CN117273739A - Risk control method, apparatus and storage medium for transfer transaction - Google Patents

Risk control method, apparatus and storage medium for transfer transaction Download PDF

Info

Publication number
CN117273739A
CN117273739A CN202311081175.5A CN202311081175A CN117273739A CN 117273739 A CN117273739 A CN 117273739A CN 202311081175 A CN202311081175 A CN 202311081175A CN 117273739 A CN117273739 A CN 117273739A
Authority
CN
China
Prior art keywords
transfer
risk
transfer transaction
transaction
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311081175.5A
Other languages
Chinese (zh)
Inventor
朱江波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311081175.5A priority Critical patent/CN117273739A/en
Publication of CN117273739A publication Critical patent/CN117273739A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides a risk control method, a risk control device and a storage medium for transfer transaction, which can be used in the field of financial data processing. The risk control method of the transfer transaction comprises the following steps: the target self-service terminal receives a target transfer transaction of a target user; the target self-service terminal acquires risk transfer transaction and non-risk transfer transaction of the target self-service terminal pre-stored by a server; the target self-service terminal determines the related risk transfer transaction and the related non-risk transfer transaction of the target transfer transaction according to the pre-stored risk transfer transaction and the non-risk transfer transaction; the target self-service terminal determines a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction, wherein the risk identifier is used for indicating whether the target transfer transaction involves risk or not, automatic and accurate control of the transfer transaction risk is realized, and risks caused by manual auditing of transaction elements and transaction flows are avoided.

Description

Risk control method, apparatus and storage medium for transfer transaction
Technical Field
The present disclosure relates to the field of financial data processing, and in particular, to a risk control method and apparatus for transfer transaction, and a storage medium.
Background
Transfer transactions are a common business at banks. While convenient to the customer, transfer transactions may involve a variety of risks, such as involving fraud, illegal funds transfer, etc.
In order to determine the funds and information security of customers, banks need to perform risk control on transfer transactions by various methods to minimize the risk of transfer.
Disclosure of Invention
The application provides a risk control method, a risk control device and a storage medium for transfer transaction, which are used for reducing risks existing in the transfer transaction process of a user.
In a first aspect, the present application provides a risk control method for a transfer transaction, comprising: the target self-service terminal receives a target transfer transaction of a target user; the target self-service terminal acquires risk transfer transaction and non-risk transfer transaction of the target self-service terminal pre-stored by a server; the target self-service terminal determines the related risk transfer transaction and the related non-risk transfer transaction of the target transfer transaction according to the pre-stored risk transfer transaction and the non-risk transfer transaction; and the target self-service terminal determines a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction, wherein the risk identifier is used for indicating whether the target transfer transaction involves risk.
In a second aspect, the present application provides another risk control apparatus for a transfer transaction, comprising:
the receiving module is used for receiving the target transfer transaction of the target user by the target self-service terminal;
the acquisition module is used for acquiring risk transfer transaction and non-risk transfer transaction of the target self-service terminal prestored by the server by the target self-service terminal;
the first determining module is used for determining related risk transfer transactions and related non-risk transfer transactions of the target transfer transaction according to the pre-stored risk transfer transactions and the non-risk transfer transactions by the target self-service terminal;
the second determining module is used for determining a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction by the target self-service terminal, wherein the risk identifier is used for indicating whether the target transfer transaction involves risks or not.
In a third aspect, the present application provides an electronic device, comprising: a processor and a memory coupled to the processor; the memory stores computer-executable instructions; the processor executes computer-executable instructions stored in the memory to implement the risk control method as in the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium having stored therein computer-executable instructions that, when executed, are configured to implement a risk control method as in the first aspect.
In a fifth aspect, the present application provides a computer program product comprising a computer program which when executed implements the risk control method as in the first aspect.
The risk control method, the risk control device and the storage medium for the transfer transaction receive the target transfer transaction of the target user through the target self-service terminal; the target self-service terminal acquires risk transfer transaction and non-risk transfer transaction of the target self-service terminal pre-stored by a server; the target self-service terminal determines the related risk transfer transaction and the related non-risk transfer transaction of the target transfer transaction according to the pre-stored risk transfer transaction and the non-risk transfer transaction; the target self-service terminal determines a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction, wherein the risk identifier is used for indicating whether the target transfer transaction involves risk or not, automatic and accurate control of the transfer transaction risk is realized, and risks caused by manual auditing of transaction elements and transaction flows are avoided.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
FIG. 2 is a flow chart of a method for risk control of transfer transactions according to an embodiment of the present application;
FIG. 3 is a flow chart of determining a risk transfer transaction and a non-risk transfer transaction provided by an embodiment of the present application;
FIG. 4 is a flow chart of determining related risk transfer transactions and related non-risk transfer transactions provided by embodiments of the present application;
fig. 5 is a schematic structural diagram of a risk control device for transfer transaction according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, the user information and data related to the present application are all information and data authorized by the user or fully authorized by each party, and the collection, use and processing of related data need to comply with related laws and regulations and standards, and are provided with corresponding operation entries for the user to select authorization or rejection.
It should be noted that the risk control method, apparatus and storage medium for transfer transaction of the present application may be used in the field of voice recognition, and may also be used in any field other than the field of voice recognition, and the application fields of the risk control method, apparatus and storage medium for transfer transaction of the present application are not limited.
Transfer transactions are a common business at banks. While convenient to the customer, transfer transactions may involve a variety of risks, such as involving fraud, illegal funds transfer, etc. In order to determine the funds and information security of customers, banks need to perform risk control on transfer transactions by various methods to minimize the risk of transfer.
Based on achieving the above-mentioned reduction of transfer risk, the present application provides a risk control method for transfer transaction, which accurately determines whether a target transfer transaction is at risk according to a related risk transfer transaction and a related non-risk transfer transaction of the target transfer transaction by a target self-service terminal.
In one embodiment, referring to fig. 1, an application scenario schematic diagram of the present application is provided, as shown in fig. 1, after a user triggers a target transfer transaction at the target self-service terminal 11, the target self-service terminal 11 obtains a pre-stored risk transfer transaction and a non-risk transfer transaction from the server 12 to determine a related risk transfer transaction and a related non-risk transfer transaction of the target transfer transaction, and further determine a risk identifier of the target transfer transaction.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and may not be repeated in some embodiments for the same or similar concepts or processes. Embodiments of the present application will be described below with reference to the accompanying drawings.
The present application provides a risk control method of transfer transaction, as shown in fig. 2, the method comprising the steps of:
s201, the target self-service terminal receives a target transfer transaction of a target user.
In the embodiment of the application, the target user triggers the target transfer transaction through the target self-service terminal. The target transfer transaction is a transfer request including various data such as a user's own account, user authentication data, account of a transfer opponent, transfer amount, and the like.
S202, the target self-service terminal acquires risk transfer transaction and non-risk transfer transaction of the target self-service terminal pre-stored by a server.
After receiving the target transfer transaction, the target self-service terminal acquires the risk transfer transaction and the non-risk transfer transaction of the target self-service terminal from the server. In the embodiment of the application, the risk transfer transaction and the non-risk transfer transaction can be stored in the server in advance for each target self-service terminal.
Wherein, referring to fig. 3, the server determines the risk transfer transaction and the non-risk transfer transaction as follows:
s301, acquiring a plurality of historical transfer transactions of the target self-service terminal.
Wherein the history transfer transaction occurs at the target self-service terminal.
S302, determining that the historical transfer transaction involving risk is a risk transfer transaction in a plurality of historical transfer transactions.
In the embodiment of the application, the history transfer transaction involving risk refers to that the history transfer transaction generates risk in the transaction process, and is marked as involving risk. Wherein the historical transfer transaction noted as involving risk is determined to be a risk transfer transaction.
Illustratively, the plurality of historical transfer transactions includes: historical transfer transaction A1, historical transfer transactions A2, …, historical transfer transaction A6. Wherein the history transfer transaction A1 and the history transfer transaction A5 related to risk are risk transfer transactions
S303, determining a history transfer transaction except the risk transfer transaction as a candidate transfer transaction in a plurality of history transfer transactions.
Illustratively, the historical transfer transactions other than the risk transfer transaction include: historical transfer transactions A2, a historical transfer transaction A3, a historical transfer transaction A4, a historical transfer transaction A6, which are determined as candidate transfer transactions.
S304, determining a first distance between the to-be-selected transfer transaction and each risk transfer transaction according to each to-be-selected transfer transaction.
For example, referring to table 1, a first distance for each candidate transfer transaction and each risk transfer transaction may be calculated. For example, the first distance of the history transfer transaction A2 (alternative transfer transaction) and the history transfer transaction A1 (risk transfer transaction) is B1. The first distance of the history transfer transaction A2 (alternative transfer transaction) and the history transfer transaction A5 (risk transfer transaction) is B2.
TABLE 1
Specifically, for each of the pending transfer transactions, determining a first distance of the pending transfer transaction from each of the risk transfer transactions includes: acquiring a plurality of transfer attributes; determining a second distance between the transfer transaction to be selected and the risk transfer transaction at each transfer attribute for each transfer transaction to be selected; the first distance is determined based on the plurality of second distances.
In the embodiment of the application, transfer attributes are as follows: transfer time, transfer amount, transfer location, transfer risk level, various user attributes of the transfer user (e.g., user gender, user age, etc.), various user attributes being transferred.
For example, referring to table 1, if there are two transfer attributes, a transfer time and a transfer amount, a second distance for each alternate transfer transaction and each risky transfer transaction under a different transfer attribute may be determined. For example, in table 1, the second distance at the transfer time between the history transfer transaction A2 (alternative transfer transaction) and the history transfer transaction A1 (risk transfer transaction) is C1. The second distance between the history transfer transaction A2 (alternative transfer transaction) and the history transfer transaction A1 (risk transfer transaction) at the transfer amount is C2. The first distance B1 is determined using the second distance C1 and the second distance C2.
In this embodiment of the present application, the first distance may be an average value of the plurality of second distances, or may be determined according to the plurality of second distances according to other calculation manners, which is not limited herein.
S305, if the first distances of the to-be-selected transfer transaction are all greater than the distance threshold, determining that the to-be-selected transfer transaction is a non-risk transfer transaction.
The method comprises the steps that a distance threshold is preset, and when the first distance between the to-be-selected transfer transaction and each risk transfer transaction is larger than the distance threshold, the to-be-selected transfer transaction is taken as a non-risk transfer transaction of the target self-service terminal.
Wherein, in an embodiment, still include: taking historical transfer transactions of the target self-service terminal, which relate to risks, as risk transfer transactions of the target self-service terminal; further, a plurality of transfer risk rules are acquired, wherein the transfer risk rules are used for determining the size relation of risks of two transfer transactions; each transfer risk rule corresponds to two variables, the value of each variable is a transfer transaction, and the transfer risk rule comprises the magnitude relation of the values of the two variables in each transfer transaction attribute and the magnitude relation of the risks of the two variables;
for each historical transfer transaction that does not involve risk, adding the historical transfer transaction to the risk transfer transaction of the target self-service terminal when it is determined that there is risk that the risk transfer transaction meets the risk of the risk transfer transaction less than the risk of the historical transfer transaction according to the plurality of transfer risk rules.
Further, in an embodiment, determining a non-risk transfer transaction of the target self-service terminal according to a first distance between each candidate transfer transaction and each risk transfer transaction, including: for each selected transfer transaction, determining a risk indicator of the transfer type to which the selected transfer transaction belongs and a minimum value of a first distance between the selected transfer transaction and each risk transfer transaction; in embodiments of the present application, the transfer transactions may be categorized in a number of ways, such as user category of the transfer user, transfer time, category of the transfer opponent, and so on. And then when the risk index of the transfer type to which the to-be-selected transfer transaction belongs is smaller than a risk threshold value and the minimum first distance is larger than a set distance threshold value, taking the to-be-selected transfer transaction as a non-risk transfer transaction of the target self-service terminal.
Further, in one embodiment, the risk indicator for each reconciliation type is determined as follows:
taking the number of historical transfer transactions contained in the transfer type as the total transfer amount; determining the risk transfer quantity of each risk type according to the historical transfer transactions contained in the transfer type, wherein the risk transfer transactions are the quantities of the historical transfer transactions related to the risk categories; according to the risk transfer quantity and the total transfer quantity of each risk type, determining the risk index of the transfer type as follows:
wherein G is a risk indicator of the transfer type, q is the total transfer amount, p i And p j The number of risk transfers for the ith and jth risk types, respectively.
S203, the target self-service terminal determines the related risk transfer transaction and the related non-risk transfer transaction of the target transfer transaction according to the pre-stored risk transfer transaction and the non-risk transfer transaction.
Specifically, referring to fig. 4, the target self-service terminal determines a related risky transfer transaction and a related non-risky transfer transaction of the target transfer transaction according to pre-stored risky transfer transactions and non-risky transfer transactions, comprising the steps of:
s401, acquiring a plurality of discrete transfer attributes and continuous transfer attributes.
Wherein the attribute value of the discrete transfer attribute is discrete and the attribute value of the continuous transfer attribute is continuous.
S402, determining a first attribute value of each discrete transfer attribute corresponding to the target transfer transaction, and determining a second attribute value of each continuous transfer attribute corresponding to the target transfer transaction.
S403, determining a third attribute value of the risk transfer transaction corresponding to each discrete transfer attribute, and determining a fourth attribute value of the risk transfer transaction corresponding to each continuous transfer attribute;
s404, determining a fifth attribute value of the non-risk transfer transaction corresponding to each discrete transfer attribute, and determining a sixth attribute value of the non-risk transfer transaction corresponding to each continuous transfer attribute;
s405, determining a risk transfer transaction to be selected for the target transfer transaction according to the first attribute value and the third attribute value;
s406, determining a non-risk transfer transaction to be selected for the target transfer transaction according to the first attribute value and the fifth attribute value;
s407, determining the similar entropy of the target transfer transaction and the first transfer accounts of each candidate risk transfer transaction according to the second attribute value and the fourth attribute value.
S408, determining the second transfer similar entropy of the target transfer transaction and each candidate non-risk transfer transaction according to the second attribute value and the sixth attribute value.
S409, determining that the candidate risk transfer transaction with the first transfer similarity entropy with the target transfer transaction being greater than the first similarity threshold is a related risk transfer transaction.
S410, determining that the candidate non-risk transfer transaction with the second transfer similarity entropy of the target transfer transaction being greater than the second similarity threshold is a related non-risk transfer transaction.
Wherein transfer similarity entropy is used to characterize the amount of information of the similarity of two transfer transactions. Wherein the first similarity threshold and the second similarity threshold are empirical values.
In an embodiment of the present application, the transfer similarity entropy of two transfer transactions is determined according to attribute values of the two transfer transactions corresponding to respective consecutive transfer attributes by:
determining, for each successive transfer attribute, two values of the successive transfer attribute for the two transfer transactions;
determining transfer similar entropy of the two transfer transactions in the continuous transfer attribute according to the two values of the two transfer transactions in the continuous transfer attribute;
and determining the transfer similar entropy of the two transfer transactions according to the transfer similar entropy of the two transfer transactions in the continuous transfer attribute.
Further, determining a transfer similarity entropy of the two transfer transactions in the continuous transfer attribute based on the two values of the two transfer transactions in the continuous transfer attribute, comprising:
determining a minimum value and a maximum value of the two values;
determining if the maximum value m is greater than 2 times the minimum value n;
if yes, determining transfer similar entropy of two transfer transactions in the continuous transfer attribute as follows:
if not, determining the transfer similarity entropy of the two transfer transactions in the continuous transfer attribute as follows:
wherein P represents the similar entropy of transfer, and the similar entropy of transfer of the risk transfer transaction to be selected and the target transfer transaction can be obtained through the calculation mode of the similar entropy of transfer
S204, the target self-service terminal determines the risk identification of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction.
Wherein the risk identification is used to indicate whether the target transfer transaction involves risk.
Specifically, the target self-service terminal determines a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction, including: taking a relevant risk transfer transaction of the target transfer transaction as a positive sample, taking a relevant non-risk transfer transaction of the target transfer transaction as a negative sample, training a prediction model, and obtaining a risk prediction model of the target transfer transaction, wherein the input of the risk prediction model is the transfer transaction, and outputting an identification representing whether the risk is involved; and inputting the target transfer transaction into a risk prediction model, and determining the identification output by the risk prediction model as the risk identification of the target transfer transaction.
Specifically, the relevant risk transfer transaction is a positive sample, the relevant non-risk transfer transaction is a negative sample, the first label is a label of the positive sample, the second label is a label of the negative sample, and a risk prediction model is obtained through training, wherein the risk prediction model can predict whether the target transfer transaction has risks.
Further, risk control is not performed on the target transfer transaction when the risk identification of the target transfer transaction characterizes that the target transfer transaction does not involve risk. And when the risk identifier is a first identifier, namely the risk is related to the target transfer transaction, performing risk control on the target transfer transaction.
According to the embodiment of the application, the target self-service terminal receives the target transfer transaction of the target user; the target self-service terminal acquires risk transfer transaction and non-risk transfer transaction of the target self-service terminal pre-stored by a server; the target self-service terminal determines the related risk transfer transaction and the related non-risk transfer transaction of the target transfer transaction according to the pre-stored risk transfer transaction and the non-risk transfer transaction; the target self-service terminal determines a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction, wherein the risk identifier is used for indicating whether the target transfer transaction involves risk or not, and automatic and accurate control of the transfer transaction risk is achieved.
The embodiment of the application also provides a risk control device for transfer transaction, as shown in fig. 5, the risk control device for transfer transaction includes:
a receiving module 51, configured to receive a target transfer transaction of a target user by the target self-service terminal;
the acquiring module 52 is configured to acquire a risk transfer transaction and a non-risk transfer transaction of the target self-service terminal pre-stored by the server;
a first determining module 53, configured to determine, by the target self-service terminal, a related risk transfer transaction and a related non-risk transfer transaction of the target transfer transaction according to pre-stored risk transfer transactions and non-risk transfer transactions;
the second determining module 54 is configured to determine, by the target self-service terminal, a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction, where the risk identifier is used to indicate whether the target transfer transaction involves risk.
Optionally, the server is configured to determine the risk transfer transaction and the non-risk transfer transaction as follows: acquiring a plurality of historical transfer transactions of a target self-service terminal; determining, among a plurality of history transfer transactions, that a history transfer transaction involving risk is a risk transfer transaction; among the plurality of historical transfer transactions, determining a historical transfer transaction other than the risk transfer transaction as a candidate transfer transaction; determining a first distance between the selected transfer transaction and each risk transfer transaction for each of the selected transfer transactions; and if the first distances of the to-be-selected transfer transaction are all greater than the distance threshold, determining that the to-be-selected transfer transaction is a non-risk transfer transaction.
Optionally, the server is specifically configured to, when determining, for each of the candidate transfer transactions, a first distance between the candidate transfer transaction and each of the risk transfer transactions: acquiring a plurality of transfer attributes; determining a second distance between the transfer transaction to be selected and the risk transfer transaction at each transfer attribute for each transfer transaction to be selected; the first distance is determined based on the plurality of second distances.
Optionally, the first determining module 53 is specifically configured to:
acquiring a plurality of discrete transfer attributes and continuous transfer attributes, wherein the attribute values of the discrete transfer attributes are discrete, and the attribute values of the continuous transfer attributes are continuous;
determining a first attribute value of the target transfer transaction corresponding to each discrete transfer attribute and determining a second attribute value of the target transfer transaction corresponding to each continuous transfer attribute;
determining a third attribute value of the risk transfer transaction corresponding to each discrete transfer attribute, and determining a fourth attribute value of the risk transfer transaction corresponding to each continuous transfer attribute;
determining a fifth attribute value of the non-risk transfer transaction corresponding to each discrete transfer attribute, and determining a sixth attribute value of the non-risk transfer transaction corresponding to each continuous transfer attribute;
determining a risk transfer transaction to be selected for the target transfer transaction according to the first attribute value and the third attribute value;
determining a non-risk transfer transaction to be selected for the target transfer transaction according to the first attribute value and the fifth attribute value;
determining a first transfer similar entropy of the target transfer transaction and each risk transfer transaction to be selected according to the second attribute value and the fourth attribute value;
determining a second transfer similar entropy of the target transfer transaction and each of the candidate non-risk transfer transactions according to the second attribute value and the sixth attribute value;
determining that the candidate risk transfer transaction with the first transfer similarity entropy with the target transfer transaction being greater than the first similarity threshold is a related risk transfer transaction;
and determining that the candidate non-risk transfer transaction with the second transfer similarity entropy of the target transfer transaction being greater than the second similarity threshold is a related non-risk transfer transaction, wherein the transfer similarity entropy is used to characterize the amount of information of the similarity of the two transfer transactions.
Optionally, the first determining module 53 is further configured to determine transfer similarity entropy of two transfer transactions according to attribute values of respective consecutive transfer attributes of the two transfer transactions by:
determining, for each successive transfer attribute, two values of the successive transfer attribute for the two transfer transactions;
determining transfer similar entropy of the two transfer transactions in the continuous transfer attribute according to the two values of the two transfer transactions in the continuous transfer attribute;
and determining the transfer similar entropy of the two transfer transactions according to the transfer similar entropy of the two transfer transactions in the continuous transfer attribute.
Optionally, the first determining module 53 is specifically configured to, when determining, according to two values of the two transfer transactions in the continuous transfer attribute, a transfer similarity entropy of the two transfer transactions in the continuous transfer attribute:
determining a minimum value and a maximum value of the two values;
determining if the maximum value m is greater than 2 times the minimum value n;
if yes, determining transfer similar entropy of two transfer transactions in the continuous transfer attribute as follows:
if not, determining the transfer similarity entropy of the two transfer transactions in the continuous transfer attribute as follows:
optionally, the second determining module 54 is specifically configured to:
taking a relevant risk transfer transaction of the target transfer transaction as a positive sample, taking a relevant non-risk transfer transaction of the target transfer transaction as a negative sample, training a prediction model, and obtaining a risk prediction model of the target transfer transaction, wherein the input of the risk prediction model is the transfer transaction, and outputting an identification representing whether the risk is involved;
and inputting the target transfer transaction into a risk prediction model, and determining the identification output by the risk prediction model as the risk identification of the target transfer transaction.
The risk control device for transfer transaction provided in this embodiment has its implementation principle and technical effects referring to the foregoing method embodiments, and will not be described herein.
The embodiment of the application also provides electronic equipment. Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application, where the electronic device may be a mobile phone, a computer, a tablet device, a personal digital assistant, or the like.
Electronic device 60 may include one or more of the following components: a processing component 602, a memory 604, a power component 606, a multimedia component 608, an audio component 610, an input/output interface 612, a sensor component 614, and a communication component 616. The input/output interface 612 may also be referred to as an I/O interface 612.
The processing component 602 generally controls overall operation of the electronic device 60, such as operations associated with display, audio entry, speech recognition, voiceprint recognition, and the like. The processing component 602 may include one or more processors 620 to execute instructions to perform all or part of the steps of the risk control method described above. Further, the processing component 602 can include one or more modules that facilitate interaction between the processing component 602 and other components. For example, the processing component 602 may include a multimedia module to facilitate interaction between the multimedia component 608 and the processing component 602.
The memory 604 is configured to store various types of data to support operations at the electronic device 60. Examples of such data include instructions for any application or method operating on electronic device 60, text data, audio data, voiceprint features of a user, and the like. The Memory 604 may be implemented by any type or combination of volatile or non-volatile Memory devices, such as StAtic RAndom-Access Memory (SRAM), electrically erasable programmable ReAd-Only Memory (ElectricAlly ErAsAble ProgrAmmAble ReAd-Only Memory (EEPROM), erasable programmable ReAd-Only Memory (ErAsAble ProgrAmmAble ReAd Only Memory EPROM), programmable ReAd-Only Memory (ProgrAmmAble ReAd Only Memory, PROM), reAd-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk.
The power supply component 606 provides power to the various components of the electronic device 60. The power supply components 606 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 60.
The multimedia component 608 includes a screen between the electronic device 60 and the user that provides an output interface. In some embodiments, the screen may include a liquid crystal display (Liquid CrystAl DisplAy, LCD for short) and a Touch panel (Touch PAd, TP for short). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 608 includes a front camera and/or a rear camera. When the electronic device 60 is in an operational mode, such as a shooting mode or a video mode, the front-facing camera and/or the rear-facing camera may receive external multimedia data. Each front and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities so that the user may be face-identified by the front and/or rear cameras to verify the user's identity.
The audio component 610 is configured to output and/or input audio signals. For example, the audio component 610 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 60 is in an operational mode, such as a speech recognition mode. The received audio signals may be further stored in the memory 604 or transmitted via the communication component 616. In some embodiments, audio component 610 further includes a speaker for outputting audio signals.
The I/O interface 612 provides an interface between the processing component 602 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 614 includes one or more sensors for providing status assessment of various aspects of the electronic device 60. For example, the sensor assembly 614 may detect an on/off state of the electronic device 60, a relative positioning of the components, such as a display and keypad of the electronic device 60, the sensor assembly 614 may also detect a change in position of the electronic device 60 or a component of the electronic device 60, the presence or absence of a user's contact with the electronic device 60, an orientation or acceleration/deceleration of the electronic device 60, and a change in temperature of the electronic device 60. The sensor assembly 614 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 614 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 616 is configured to facilitate communication between the electronic device 60 and other devices, either wired or wireless. The electronic device 60 may access a wireless network based on a communication standard, such as WiFi,4G, or 5G, or a combination thereof. In one exemplary embodiment, the communication component 616 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 616 further includes a near field communication (NeAr Field CommunicAtion, NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on radio frequency identification (RAdio Frequency IdentificAtion, abbreviated as RFID) technology, infrared data association (InfrAred DAtA AssociAtion, abbreviated as IrDA) technology, ultrA Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 60 may be implemented by one or more application specific integrated circuits (ApplicAtion Specific IntegrAted Circuit, abbreviated as ASIC), digital signal processor (DigitAl SignAl Processor, abbreviated as DSP), digital signal processing device (DigitAl SignAl Processor Device, abbreviated as DSPD), programmable logic device (progrAmmAble logic device, abbreviated as PLD), field programmable gate array (Field progrAmmAble gAte ArrAy, abbreviated as FPGA), controller, microcontroller, microprocessor, or other electronic element for performing the methods described above.
In an exemplary embodiment, a non-transitory computer-readable storage medium is also provided, such as memory 604, including instructions executable by processor 620 of electronic device 60 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random access Memory (RAndom Access Memory, RAM for short), compact disk read-Only Memory (CompAct Disc ReAd-Only Memory, CD-ROM for short), magnetic tape, floppy disk, optical data storage device, etc.
A non-transitory computer readable storage medium, which when executed by a processor of the electronic device 60, causes the electronic device 60 to perform the risk control method of transfer transactions described above.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores computer execution instructions, and the computer execution instructions are used for realizing the technical scheme of the risk control method of the transfer transaction provided in the embodiment of the method when being executed.
The embodiment of the application also provides a computer program product, which comprises a computer program, wherein the computer program is used for realizing the technical scheme of the risk control method of the transfer transaction provided in the embodiment of the method when being executed.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A risk control method for a transfer transaction, comprising:
the target self-service terminal receives a target transfer transaction of a target user;
the target self-service terminal acquires risk transfer transaction and non-risk transfer transaction of the target self-service terminal pre-stored by a server;
the target self-service terminal determines related risk transfer transactions and related non-risk transfer transactions of the target transfer transactions according to pre-stored risk transfer transactions and non-risk transfer transactions;
and the target self-service terminal determines a risk identifier of the target transfer transaction according to the related risk transfer transaction and the related non-risk transfer transaction, wherein the risk identifier is used for indicating whether the target transfer transaction involves risk.
2. The risk control method of claim 1, wherein the server determines the risk transfer transaction and the non-risk transfer transaction as follows:
acquiring a plurality of historical transfer transactions of a target self-service terminal;
determining, among the plurality of history transfer transactions, a history transfer transaction involving risk as the risk transfer transaction;
among the plurality of history transfer transactions, determining a history transfer transaction other than the risk transfer transaction as a candidate transfer transaction;
determining, for each candidate transfer transaction, a first distance of the candidate transfer transaction from each risk transfer transaction;
and if the first distances of the to-be-selected transfer transaction are all greater than a distance threshold, determining that the to-be-selected transfer transaction is the non-risk transfer transaction.
3. The risk control method of claim 2, wherein determining a first distance of the candidate transfer transaction from each risk transfer transaction for each candidate transfer transaction comprises:
acquiring a plurality of transfer attributes;
determining a second distance between the transfer transaction to be selected and the risk transfer transaction at each transfer attribute for each transfer transaction to be selected;
the first distance is determined from a plurality of second distances.
4. The risk control method of claim 1, wherein the target self-service terminal determines related risk transfer transactions and related non-risk transfer transactions of the target transfer transaction from pre-stored risk transfer transactions and non-risk transfer transactions, comprising:
acquiring a plurality of discrete transfer attributes and continuous transfer attributes, wherein attribute values of the discrete transfer attributes are discrete, and attribute values of the continuous transfer attributes are continuous;
determining a first attribute value of the target transfer transaction corresponding to each discrete transfer attribute and determining a second attribute value of the target transfer transaction corresponding to each continuous transfer attribute;
determining a third attribute value of the risk transfer transaction corresponding to each discrete transfer attribute, and determining a fourth attribute value of the risk transfer transaction corresponding to each continuous transfer attribute;
determining a fifth attribute value of the non-risk transfer transaction corresponding to each discrete transfer attribute, and determining a sixth attribute value of the non-risk transfer transaction corresponding to each successive transfer attribute;
determining a risk transfer transaction to be selected for the target transfer transaction according to the first attribute value and the third attribute value;
determining a non-risk transfer transaction to be selected for the target transfer transaction according to the first attribute value and the fifth attribute value;
determining a first transfer similar entropy of the target transfer transaction and each of the candidate risk transfer transactions according to the second attribute value and the fourth attribute value;
determining a second transfer similar entropy of the target transfer transaction and each of the candidate non-risk transfer transactions according to the second attribute value and the sixth attribute value;
determining that a candidate risk transfer transaction having a similar entropy to the first transfer transaction greater than a first similar threshold is the relevant risk transfer transaction;
and determining that the non-risk transfer transaction to be selected, which is greater than a second similarity threshold with the second transfer similarity entropy of the target transfer transaction, is the related non-risk transfer transaction, wherein the transfer similarity entropy is used for representing the information quantity of the similarity of the two transfer transactions.
5. The risk control method of claim 4, further comprising: determining transfer similarity entropy of two transfer transactions according to attribute values of the two transfer transactions corresponding to each continuous transfer attribute by:
determining, for each successive transfer attribute, two values of the two transfer transactions at the successive transfer attribute;
determining transfer similar entropy of the two transfer transactions in the continuous transfer attribute according to the two values of the two transfer transactions in the continuous transfer attribute;
and determining the transfer similar entropy of the two transfer transactions according to the transfer similar entropy of the two transfer transactions in the continuous transfer attribute.
6. The risk control method of claim 5, wherein determining a transfer similarity entropy of the two transfer transactions at the continuous transfer attribute based on the two values of the two transfer transactions at the continuous transfer attribute comprises:
determining a minimum value and a maximum value of the two values;
determining if the maximum value m is greater than 2 times the minimum value n;
if yes, determining that the transfer similarity entropy of the two transfer transactions in the continuous transfer attribute is:
if not, determining that the transfer similarity entropy of the two transfer transactions in the continuous transfer attribute is:
7. the risk control method of claim 1, wherein the target self-service terminal determines a risk identification of the target transfer transaction from the related risk transfer transaction and the related non-risk transfer transaction, comprising:
taking a relevant risk transfer transaction of the target transfer transaction as a positive sample, taking a relevant non-risk transfer transaction of the target transfer transaction as a negative sample, training a prediction model, and obtaining a risk prediction model of the target transfer transaction, wherein the input of the risk prediction model is the transfer transaction, and outputting an identification representing whether the risk is involved;
and inputting the target transfer transaction into the risk prediction model, and determining the identification output by the risk prediction model as the risk identification of the target transfer transaction.
8. The risk control method according to any one of claims 1 to 7, characterized by further comprising:
when the risk identification of the target transfer transaction characterizes that the target transfer transaction does not involve risk, risk control is not performed on the target transfer transaction.
9. An electronic device, comprising: a processor, and a memory coupled to the processor; the memory stores computer-executable instructions; the processor executes computer-executable instructions stored in the memory to implement the risk control method of any one of claims 1 to 8.
10. A computer readable storage medium having stored therein computer executable instructions which when executed are adapted to carry out the risk control method of a transfer transaction as claimed in any one of claims 1 to 8.
CN202311081175.5A 2023-08-25 2023-08-25 Risk control method, apparatus and storage medium for transfer transaction Pending CN117273739A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311081175.5A CN117273739A (en) 2023-08-25 2023-08-25 Risk control method, apparatus and storage medium for transfer transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311081175.5A CN117273739A (en) 2023-08-25 2023-08-25 Risk control method, apparatus and storage medium for transfer transaction

Publications (1)

Publication Number Publication Date
CN117273739A true CN117273739A (en) 2023-12-22

Family

ID=89216800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311081175.5A Pending CN117273739A (en) 2023-08-25 2023-08-25 Risk control method, apparatus and storage medium for transfer transaction

Country Status (1)

Country Link
CN (1) CN117273739A (en)

Similar Documents

Publication Publication Date Title
CN105335851B (en) Pre-payment confirmation protection method and device based on payment history
CN106022758A (en) Wireless router smart home managing method and wireless router
CN106445189B (en) Candidate word display method and device
US20170076368A1 (en) Method and Device for Processing Card Application Data
KR20150041896A (en) Secure smart mobile payment method using integrated information of computer vision technology, voice recognition and GPS, and the device of thereof
CN106251223A (en) Counterparty's reliability determines method and apparatus
CN117273739A (en) Risk control method, apparatus and storage medium for transfer transaction
CN113887999A (en) Policy risk assessment method and device
CN111681118A (en) Data processing method and device
CN117114849A (en) Risk control method, apparatus and storage medium for loan business
CN117273649A (en) Method, device, equipment and storage medium for processing approval request
CN117094818A (en) Transaction risk control method and device, electronic equipment and storage medium
CN117076423A (en) Method, device, equipment and storage medium for migrating subject balance information
CN117273949A (en) Account type conversion method and device of fund pool and storage medium
CN106570697B (en) Mobile terminal payment verification method and device and security authentication tool
CN111681119A (en) Information processing method and device
CN116151663A (en) Open sub-pool analysis method and device
CN117252698A (en) Transaction identification method, device, electronic equipment and readable storage medium
CN116777622A (en) Data processing method, device, equipment and storage medium based on bill transaction
CN117097760A (en) Message processing method, device, equipment and storage medium based on bill transaction
CN116010811A (en) Transaction data information classification model training method, device and storage medium
CN117010901A (en) Risk value determining method, equipment and storage medium for transaction data information
CN114022248A (en) Product recommendation calculation method, device and equipment
CN116433357A (en) Method, device, equipment and storage medium for calculating reserve gold
CN113298420A (en) Cash flow task processing method, device and equipment based on task data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination