CN117611175A - Fraud-prevention account transfer method and device, electronic equipment and storage medium - Google Patents

Fraud-prevention account transfer method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117611175A
CN117611175A CN202311630979.6A CN202311630979A CN117611175A CN 117611175 A CN117611175 A CN 117611175A CN 202311630979 A CN202311630979 A CN 202311630979A CN 117611175 A CN117611175 A CN 117611175A
Authority
CN
China
Prior art keywords
transfer
fraud
target user
user
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311630979.6A
Other languages
Chinese (zh)
Inventor
费闯
沈乐
徐辉
肖宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202311630979.6A priority Critical patent/CN117611175A/en
Publication of CN117611175A publication Critical patent/CN117611175A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a fraud-prevention transfer method, a fraud-prevention transfer device, electronic equipment and a storage medium. The method comprises the following steps: when the transfer event is detected to be triggered, acquiring transfer operation information of a target user; wherein the transfer operation information includes transfer amount and transfer user information; when the transfer amount is greater than a preset amount threshold, detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database; if no transfer record matched with the information of the transfer user exists in the transfer database, judging whether an instant messaging application program is started at the current time point, and if so, carrying out transfer fraud prompt on the target user. And through the transfer operation information of the target user and whether the target user starts an instant communication application program during transfer, the target user which possibly encounters voice call guiding fraud in the complete strange large-amount transfer of both sides of the transfer user is subjected to transfer fraud prompt, so that property loss of the target user is avoided.

Description

Fraud-prevention account transfer method and device, electronic equipment and storage medium
Technical Field
The invention relates to the field of finance, in particular to a fraud prevention account transfer method, a fraud prevention account transfer device, electronic equipment and a storage medium.
Background
In recent years, with the continuous development and popularization of information technologies such as mobile internet, mobile payment, cloud computing and the like, more and more users can use mobile terminal devices to complete various things, and accordingly, the practice of realizing fraud through mobile terminals is more and more, that is, how to make users recognize fraud information in time by changing fraud means from offline to online, so that it is important to prevent fraud and avoid damage to property or personal safety. In some fraud transfers, fraud molecules typically guide users to transfer by way of voice calls, thereby enabling fraud, and thus, how to quickly identify such voice call-guided fraud acts is particularly important.
Disclosure of Invention
The invention provides a fraud-prevention transfer method, a fraud-prevention transfer device, electronic equipment and a storage medium, which are used for carrying out transfer fraud prompt on a target user possibly suffering from voice call guiding fraud in the complete strange large-amount transfer of both sides of a transfer user, so that the property loss of the target user is avoided.
According to an aspect of the present invention, there is provided a fraud prevention transfer method, the method including:
when the transfer event is detected to be triggered, acquiring transfer operation information of a target user; wherein the transfer operation information includes transfer amount and transfer user information;
when the transfer amount is larger than a preset amount threshold, detecting whether a transfer record matched with the transfer user information exists in a pre-built transfer database;
if no transfer record matched with the transfer user information exists in the transfer database, judging whether an instant messaging application program is started at the current time point, and if yes, carrying out transfer fraud prompt on the target user.
According to another aspect of the present invention, there is provided a fraud prevention transfer apparatus, the apparatus including:
the transfer operation information acquisition module is used for acquiring transfer operation information of a target user when the transfer event is detected to be triggered; wherein the transfer operation information includes transfer amount and transfer user information;
the transfer record detection module is used for detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database or not when the transfer amount is larger than a preset amount threshold;
and the transfer fraud prompting module is used for judging whether an instant messaging application program is started at the current time point if a transfer record matched with the transfer user information does not exist in the transfer database, and if so, prompting the transfer fraud to the target user.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the fraud prevention transfer method of any embodiment of the present invention.
According to another aspect of the present invention, there is provided a computer-readable storage medium storing computer instructions for causing a processor to implement the fraud prevention transfer method according to any embodiment of the present invention when executed.
According to the technical scheme, when the transfer event is detected to be triggered, the transfer operation information of the target user is obtained; wherein the transfer operation information includes transfer amount and transfer user information; when the transfer amount is greater than a preset amount threshold, detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database; if no transfer record matched with the information of the transfer user exists in the transfer database, judging whether an instant messaging application program is started at the current time point, and if so, carrying out transfer fraud prompt on the target user. According to the technical scheme, through the transfer operation information of the target user and whether the target user starts the instant messaging application program during transfer, the transfer fraud prompt is carried out on the target user possibly suffering from voice call guiding fraud in the large-amount transfer with complete strangeness of both sides of the transfer user, so that property loss of the target user is avoided.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a fraud prevention transfer method according to an embodiment of the present invention;
fig. 2 is a flowchart of a fraud prevention transfer method according to a second embodiment of the present invention;
fig. 3 is a schematic structural view of a fraud prevention transfer apparatus according to a third embodiment of the present invention;
fig. 4 is a schematic structural view of an electronic device implementing the fraud prevention transfer method according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Fig. 1 is a flowchart of a fraud prevention method according to an embodiment of the present invention, which is applicable to the prevention of a possible fraud transfer, and the method may be performed by a fraud prevention apparatus, which may be implemented in hardware and/or software, and which may be configured in an electronic device. As shown in fig. 1, the method includes:
s110, when the transfer event is detected to be triggered, acquiring transfer operation information of a target user; wherein the transfer operation information includes a transfer amount and transfer user information.
The transfer user information comprises transfer user information and transfer user information, wherein the transfer user is the initiator of transfer, and the transfer user is the receiver of transfer.
In the embodiment of the invention, when the transfer event is detected to be triggered, the transfer operation information of the target user can be obtained according to the transfer operation performed by the target user. Specifically, the transfer amount may be determined according to the amount input by the target user at the time of transfer, and the outgoing user information and the incoming user information may be determined according to the initiator and the receiver determined by the target user at the time of transfer.
And S120, detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database or not when the transfer amount is larger than a preset amount threshold.
The pre-constructed transfer database may include only the transfer records of the target user, or may include the transfer records of other users.
In the embodiment of the invention, if the transfer amount of the target user in the transfer event is greater than the preset amount threshold, if the transfer amount of the target user in the transfer event is greater than fifty thousand yuan, the transfer user information in the transfer event is required to be matched with the transfer user information in the historical transfer event corresponding to the transfer record in the pre-built transfer database, and whether the historical transfer record which is the same as the transfer user information in the transfer event exists in the pre-built transfer database is confirmed, so that whether the historical transfer record exists between the transfer user and the transfer user in the transfer event is judged. The preset amount threshold may be set according to actual situations, which is not limited in the embodiment of the present invention.
S130, if no transfer record matched with the information of the transfer user exists in the transfer database, judging whether an instant messaging application program is started at the current time point, and if so, carrying out transfer fraud prompt on the target user.
In the embodiment of the invention, if no transfer record matched with the information of the transfer user exists in the transfer database, it is indicated that no transfer transaction exists between the transfer user and the transfer user before the transfer event, that is, the transfer event is the first transfer between the transfer user and the transfer user, and meanwhile, because the transfer amount is larger than the preset amount threshold, the target user is suspected of being fraudulent.
Generally, fraud molecules guide users to complete transfer operations by means of voice calls through instant messaging applications such as telephone, chat applications, etc., thereby completing fraud. In contrast, in the case of normal transfer, the user generally does not have to perform a voice call at the same time when the transfer operation is performed. Therefore, whether the target user starts the instant messaging application program at the current time point can be judged, and when the target user starts the instant messaging application program at the current time point, the target user is subjected to the transfer fraud prompt.
Specifically, judging whether the instant messaging application program is started at the current time point, if so, carrying out the transfer fraud prompt on the target user, wherein the method comprises the following steps: judging whether an instant messaging application program is started at the current time point, if so, detecting whether transfer related information exists in the instant messaging application program, and if not, carrying out transfer fraud prompt on a target user.
In order to further ensure the property safety of the user, when the fact that the target user opens the instant communication application program at the current time point is confirmed, whether the transfer associated information exists in the instant communication application program or not can be detected, when the transfer associated information does not exist in the instant communication application program, the target user is suspected of being fraudulently, only the transfer fraud prompt is carried out to the target user, and when the transfer associated information exists in the instant communication application program, the fact that the target user encounters fraud in a large probability can be confirmed, the account number of the target user is directly frozen, and property loss of the target user is avoided.
Optionally, the transfer operation information includes a transfer mode, and after judging whether the instant messaging application program is started at the current time point, if so, performing a transfer fraud prompt to the target user, the method further includes: judging whether the transfer mode is the transfer mode used by the target user for the first time; and if the transfer mode is determined to be the transfer mode used by the target user for the first time, the account number of the target user is frozen.
In order to further ensure the property safety of the user, the transfer mode of the target user used in the transfer process can be determined when the transfer operation information is acquired, and whether the transfer mode is the transfer mode used for the first time by the target user is judged.
According to the technical scheme, when the transfer event is detected to be triggered, the transfer operation information of the target user is obtained; wherein the transfer operation information includes transfer amount and transfer user information; when the transfer amount is greater than a preset amount threshold, detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database; if no transfer record matched with the information of the transfer user exists in the transfer database, judging whether an instant messaging application program is started at the current time point, and if so, carrying out transfer fraud prompt on the target user. According to the technical scheme, through the transfer operation information of the target user and whether the target user starts the instant messaging application program during transfer, the transfer fraud prompt is carried out on the target user possibly suffering from voice call guiding fraud in the large-amount transfer with complete strangeness of both sides of the transfer user, so that property loss of the target user is avoided.
Example two
Fig. 2 is a flowchart of a fraud prevention transfer method according to a second embodiment of the present invention, which is optimized based on the above embodiment, and a scheme not described in detail in the embodiment of the present invention is shown in the above embodiment. As shown in fig. 2, the method includes:
s210, when the transfer event is detected to be triggered, acquiring transfer operation information of a target user; wherein the transfer operation information includes a transfer amount and transfer user information.
And S220, detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database or not when the transfer amount is larger than a preset amount threshold.
In the embodiment of the invention, if the transfer amount of the target user in the transfer event is greater than the preset amount threshold, if the transfer amount of the target user in the transfer event is greater than fifty yuan, the transfer user information in the transfer event needs to be matched with the transfer user information in the historical transfer event corresponding to the transfer record in the pre-built transfer database, and whether the historical transfer record identical to the transfer user information in the transfer event exists in the pre-built transfer database is confirmed. If not, step S230 is executed, and if yes, step S250 is executed.
And S230, judging whether an instant messaging application program is started at the current time point if the transfer record matched with the transfer user information does not exist in the transfer database.
In the embodiment of the invention, if no transfer record matched with the information of the transfer user exists in the transfer database, it is indicated that no transfer transaction exists between the transfer user and the transfer user before the transfer event, that is, the transfer event is the first transfer between the transfer user and the transfer user, and meanwhile, because the transfer amount is larger than the preset amount threshold, the target user is suspected of being fraudulent. At this time, it may be determined whether the target user has opened the instant messaging application at the current time point, and if so, step S240 is performed.
S240, if the instant messaging application program is started at the current time point, the transfer fraud prompt is carried out to the target user.
Generally, fraud molecules guide users to complete transfer operations by means of voice calls through instant messaging applications such as telephone, chat applications, etc., thereby completing fraud. In contrast, in the case of normal transfer, the user generally does not have to perform a voice call at the same time when the transfer operation is performed. Therefore, when the target user opens the instant messaging application at the current point of time, the target user is prompted for the transfer fraud.
S250, if the transfer records matched with the information of the transfer user exist in the transfer database, acquiring the target transfer records of the target user in a preset time period.
The target transfer record comprises transfer amount, transfer time, transfer account ID, account residual amount after transfer and other information.
In the embodiment of the invention, if the transfer record matched with the information of the transfer user exists in the transfer database, the transfer transaction exists between the transfer user and the transfer user before the transfer event, namely the transfer event is not the first transfer between the transfer user and the transfer user. At this time, a target transfer record of the target user in a preset time period, such as a target transfer record in half a year, may be obtained, and an auxiliary determination may be made as to whether the transfer operation corresponding to the transfer operation information is an abnormal transfer. The preset time period may be set according to actual situations, which is not limited in the embodiment of the present invention.
S260, judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not according to the target transfer record.
In the embodiment of the invention, after the target transfer record of the target user in the preset time period is obtained, whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not can be judged according to the target transfer record.
Specifically, judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer according to the target transfer record, including: inputting the target transfer record and transfer operation information into a pre-trained abnormal transfer judgment model; and judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not according to the output result of the abnormal transfer judgment model.
In the embodiment of the invention, after the target transfer record and the transfer operation information are input into the abnormal transfer judgment model, the abnormal transfer judgment model can judge the input data and output the judgment result, so as to provide effective reference for judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer.
Optionally, before inputting the target transfer record and the transfer operation information into the pre-trained abnormal transfer judgment model, the method further comprises: collecting a transfer record sample set; wherein the sample set of transfer records includes a first transfer record of fraud and a second transfer record of non-fraud; marking the transfer record sample set according to the transfer record type, and generating a transfer record training set; training a preset machine learning model based on the transfer record training set, and generating an abnormal transfer judgment model.
In the embodiment of the invention, the collection of the transfer record sample set can be performed through the history transfer record in the transfer database, and it is noted that the privacy of the user in the transfer database should be ensured not to be revealed when the collection of the transfer record sample set is performed through the transfer database. And then, marking the transfer record sample set according to the transfer record type, generating a transfer record training set, training a preset machine learning model based on the transfer record training set, and generating an abnormal transfer judgment model. The preset machine learning model may select an appropriate machine learning model according to training data, which is not limited in the embodiment of the present invention.
S270, if the transfer operation corresponding to the transfer operation information is abnormal transfer, carrying out abnormal transfer prompt on the target user.
In the embodiment of the invention, when the transfer operation corresponding to the transfer operation information is abnormal transfer, the abnormal transfer prompt is carried out to the target user, so that the property loss of the target user can be avoided, and the safety of financial transaction is improved.
According to the technical scheme, when the transfer event is detected to be triggered, the transfer operation information of the target user is obtained; wherein the transfer operation information includes transfer amount and transfer user information; when the transfer amount is greater than a preset amount threshold, detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database; if the transfer record matched with the transfer user information does not exist in the transfer database, judging whether an instant messaging application program is started at the current time point; if the instant messaging application program is started at the current time point, carrying out the transfer fraud prompt to the target user; if the transfer record matched with the transfer user information exists in the transfer database, acquiring a target transfer record of a target user in a preset time period; judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not according to the target transfer record; if the transfer operation corresponding to the transfer operation information is abnormal transfer, carrying out abnormal transfer prompt on the target user. According to the technical scheme, through the transfer operation information of the target user and whether the target user starts the instant messaging application program during transfer, the transfer fraud prompt is carried out on the target user possibly suffering from voice call guiding fraud in the large-amount transfer with complete strangeness of both sides of the transfer user, so that property loss of the target user is avoided. Meanwhile, whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not is judged according to the abnormal transfer judgment model, so that the safety of financial transaction is improved.
Example III
Fig. 3 is a schematic structural diagram of a fraud prevention transfer device according to a third embodiment of the present invention. As shown in fig. 3, the apparatus includes:
a transfer operation information acquisition module 310 for acquiring transfer operation information of a target user when it is detected that a transfer event is triggered; wherein the transfer operation information includes transfer amount and transfer user information;
the transfer record detection module 320 is configured to detect whether a transfer record matching the transfer user information exists in a pre-constructed transfer database when the transfer amount is greater than a preset amount threshold;
and the transfer fraud prompting module 330 is configured to determine whether an instant messaging application is started at a current time point if a transfer record matching with the transfer user information does not exist in the transfer database, and if yes, perform a transfer fraud prompt to the target user.
Optionally, the transfer fraud prompting module 330 includes:
and the transfer fraud prompting unit is used for judging whether an instant messaging application program is started at the current time point, if so, detecting whether transfer related information exists in the instant messaging application program, and if not, prompting the transfer fraud to the target user.
Optionally, the transfer fraud prompting module 330 further includes:
and the account freezing unit is used for freezing the account of the target user when the transfer related information exists in the instant messaging application program.
Optionally, the transfer operation information includes a transfer mode; the device further comprises:
the transfer mode judging module is used for judging whether the transfer mode is the transfer mode used for the first time by the target user;
and the account freezing module is used for freezing the account of the target user if the account freezing module determines that the transfer mode is the transfer mode used for the first time by the target user.
Optionally, the apparatus further comprises:
the target transfer record acquisition module is used for acquiring a target transfer record of the target user in a preset time period if the transfer record matched with the transfer user information exists in the transfer database;
and the abnormal transfer prompt module is used for judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer according to the target transfer record, and if yes, carrying out abnormal transfer prompt on the target user.
Optionally, the abnormal transfer prompting module includes:
the information input unit is used for inputting the target transfer record and the transfer operation information into a pre-trained abnormal transfer judgment model;
and the abnormality judging unit is used for judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not according to the output result of the abnormal transfer judging model.
Optionally, the abnormal transfer prompting module further includes:
the sample set acquisition unit is used for acquiring a transfer record sample set; wherein the sample set of transfer records includes a first transfer record of a fraud class and a second transfer record of a non-fraud class;
and the model generating unit is used for training a preset machine learning model based on the transfer record training set and generating an abnormal transfer judgment model.
The fraud prevention account transfer device provided by the embodiment of the invention can execute the fraud prevention account transfer method provided by any embodiment of the invention, and has the corresponding function module and beneficial effects of the execution method.
Example 4
Fig. 4 shows a schematic diagram of the structure of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as the fraud prevention transfer method.
In some embodiments, the fraud prevention transfer method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into the RAM 13 and executed by the processor 11, one or more steps of the fraud prevention transfer method described above may be performed. Alternatively, in other embodiments, processor 11 may be configured to perform the fraud prevention transfer method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A fraud prevention transfer method, comprising:
when the transfer event is detected to be triggered, acquiring transfer operation information of a target user; wherein the transfer operation information includes transfer amount and transfer user information;
when the transfer amount is larger than a preset amount threshold, detecting whether a transfer record matched with the transfer user information exists in a pre-built transfer database;
if no transfer record matched with the transfer user information exists in the transfer database, judging whether an instant messaging application program is started at the current time point, and if yes, carrying out transfer fraud prompt on the target user.
2. The method as recited in claim 1, wherein determining whether an instant messaging application was opened at a current point in time, if so, providing a transfer fraud hint to the target user comprises:
judging whether an instant messaging application program is started at the current time point, if so, detecting whether transfer related information exists in the instant messaging application program, and if not, carrying out transfer fraud prompt on the target user.
3. The method as recited in claim 2, further comprising:
and when the transfer related information exists in the instant messaging application program, freezing the account number of the target user.
4. The method according to claim 1, wherein the transfer operation information includes a transfer mode;
after judging whether the instant messaging application program is started at the current time point, if so, carrying out the transfer fraud prompt on the target user, and further comprising:
judging whether the transfer mode is the transfer mode used by the target user for the first time;
and if the transfer mode is determined to be the transfer mode used for the first time by the target user, the account number of the target user is frozen.
5. The method as recited in claim 1, further comprising:
if the transfer records matched with the transfer user information exist in the transfer database, acquiring target transfer records of the target user in a preset time period;
judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not according to the target transfer record, and if yes, prompting abnormal transfer to the target user.
6. The method of claim 5, wherein determining whether the transfer operation corresponding to the transfer operation information is an abnormal transfer according to the target transfer record comprises:
inputting the target transfer record and the transfer operation information into a pre-trained abnormal transfer judgment model;
and judging whether the transfer operation corresponding to the transfer operation information is abnormal transfer or not according to the output result of the abnormal transfer judgment model.
7. The method according to claim 6, further comprising, before inputting the target transfer record and the transfer operation information into a pre-trained abnormal transfer judgment model:
collecting a transfer record sample set; wherein the sample set of transfer records includes a first transfer record of a fraud class and a second transfer record of a non-fraud class;
marking the transfer record sample set according to the transfer record type, and generating a transfer record training set;
training a preset machine learning model based on the transfer record training set, and generating an abnormal transfer judgment model.
8. A fraud prevention transfer apparatus, comprising:
the transfer operation information acquisition module is used for acquiring transfer operation information of a target user when the transfer event is detected to be triggered; wherein the transfer operation information includes transfer amount and transfer user information;
the transfer record detection module is used for detecting whether a transfer record matched with the transfer user information exists in a pre-constructed transfer database or not when the transfer amount is larger than a preset amount threshold;
and the transfer fraud prompting module is used for judging whether an instant messaging application program is started at the current time point if a transfer record matched with the transfer user information does not exist in the transfer database, and if so, prompting the transfer fraud to the target user.
9. An electronic device, the electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the fraud prevention transfer method of any of claims 1-7.
10. A computer readable storage medium storing computer instructions for causing a processor to implement the fraud prevention transfer method of any of claims 1-7 when executed.
CN202311630979.6A 2023-11-30 2023-11-30 Fraud-prevention account transfer method and device, electronic equipment and storage medium Pending CN117611175A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311630979.6A CN117611175A (en) 2023-11-30 2023-11-30 Fraud-prevention account transfer method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311630979.6A CN117611175A (en) 2023-11-30 2023-11-30 Fraud-prevention account transfer method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117611175A true CN117611175A (en) 2024-02-27

Family

ID=89955893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311630979.6A Pending CN117611175A (en) 2023-11-30 2023-11-30 Fraud-prevention account transfer method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117611175A (en)

Similar Documents

Publication Publication Date Title
CN116090605A (en) Pipe network early warning method and device, electronic equipment and storage medium
CN115333783A (en) API call abnormity detection method, device, equipment and storage medium
CN117609992A (en) Data disclosure detection method, device and storage medium
CN117611175A (en) Fraud-prevention account transfer method and device, electronic equipment and storage medium
CN115935355A (en) Ore digging program identification method, device, equipment and storage medium
CN115601042A (en) Information identification method and device, electronic equipment and storage medium
CN111601000B (en) Communication network fraud identification method and device and electronic equipment
CN111429257A (en) Transaction monitoring method and device
CN116629810B (en) Operation recommendation method, device, equipment and medium based on building office system
CN117746069B (en) Graph searching model training method and graph searching method
CN113691440B (en) Message processing method and device
CN117454350A (en) Service response method, device, electronic equipment and storage medium
CN114567698A (en) Detection method, device, equipment and storage medium for fraud-related numbers
CN117632688A (en) Data processing method, device, equipment and storage medium
CN117609723A (en) Object identification method and device, electronic equipment and storage medium
CN114710590A (en) Crank call detection method, device, equipment and medium
CN117522143A (en) Method, device, equipment and storage medium for determining risk level
CN118245676A (en) Recommendation method and device for operation object, electronic equipment and storage medium
CN116484421A (en) Protection method, device, equipment and storage medium for private information
CN115545889A (en) Data processing method, device, electronic equipment, storage medium and product
CN117671711A (en) Updating construction method, device, equipment and medium of certificate identification model
CN116488361A (en) Metal foreign matter detection method, device and medium based on vehicle-mounted wireless charger
CN117611177A (en) Data exception handling method, device, equipment, system and storage medium
CN115455437A (en) Code unauthorized detection method and device, electronic equipment and storage medium
CN116524959A (en) Voice emotion determining method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination