshold, decreasing the security level of the first user.
In this embodiment, when the risk monitoring process of the credit card is complicated, a risk monitoring period is set, the risk marking times of the source account to which the first risk mark is added are counted in the risk monitoring period, and when the risk marking times are greater than or equal to a time threshold, the first user to which the source account belongs is identified as a user having a risk behavior, and the security level of the first user is correspondingly reduced. Therefore, the risk monitoring process of the credit card is simplified, and the risk monitoring efficiency of the credit card is improved.
The risk monitoring period may be adaptively selected according to actual requirements, for example: 2 years, half years, 3 months, etc., the present disclosure does not limit the specific duration of the risk monitoring period.
In the application, after the first risk mark is added to the source account for the first time, corresponding feedback can be performed on the first user to which the source account belongs in a short message or telephone mode so as to remind the first user to avoid possible risk transaction behaviors in daily transaction behaviors, the probability that the first risk mark is added to the source account again is reduced, and the counted risk mark times are more reliable.
In one embodiment, after adding the first risk indicia to the source account and/or adding the second risk indicia to the target account, the method further comprises:
acquiring transaction verification information corresponding to the expenditure data and target income data, wherein the target income data is income data corresponding to the target deviation data;
removing the first risk indicia of the source account and removing the second risk indicia of the target account if the transaction verification information indicates that the expenditure data-associated transaction and the target revenue data-associated transaction are different.
After target income data is identified and a first risk mark is added to the source account and/or a second risk mark is added to the target account, whether intersection exists between a plurality of accounts related to transaction related to the expenditure data and a plurality of accounts related to transaction related to the target income data is tracked to generate transaction verification information, and if the transaction verification information indicates that intersection does not exist between the plurality of accounts related to transaction related to the expenditure data and the plurality of accounts related to transaction related to the target income data, namely that the transaction related to the expenditure data and the transaction related to the target income data are different, normal use of the source account is guaranteed by removing the first risk mark and the second risk mark.
It should be noted that, in the case that the first risk flag is removed, the number of risk flags corresponding to the source account is also reduced accordingly.
As shown in fig. 2, an embodiment of the present disclosure further provides an account data administration apparatus 200, where the account data administration apparatus 200 includes:
the obtaining module 201 is configured to obtain a first user corresponding to a source account when a transfer instruction associated with the source account is received, where the transfer instruction is used to transfer an account amount of the source account to a target account, and the source account is a credit card account;
a termination module 202 configured to terminate a response to the transfer instruction if the first user satisfies at least one of preset conditions;
wherein the preset conditions include:
the first user and a second user corresponding to the target account are the same user;
and the security level corresponding to the first user is lower than a preset level.
In one embodiment, the account data administration apparatus 200 further includes:
the balance acquisition module is used for acquiring N income data and expenditure data of the source account after the account amount of the source account is transferred to a target account, wherein the N income data correspond to N third users one by one, the third users are associated users of the second users, and N is an integer greater than 1;
the balance calculation module is used for calculating the differences between the N income data and the expenditure data respectively to obtain N income and expenditure deviation data;
and a risk marking module, configured to add a first risk mark to the source account and/or add a second risk mark to the target account when the N pieces of break-in data include target break-out data, where the target break-out data is break-in data smaller than or equal to a break-out threshold value in the N pieces of break-in data.
In one embodiment, the account data administration apparatus 200 further comprises:
the verification information acquisition module is used for acquiring transaction verification information corresponding to the expenditure data and target income data, and the target income data is income data corresponding to the target deviation data;
a risk removal module to remove the first risk indicia of the source account and remove the second risk indicia of the target account if the transaction verification information indicates that the expenditure data-associated transaction and the target revenue data-associated transaction are different.
In an embodiment, the balance acquisition module is specifically configured to:
acquiring average income of a target user in a plurality of monitoring periods and target income of the target user in a current monitoring period, wherein the target user is any one of the N third users;
determining the difference between the target revenue and the average revenue as the revenue data corresponding to the target user when the difference between the target revenue and the average revenue is greater than a fluctuation threshold.
In one embodiment, the account data administration apparatus 200 further includes:
the frequency acquisition module is used for acquiring the frequency of the risk marks added with the first risk marks in a preset risk monitoring period of the source account;
and the grade reducing module is used for reducing the safety grade of the first user under the condition that the risk marking frequency is greater than or equal to a frequency threshold value.
In one embodiment, the account data administration apparatus 200 further includes:
and the instruction response module is used for responding to the transfer instruction and transferring the account amount of the source account to the target account under the condition that the first user does not meet any one of preset conditions.
In one embodiment, the preset conditions further include:
the first user and a third user are the same user, wherein the third user is an associated user of the second user.
In the embodiment of the disclosure, when the transfer instruction is received and the first user of the source account corresponding to the transfer instruction meets at least one of the preset conditions, the response to the transfer instruction is terminated, so that the account amount of the source account is prevented from being illegally transferred, that is, the account amount of the credit card account is prevented from being illegally transferred, and the risk monitoring effect obtained by the credit card is improved.
The embodiment of the present disclosure further provides an electronic device, as shown in fig. 3, including a processor 301, a communication interface 302, a memory 303, and a communication bus 304, where the processor 301, the communication interface 302, and the memory 303 complete communication with each other through the communication bus 304.
The memory 303 is used for storing computer programs;
a processor 301, configured to, when executing the program stored in the memory 303, obtain a first user corresponding to a source account when receiving a transfer instruction associated with the source account, where the transfer instruction is used to transfer an account amount of the source account to a target account, and the source account is a credit card account;
terminating a response to the transfer instruction in the event that the first user satisfies at least one of preset conditions;
wherein the preset conditions include:
the first user and a second user corresponding to the target account are the same user;
and the safety level corresponding to the first user is lower than a preset level. .
The computer program, when executed by the processor 301, is further configured to obtain N revenue data and expense data of the source account after the account amount of the source account is transferred to the target account, where the N revenue data correspond to N third users in a one-to-one correspondence, the third users are associated users of the second user, and N is an integer greater than 1;
calculating the difference between the N income data and the expenditure data respectively to obtain N income and expenditure deviation data;
and adding a first risk mark for the source account and/or adding a second risk mark for the target account when the N pieces of break-in-take data comprise target deviation data, wherein the target deviation data are break-in-take data which are smaller than or equal to a deviation threshold value in the N pieces of break-in-take data.
The computer program, when executed by the processor 301, is further configured to obtain transaction verification information corresponding to the payout data and target revenue data, the target revenue data being revenue data corresponding to the target deviation data;
removing the first risk indicia of the source account and removing the second risk indicia of the target account if the transaction verification information indicates that the expenditure data-associated transaction and the target revenue data-associated transaction are different.
The computer program is further configured to, when executed by the processor 301, obtain a risk flag number of times that the first risk flag is added to the source account in a preset risk monitoring period;
in the event that the risk indicia number is greater than or equal to a number threshold, decreasing the security level of the first user.
The computer program, when executed by the processor 301, is further operable to transfer the account amount of the source account to a target account in response to the transfer instruction if the first user does not satisfy any of the preset conditions.
In the embodiment of the disclosure, under the condition that the transfer instruction is received and the first user of the source account corresponding to the transfer instruction meets at least one of the preset conditions, the response to the transfer instruction is terminated, so that the account amount of the source account is prevented from being illegally transferred, that is, the account amount of the credit card account is prevented from being illegally transferred, and the risk monitoring effect obtained by the credit card is improved.
The communication bus in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industrial Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the terminal and other equipment.
The Memory may include a Random Access Memory (RAM), and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components.
In another embodiment provided by the present disclosure, a computer-readable storage medium is further provided, where instructions are stored in the computer-readable storage medium, and when the instructions are executed on a computer, the computer is caused to execute the account data supervision method according to any one of the above embodiments.
In yet another embodiment provided by the present disclosure, there is also provided a computer program product containing instructions, which when run on a computer, causes the computer to execute the account data supervising method described in any of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the disclosure are wholly or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the system embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for relevant points.
The above description is only for the preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure are included in the scope of protection of the present disclosure.

Claims (10)

1. An account data administration method, comprising:
under the condition that a transfer instruction associated with a source account is received, acquiring a first user corresponding to the source account, wherein the transfer instruction is used for transferring the account amount of the source account to a target account, and the source account is a credit card account;
terminating a response to the transfer instruction in the event that the first user satisfies at least one of preset conditions;
wherein the preset conditions include:
the first user and a second user corresponding to the target account are the same user;
and the safety level corresponding to the first user is lower than a preset level.
2. The method of claim 1, further comprising:
after the account amount of the source account is transferred to a target account, acquiring N income data and expenditure data of the source account, wherein the N income data correspond to N third users one to one, the third users are associated users of the second users, and N is an integer greater than 1;
calculating the difference between the N income data and the expenditure data respectively to obtain N income and expenditure deviation data;
and adding a first risk mark to the source account and/or adding a second risk mark to the target account when the N pieces of break-in data include target break-out data, wherein the target break-out data are break-in data which are smaller than or equal to a break-out threshold value in the N pieces of break-in data.
3. The method of claim 2, wherein after adding a first risk indicia to the source account and/or adding a second risk indicia to the target account, the method further comprises:
acquiring transaction verification information corresponding to the expenditure data and target income data, wherein the target income data is income data corresponding to the target deviation data;
removing the first risk indicia of the source account and removing the second risk indicia of the target account if the transaction verification information indicates that the expense data associated transactions and target revenue data associated transactions are different.
4. The method of claim 2, wherein said obtaining N revenue data comprises:
acquiring average income of a target user in a plurality of monitoring periods and target income of the target user in a current monitoring period, wherein the target user is any one of the N third users;
determining the difference between the target revenue and the average revenue as the revenue data corresponding to the target user when the difference between the target revenue and the average revenue is greater than a fluctuation threshold.
5. The method of claim 2, further comprising:
acquiring the risk marking times of the source account added with the first risk mark in a preset risk monitoring period;
in the event that the risk indicia number is greater than or equal to a number threshold, decreasing the security level of the first user.
6. The method of claim 1, further comprising:
and under the condition that the first user does not meet any one of preset conditions, responding to the transfer instruction, and transferring the account amount of the source account to a target account.
7. The method according to any one of claims 1 to 6, wherein the preset condition further comprises:
the first user and a third user are the same user, wherein the third user is an associated user of the second user.
8. An account data administration apparatus, the apparatus comprising:
the system comprises an acquisition module and a processing module, wherein the acquisition module is used for acquiring a first user corresponding to a source account under the condition that a transfer instruction associated with the source account is received, the transfer instruction is used for transferring the account amount of the source account to a target account, and the source account is a credit card account;
a termination module for terminating a response to the transfer instruction if the first user satisfies at least one of preset conditions;
wherein the preset conditions include:
the first user and a second user corresponding to the target account are the same user;
and the safety level corresponding to the first user is lower than a preset level.
9. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing the communication between the processor and the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the account data governance method of any one of claims 1-7 when executing a program stored on the memory.
10. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, carries out the account data escrow method of any one of claims 1 to 7.
CN202211555734.7A 2022-12-06 2022-12-06 Account data supervision method, device, equipment and storage medium Pending CN115731029A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211555734.7A CN115731029A (en) 2022-12-06 2022-12-06 Account data supervision method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211555734.7A CN115731029A (en) 2022-12-06 2022-12-06 Account data supervision method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115731029A true CN115731029A (en) 2023-03-03

Family

ID=85300305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211555734.7A Pending CN115731029A (en) 2022-12-06 2022-12-06 Account data supervision method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115731029A (en)

Similar Documents

Publication Publication Date Title
US20190114613A1 (en) Mobile phone app loans system
WO2020057300A1 (en) Transaction monitoring method, device, and apparatus
CN106384281A (en) Policy loan processing method and device
CN109509020B (en) Coupon amount checking method and device
CN109615353B (en) Payment method and device
CN107301597A (en) Information processing method and device
KR20190108666A (en) Apparatus and method for automated deposit and withdrawal of funds for cryptocurrency transactions and computer program for the same
WO2015022717A1 (en) Settlement system, server device, terminal device, recording medium, method, and program
WO2015040792A1 (en) Blacklist updating system, terminal device, method, and program recording medium
CN113516479A (en) Method, device and equipment for quick payment and storage medium thereof
CN110689394A (en) Method and device for processing service supplementary notes
CN107679839B (en) Data processing method and system
CN110335133B (en) Transaction data processing method, system, electronic equipment and storage medium
CN115731029A (en) Account data supervision method, device, equipment and storage medium
CN111768293B (en) Transaction information processing method, device, equipment and storage medium
WO2020103573A1 (en) Block chain-based network transaction signature method and device, and terminal equipment
CN209248589U (en) Quick payment device
CN111815307A (en) Asset management method of block chain, electronic device and storage medium
CN111681010A (en) Transaction verification method and device
CN112101691B (en) Dynamic risk level adjustment method, device and server
US10050979B2 (en) Executing a process based on validity information indicating one of validity and invalidity
JP5894631B2 (en) Usage details information management apparatus, usage details information management method, usage details information management system, and program
CN111127217B (en) Policy data processing system, method, device, medium and electronic equipment
WO2015037192A1 (en) Terminal device and server device for validity control
KR20170121013A (en) Method and system for managing total financial information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination