TW202013282A - Method and device for identifying risky merchant - Google Patents

Method and device for identifying risky merchant Download PDF

Info

Publication number
TW202013282A
TW202013282A TW108123915A TW108123915A TW202013282A TW 202013282 A TW202013282 A TW 202013282A TW 108123915 A TW108123915 A TW 108123915A TW 108123915 A TW108123915 A TW 108123915A TW 202013282 A TW202013282 A TW 202013282A
Authority
TW
Taiwan
Prior art keywords
merchant
risk
transaction
user
interface
Prior art date
Application number
TW108123915A
Other languages
Chinese (zh)
Inventor
陳帥
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202013282A publication Critical patent/TW202013282A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Abstract

The present application provides a method for identifying a risky merchant. After a code-scanning payment operation initiated by a user is received, it is determined whether a code scanning interface selected by the user is an in-person scanning interface. If the code scanning interface selected by the user is not an in-person scanning interface, a current transaction is marked as a risky transaction after payment succeeds. A transaction result is uploaded to a server, such that the server calculates the ratio of the number of risky transactions completed by a merchant under test within a preset time period to the total number of transactions completed by the merchant. It is then determined, according to whether the ratio is greater than a first threshold, whether the merchant is a risky merchant. In the present application, a code scanning path selected by a user on a client is identified, so as to recognize whether the user has performed scanning in person, thereby resolving the issues of monitoring difficulties and recognition delays in the prior art caused by the channels and timing of cash flow.

Description

風險商家發現方法和裝置Risk merchant discovery method and device

本說明書涉及網際網路技術領域,尤其涉及一種風險商家發現方法和裝置。This specification relates to the field of Internet technology, and in particular, to a method and device for discovering risky businesses.

隨著電子支付的普及,越來越多的離線商家會為用戶提供電子支付管道,用戶可以透過支付寶等支付軟體掃描商家提供的付款碼,用以離線支付。 其中,電子支付軟體方為了吸引用戶進行離線支付,有時會投入活動資金用以開展優惠活動,對於參與活動的商家,用戶在付款時可以獲得金額減免的優惠。面對著大量活動資金,存在著不法商家勾結黑產用戶進行虛假交易,然後從中套利。例如:在商家滿20減5塊的活動中,有不法商家透過網路召集一批用戶,然後將付款碼遠程發送給用戶,用戶透過網路接收到付款碼後,透過掃碼付款20元,獲得5元減免,實際支出15元,商家獲得20元後將用戶本金15元返還,並且與用戶瓜分5元營銷資金。 現有技術中,通常透過資金鏈路識別作弊商家:由於在商家與用戶勾結的作弊套利中,商家往往在獲取資金後將資金再返還給用戶,因此可以透過跟踪資金流向來進行識別。這種方法的缺點是,商家與用戶之間的資金往返管道可能是不同的,難以監察。此外有的商家選擇以周結或者月結的方式返還,而不是在每筆交易後返還,使得識別有較大的滯後。With the popularity of electronic payment, more and more offline merchants will provide users with electronic payment channels. Users can scan payment codes provided by merchants through payment software such as Alipay for offline payment. Among them, in order to attract users to make offline payments, the electronic payment software party sometimes invests in activity funds to carry out preferential activities. For merchants participating in the activities, users can obtain discounts for the amount of reduction when paying. In the face of a large amount of active funds, there are illegal businesses colluding with illicit users to make false transactions and then arbitrage. For example: In the event that the merchant is over 20 minus 5 blocks, there are illegal merchants summoning a group of users through the Internet, and then sending the payment code to the user remotely. After receiving the payment code through the network, the user pays 20 yuan by scanning the code. Get a 5 yuan relief, the actual expenditure is 15 yuan, and the merchant will return the user's principal 15 yuan after receiving 20 yuan, and share 5 yuan in marketing funds with the user. In the prior art, cheating merchants are usually identified through the fund link: due to cheating arbitrage in collusion between the merchant and the user, the merchant often returns the funds to the user after obtaining the funds, so it can be identified by tracking the flow of funds. The disadvantage of this method is that the round-trip channel of funds between merchants and users may be different and difficult to monitor. In addition, some merchants choose to return it on a weekly or monthly basis instead of after each transaction, making the identification lagging behind.

針對上述技術問題,本說明書實施例提供一種風險商家發現方法和裝置,技術方案如下: 根據本說明書實施例的第一方面,提供一種風險商家發現方法,應用於客戶端,該方法包括: 接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,將本次交易標記為風險交易; 將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。 根據本說明書實施例的第二方面,提供一種風險商家發現方法,應用於伺服器,該方法包括: 接收用戶端上傳的交易結果信息; 根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 根據計算結果判定所述待測商家是否為風險商家。 根據本說明書實施例的第三方面,提供一種風險商家發現方法,該方法包括: 客戶端接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,客戶端將本次交易標記為風險交易,並將交易結果上傳給伺服器; 伺服器根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 伺服器根據計算結果判定所述待測商家是否為風險商家。 根據本說明書實施例的第四方面,提供一種風險商家發現裝置,應用於客戶端,該裝置包括: 掃碼檢測模組:用於接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 風險標記模組:用於當所述用戶選擇的掃碼介面不為當面掃描介面後,在支付成功後,將本次交易標記為風險交易; 結果上傳模組:用於將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。 根據本說明書實施例的第五方面,提供一種風險商家發現裝置,應用於伺服器,該裝置包括: 結果接收模組:用於接收用戶端上傳的交易結果信息; 風險統計模組:用於根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 風險判定模組:用於根據計算結果判定所述待測商家是否為風險商家。 根據本說明書實施例的第六方面,提供一種電腦設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上執行的電腦程式,其中,所述處理器執行所述程式時實現一種風險商家發現方法,應用於客戶端,該方法包括: 接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,將本次交易標記為風險交易; 將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。 根據本說明書實施例的第七方面,提供一種電腦設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上執行的電腦程式,其中,所述處理器執行所述程式時實現一種風險商家發現方法,應用於伺服器,該方法包括: 接收用戶端上傳的交易結果信息; 根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 根據計算結果判定所述待測商家是否為風險商家。 本說明書實施例所提供的技術方案,提供了一種風險商家發現方法,客戶端接收用戶發起的掃碼支付操作後,若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,將本次交易標記為風險交易;並將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於預設臨限值確定所述待測商家是否為風險商家。 本說明書提供的方法透過區分用戶在客戶端選擇的掃碼路徑識別用戶是否是當面進行掃描,避免了現有技術因資金流動的管道和時間問題造成的監察困難和識別滯後。 應當理解的是,以上的一般描述和後文的細節描述僅是示例性和解釋性的,並不能限制本說明書實施例。 此外,本說明書實施例中的任一實施例並不需要達到上述的全部效果。In response to the above technical problems, the embodiments of the present specification provide a method and device for discovering a risk merchant. The technical solutions are as follows: According to a first aspect of the embodiments of the present specification, a method for discovering a risky merchant is provided, which is applied to a client. The method includes: After receiving the scan code payment operation initiated by the user, it is determined whether the scan code interface selected by the user is a face scan interface, wherein different scan code interfaces are used to identify pictures from different sources, and the face scan interface is used to enable The client device recognizes nearby pictures through the image capture module; If the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the transaction is marked as a risk transaction; Upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period, and determines the test to be tested according to whether the ratio is greater than the first threshold Whether the merchant is a risk merchant. According to a second aspect of the embodiments of the present specification, a method for discovering a risky merchant, which is applied to a server, includes: Receive the transaction result information uploaded by the user terminal; According to the transaction result information, calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; According to the calculation result, it is determined whether the merchant to be tested is a risk merchant. According to a third aspect of the embodiments of the present specification, a method for discovering a risky merchant is provided. The method includes: After receiving the scan code payment operation initiated by the user, the client determines whether the scan code interface selected by the user is an in-person scan interface, wherein different scan code interfaces are used to identify pictures from different sources. To enable the client device to identify nearby pictures through the image capture module; If the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the client marks the transaction as a risk transaction and uploads the transaction result to the server; Based on the transaction result information, the server calculates whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; The server determines whether the merchant to be tested is a risk merchant according to the calculation result. According to a fourth aspect of the embodiments of the present specification, a risk merchant discovery device is provided, which is applied to a client and includes: Scanning code detection module: used to receive the scan code payment operation initiated by the user, and determine whether the scan code interface selected by the user is a face scan interface, wherein different scan code interfaces are used to identify pictures from different sources, The face-to-face scanning interface is used to enable the client device to recognize nearby pictures through the image capturing module; Risk marking module: used to mark the transaction as a risk transaction after the payment is successful after the user-selected scanning interface is not the in-person scanning interface; Results upload module: used to upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of completed transactions within a preset time period, according to whether the ratio is greater than the first The limit value determines whether the merchant to be tested is a risk merchant. According to a fifth aspect of the embodiments of the present specification, a risk merchant discovery device is provided, which is applied to a server and includes: Result receiving module: used to receive the transaction result information uploaded by the client; Risk statistics module: used to calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within the preset time period is greater than the first threshold according to the transaction result information; Risk judgment module: used to judge whether the merchant to be tested is a risk merchant according to the calculation result. According to a sixth aspect of the embodiments of the present specification, a computer device is provided, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the program A risk merchant discovery method, applied to the client, the method includes: After receiving the scan code payment operation initiated by the user, it is determined whether the scan code interface selected by the user is a face scan interface, wherein different scan code interfaces are used to identify pictures from different sources, and the face scan interface is used to enable The client device recognizes nearby pictures through the image capture module; If the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the transaction is marked as a risk transaction; Upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period, and determines the test to be tested according to whether the ratio is greater than the first threshold Whether the merchant is a risk merchant. According to a seventh aspect of the embodiments of the present specification, a computer device is provided, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the program when it executes the program A method for discovering risky merchants applied to a server. The method includes: Receive the transaction result information uploaded by the user terminal; According to the transaction result information, calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; According to the calculation result, it is determined whether the merchant to be tested is a risk merchant. The technical solution provided by the embodiment of the present specification provides a method for discovering a risky merchant. After the client receives the scan code payment operation initiated by the user, if the scan code interface selected by the user is not the in-person scan interface, after the payment is successful , Mark the transaction as a risk transaction; upload the transaction result to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period, according to whether the ratio is It is greater than a preset threshold value to determine whether the merchant to be tested is a risk merchant. The method provided in this specification identifies whether the user scans in person by distinguishing the scanning path selected by the user on the client side, which avoids the monitoring difficulties and identification lag caused by the problems of the pipeline and time of capital flow in the prior art. It should be understood that the above general description and the following detailed description are only exemplary and explanatory, and cannot limit the embodiments of the present specification. In addition, any of the embodiments of the present specification does not need to achieve all the above-mentioned effects.

這裡將詳細地對示例性實施例進行說明,其示例表示在附圖中。下面的描述涉及附圖時,除非另有表示,不同附圖中的相同數字表示相同或相似的元件。以下示例性實施例中所描述的實施方式並不代表與本說明書相一致的所有實施方式。相反,它們僅是與如所附申請專利範圍中所詳述的、本說明書的一些方面相一致的裝置和方法的例子。 在本說明書使用的術語是僅僅出於描述特定實施例的目的,而非旨在限制本說明書。在本說明書和所附申請專利範圍中所使用的單數形式的“一種”、“所述”和“該”也旨在包括多數形式,除非上下文清楚地表示其他含義。還應當理解,本文中使用的術語“和/或”是指並包含一個或多個相關聯的列出項目的任何或所有可能組合。 應當理解,儘管在本說明書可能採用術語第一、第二、第三等來描述各種信息,但這些信息不應限於這些術語。這些術語僅用來將同一類型的信息彼此區分開。例如,在不脫離本說明書範圍的情況下,第一信息也可以被稱為第二信息,類似地,第二信息也可以被稱為第一信息。取決於語境,如在此所使用的詞語“如果”可以被解釋成為“在……時”或“當……時”或“響應於確定”。 隨著電子支付的普及,越來越多的離線商家會為用戶提供電子支付管道,用戶可以透過支付寶等支付軟體掃描商家提供的付款碼,用以離線支付。 其中,電子支付軟體方為了吸引用戶進行離線支付,有時會投入活動資金用以開展優惠活動,對於參與活動的商家,用戶在付款時可以獲得金額減免的優惠。面對著大量活動資金,存在著不法商家勾結黑產用戶進行虛假交易,然後從中套利。例如:在商家滿20減5塊的活動中,有不法商家透過網路召集一批用戶,然後將付款碼發給用戶,用戶透過掃碼付款20元,獲得5元減免,實際支出15元,商家獲得20元後將用戶本金15元返還,並且與用戶瓜分5元營銷資金。 現有技術中,通常透過資金鏈路識別作弊商家:由於在商家與用戶勾結的作弊套利中,商家往往在獲取資金後將資金再返還給用戶,因此可以透過跟踪資金流向來進行識別。這種方法的缺點是,商家與用戶之間的資金往返管道可能是不同的,難以監察。此外有的商家選擇以周結或者月結的方式返還,而不是在每筆交易後返還,使得識別有較大的滯後。 針對以上問題,本說明書實施例提供一種風險商家發現方法,以及一種用於執行該方法的風險商家發現裝置,下面對本實施例涉及的風險商家發現進行詳細說明,參見圖1所示,該方法可以包括以下步驟: S101,客戶端接收用戶發起的掃碼支付操作, S102,確定所述用戶選擇的掃碼介面是否為當面掃描介面,若是當面掃描介面,則執行步驟S103,若不是當面掃描介面,則不操作; 其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 在正常的離線掃碼付款操作中,用戶通常會直接透過移動設備的影像擷取模組(攝影鏡頭等)掃描商家提供的付款碼,進而完成支付操作。 風險商家想要非法套取活動資金時,通常並不會採用離線掃碼的方式付款,用戶並不用出現在商家門店。而是透過網路將付款碼發送或展示給協助套取活動資金的用戶。舉例說明,商家可將付款碼透過單人或群組的方式發送給其他用戶,或,商家將付款碼展示在公共論壇(微博、貼吧等),由用戶完成交易後透過截圖和商家要求返款。 可以理解,用戶遠程獲取付款碼後,通常不採用直接當面掃描的方式對付款碼進行識別,而一般的電子支付軟體通常會提供一些非當面掃描的付款碼識別方式。 以電子支付軟體支付寶錢包為例,參考圖2和圖3,目前支付寶錢包APP內有三種付款碼識別方式: 1) 打開支付寶錢包->進入“掃一掃”->將手機攝影鏡頭對準付款碼進行掃碼; 2) 打開支付寶錢包->進入“掃一掃”->點擊“相簿”按鈕->從相簿中選擇付款碼圖片進行付款碼識別; 3) 點擊長按付款碼圖片(商家透過支付寶社交管道將付款碼發給用戶,或在論壇等處展示給用戶)->點擊“識別圖中二維碼”進行付款碼識別。 以上述識別方式為例,用戶在協助套取活動資金時,通常選擇第二種或第三種方式進行付款碼識別,即用戶的操作介面分別為圖2中的“相簿”和圖3中的“識別圖中二維碼”。且非當面掃描介面不僅限於舉例的幾種,只要用戶沒有使用客戶端設備透過影像擷取模組對附近圖片進行識別,則可將其判定為非當面掃描。 S103,若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,客戶端將本次交易標記為風險交易,並將交易結果上傳給伺服器; 仍以上文支付寶錢包的三種付款碼識別方式為例,若用戶選擇的掃碼介面為“相簿”或“識別圖中二維碼”,則在對應的交易成功後,將這筆交易標記為風險交易。 將該筆交易信息上傳到伺服器,交易信息可包括與用戶進行交易的商家。對該筆交易的嫌疑標記,該筆交易的進行時間等。此時,尚不能確定該交易是不是用來非法套用活動資金的。必須進一步確定商家是否出現大量與上述類似,具備非法套用活動資金的嫌疑的交易。 S104,伺服器根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 伺服器從各個客戶端收到的交易結果信息後,將交易結果信息累計到對應的商家信息下,並對不同商家的交易信息進行統計,判斷商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值。 S105,伺服器根據計算結果判定所述待測商家是否為風險商家。 可以理解,若風險交易數與總交易數的比值大於第一臨限值,則表示商家大概率與用戶之間完成了大量非當面交易,進而可判斷該商家很可能在進行活動資金的套取。 本說明書實施例還提供一種更為具體的風險商家發現方法,參見圖4所示,該方法可以包括以下步驟: S401,客戶端對提供給用戶的,用於掃碼支付的不同掃碼介面進行監控; S402,當用戶對所述不同掃碼介面之一進行操作後,客戶端確定用戶操作的掃碼介面是否為當面掃描介面,若是當面掃描介面,執行步驟S403,若不是當面掃描介面,則不操作; S403,若用戶操作的介面為非當面掃描介面,則記錄用戶的介面操作時間; S404,介面操作結束後,發生首次掃碼支付事件時,記錄所述掃碼支付事件的發生時間; S405,計算所述介面操作時間與掃碼支付事件發生時間的時間差; S406,判斷所述時間差是否大於預設時間,如大於預設時間,則執行步驟S407,若不大於預設時間,則不操作; 具體地,可將客戶端中有作弊嫌疑的掃碼按鍵用ID進行唯一標識。以圖2、圖3為例,有作弊嫌疑的按鍵是如圖2、圖3中的標識位置“相簿”和“識別圖中二維碼”。 用戶點擊標識案件後,對該次用戶操作進行記錄,該記錄包含該按鍵的唯一標識與點擊的時間CTi。當掃碼支付事件發起後,記錄掃碼事件發生時間PT。並根據點擊與支付事件的時間差ti=PT-CTi,如果時間差小於預設時間,則可判斷這次點擊事件與這次交易時間有關聯。參考圖5,假設將交易結果記為Y,則令Y=1代表該交易為風險交易,令Y=0代表該交易為正常交易。 S407,在支付成功後,將本次交易標記為風險交易,並將交易結果上傳給伺服器; S408,伺服器根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; S409,若所述比值大於第一臨限值,繼續判斷待測商家在所述預設時間段內完成的總交易數是否大於第二臨限值,若所述總交易數大於第二臨限值,則執行步驟S410,若所述總交易數不大於第二臨限值,則不操作; 可以理解,在時間足夠集中(預設時間段內),樣本足夠多(總交易數大於第二臨限值)的情況下,若風險交易數量在總交易數量中的占比足夠高(完成風險交易數與完成總交易數的比值是否大於第一臨限值),則該商家大概率在進行活動資金的套取。 S410,判定所述待測商家為風險商家。 為了更清楚地說明本說明書實施例的方案,下面分別再從單側的角度,對於執行的方法進行說明: 參見圖6所示,為本說明書實施例在客戶端執行的風險商家發現方法,所述方法包括: S601,接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; S602,若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,將本次交易標記為風險交易; S603,將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。 參見圖7所示,為本說明書實施例在伺服器執行的風險商家發現方法,所述方法包括: S701,接收用戶端上傳的交易結果信息; S702,根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; S703,根據計算結果判定所述待測商家是否為風險商家。 相應於上述方法實施例,本說明書實施例還提供一種應用於客戶端的風險商家發現裝置,參見圖8所示,所述裝置可以包括:掃碼檢測模組810,風險標記模組820和結果上傳模組830。 掃碼檢測模組810:用於接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 風險標記模組820:用於當所述用戶選擇的掃碼介面不為當面掃描介面後,在支付成功後,將本次交易標記為風險交易; 結果上傳模組830:用於將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。 相應於上述方法實施例,本說明書實施例還提供一種應用於伺服器的風險商家發現裝置,參見圖9所示,所述裝置可以包括:結果接收模組910,風險統計模組920和風險判定模組930。 結果接收模組910:用於接收用戶端上傳的交易結果信息; 風險統計模組920:用於根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 風險判定模組930:用於根據計算結果判定所述待測商家是否為風險商家。 本說明書實施例還提供一種電腦設備,其至少包括記憶體、處理器及儲存在記憶體上並可在處理器上執行的電腦程式,其中,處理器執行所述程式時實現前述風險商家發現方法,所述方法應用於客戶端,該方法至少包括: 接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,將本次交易標記為風險交易; 將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。 本說明書實施例還提供一種電腦設備,其至少包括記憶體、處理器及儲存在記憶體上並可在處理器上執行的電腦程式,其中,處理器執行所述程式時實現前述風險商家發現方法,所述方法應用於伺服器,該方法至少包括: 接收用戶端上傳的交易結果信息; 根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 根據計算結果判定所述待測商家是否為風險商家。 圖10示出了本說明書實施例所提供的一種更為具體的計算設備硬體結構示意圖,該設備可以包括:處理器1010、記憶體1020、輸入/輸出介面1030、通信介面1040和匯流排1050。其中處理器1010、記憶體1020、輸入/輸出介面1030和通信介面1040透過匯流排1050實現彼此之間在設備內部的通信連接。 處理器1010可以採用通用的CPU(Central Processing Unit,中央處理器)、微處理器、特殊應用積體電路(Application Specific Integrated Circuit,ASIC)、或者一個或多個積體電路等方式實現,用於執行相關程式,以實現本說明書實施例所提供的技術方案。 記憶體1020可以採用ROM(Read Only Memory,唯讀記憶體)、RAM(Random Access Memory,隨機存取記憶體)、靜態儲存設備,動態儲存設備等形式實現。記憶體1020可以儲存作業系統和其他應用程式,在透過軟體或者韌體來實現本說明書實施例所提供的技術方案時,相關的程式碼保存在記憶體1020中,並由處理器1010來調用執行。 輸入/輸出介面1030用於連接輸入/輸出模組,以實現信息輸入及輸出。輸入輸出/模組可以作為組件配置在設備中(圖中未示出),也可以外接於設備以提供相應功能。其中輸入設備可以包括鍵盤、滑鼠、觸控螢幕、麥克風、各類傳感器等,輸出設備可以包括顯示器、揚聲器、振動器、指示燈等。 通信介面1040用於連接通信模組(圖中未示出),以實現本設備與其他設備的通信互動。其中通信模組可以透過有線方式(例如USB、網路線等)實現通信,也可以透過無線方式(例如行動網路、WIFI、藍牙等)實現通信。 匯流排1050包括一通路,在設備的各個組件(例如處理器1010、記憶體1020、輸入/輸出介面1030和通信介面1040)之間傳輸信息。 需要說明的是,儘管上述設備僅示出了處理器1010、記憶體1020、輸入/輸出介面1030、通信介面1040以及匯流排1050,但是在具體實施過程中,該設備還可以包括實現正常執行所必需的其他組件。此外,本領域的技術人員可以理解的是,上述設備中也可以僅包含實現本說明書實施例方案所必需的組件,而不必包含圖中所示的全部組件。 本說明書實施例還提供一種電腦可讀儲存媒體,其上儲存有電腦程式,該程式被處理器執行時實現前述的風險商家發現方法,所述方法應用於客戶端,該方法至少包括: 接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,將本次交易標記為風險交易; 將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。 本說明書實施例還提供一種電腦可讀儲存媒體,其上儲存有電腦程式,該程式被處理器執行時實現前述的風險商家發現方法,所述方法應用於伺服器,該方法至少包括: 接收用戶端上傳的交易結果信息; 根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 根據計算結果判定所述待測商家是否為風險商家。 電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現信息儲存。信息可以是電腦可讀指令、數據結構、程式的模組或其他數據。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的信息。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的數據信號和載波。 本說明還提供一種風險商家發現系統,所述系統包括: 伺服器、客戶端; 所述客戶端,用於接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 所述客戶端,用於當所述用戶選擇的掃碼介面不為當面掃描介面後,在支付成功後,將本次交易標記為風險交易; 所述客戶端,用於將交易結果上傳給伺服器; 所述伺服器,用於接收用戶端上傳的交易結果信息; 所述伺服器,用於根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 所述伺服器,用於根據計算結果判定所述待測商家是否為風險商家。 對於裝置實施例而言,由於其基本對應於方法實施例,所以相關之處參見方法實施例的部分說明即可。以上所描述的裝置實施例僅僅是示意性的,其中所述作為分離部件說明的單元可以是或者也可以不是物理上分開的,作為單元顯示的部件可以是或者也可以不是物理單元,即可以位於一個地方,或者也可以分布到多個網路單元上。可以根據實際的需要選擇其中的部分或者全部模組來實現本說明書方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。 透過以上的實施方式的描述可知,本領域的技術人員可以清楚地瞭解到本說明書實施例可借助軟體加必需的通用硬體平台的方式來實現。基於這樣的理解,本說明書實施例的技術方案本質上或者說對現有技術做出貢獻的部分可以以軟體產品的形式體現出來,該電腦軟體產品可以儲存在儲存媒體中,如ROM/RAM、磁碟、光碟等,包括若干指令用以使得一台電腦設備(可以是個人電腦,伺服器,或者網路設備等)執行本說明書實施例各個實施例或者實施例的某些部分所述的方法。 上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、蜂窩電話、相機電話、智慧電話、個人數位助理、媒體播放器、導航設備、電子郵件收發設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於裝置實施例而言,由於其基本相似於方法實施例,所以描述得比較簡單,相關之處參見方法實施例的部分說明即可。以上所描述的裝置實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是物理上分開的,在實施本說明書實施例方案時可以把各模組的功能在同一個或多個軟體和/或硬體中實現。也可以根據實際的需要選擇其中的部分或者全部模組來實現本實施例方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。 以上所述僅是本說明書實施例的具體實施方式,應當指出,對於本技術領域的普通技術人員來說,在不脫離本說明書實施例原理的前提下,還可以做出若干改進和潤飾,這些改進和潤飾也應視為本說明書實施例的保護範圍。Exemplary embodiments will be described in detail here, examples of which are shown in the drawings. When referring to the drawings below, unless otherwise indicated, the same numerals in different drawings represent the same or similar elements. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with this specification. Rather, they are merely examples of devices and methods consistent with some aspects of this specification as detailed in the scope of the attached patent applications. The terminology used in this specification is for the purpose of describing particular embodiments only, and is not intended to limit this specification. The singular forms "a", "said" and "the" used in this specification and the appended patent applications are also intended to include most forms unless the context clearly indicates other meanings. It should also be understood that the term "and/or" as used herein refers to and includes any or all possible combinations of one or more associated listed items. It should be understood that although the terms first, second, third, etc. may be used to describe various information in this specification, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of this specification, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information. Depending on the context, the word "if" as used herein may be interpreted as "when" or "when" or "in response to a determination". With the popularity of electronic payment, more and more offline merchants will provide users with electronic payment channels. Users can scan payment codes provided by merchants through payment software such as Alipay for offline payment. Among them, in order to attract users to make offline payments, the electronic payment software party sometimes invests in activity funds to carry out preferential activities. For merchants participating in the activities, users can obtain discounts for the amount of reduction when paying. In the face of a large amount of active funds, there are illegal businesses colluding with illicit users to make false transactions and then arbitrage. For example: In the event that the merchant is over 20 minus 5 blocks, there are illegal merchants summoning a group of users through the Internet, and then send the payment code to the user. The user pays 20 yuan by scanning the code to get a 5 yuan reduction, and the actual expenditure is 15 yuan. After the merchant obtains 20 yuan, the user's principal is returned to 15 yuan, and 5 yuan of marketing funds is divided with the user. In the prior art, cheating merchants are usually identified through the fund link: due to cheating arbitrage in collusion between the merchant and the user, the merchant often returns the funds to the user after obtaining the funds, so it can be identified by tracking the flow of funds. The disadvantage of this method is that the round-trip channel of funds between merchants and users may be different and difficult to monitor. In addition, some merchants choose to return it on a weekly or monthly basis instead of after each transaction, making the identification lagging behind. In view of the above problems, the embodiments of this specification provide a method for discovering a risky merchant, and a device for discovering a risky merchant. The following describes the discovery of a risky merchant involved in this embodiment in detail. Referring to FIG. 1, the method can It includes the following steps: S101, the client receives the scan code payment operation initiated by the user, S102. Determine whether the user-selected scanning interface is a face-to-face scanning interface. If it is a face-to-face scanning interface, perform step S103; if it is not a face-to-face scanning interface, do not operate; Among them, different scanning interfaces are used to identify pictures from different sources, and the on-site scanning interface is used to enable the client device to recognize nearby pictures through the image capturing module; In the normal offline code scanning payment operation, the user usually scans the payment code provided by the merchant directly through the image capturing module (photographic lens, etc.) of the mobile device, and then completes the payment operation. When a risky merchant wants to illegally withdraw funds for an activity, it usually does not pay by offline scan code, and the user does not need to appear in the merchant's store. Instead, the payment code is sent or displayed to users who assist in withdrawing active funds through the Internet. For example, the merchant can send the payment code to other users through a single person or group, or the merchant displays the payment code on a public forum (Weibo, Tieba, etc.). After the user completes the transaction, the screenshot and the merchant request to return paragraph. It can be understood that after the user remotely obtains the payment code, the payment code is usually not directly scanned to be recognized, and the general electronic payment software usually provides some non-face-to-face scanned payment code identification methods. Taking the electronic payment software Alipay wallet as an example, referring to Figures 2 and 3, there are currently three payment code identification methods in the Alipay wallet APP: 1) Open Alipay Wallet -> Enter "Scan" -> Scan the code by pointing the camera lens of the mobile phone to the payment code; 2) Open the Alipay wallet -> enter "scan" -> click the "album" button -> select the payment code picture from the album to identify the payment code; 3) Click on the long-press payment code image (the merchant sends the payment code to the user through the Alipay social channel, or displays it to the user in the forum, etc.) -> click the "QR code in the identification diagram" to identify the payment code. Taking the above identification method as an example, when assisting to withdraw active funds, users usually choose the second or third method for payment code identification, that is, the user's operating interfaces are "Photo Album" in Figure 2 and Figure 3, respectively. "Recognition QR code". The non-face-to-face scanning interface is not limited to a few examples, as long as the user does not use the client device to recognize nearby pictures through the image capture module, it can be determined as a face-to-face scanning. S103, if the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the client marks the transaction as a risk transaction and uploads the transaction result to the server; Taking the above three payment code identification methods of Alipay wallet as an example, if the user selects the scan interface as "album" or "two-dimensional code in the identification figure", after the corresponding transaction is successful, the transaction is marked as Risk trading. Upload the transaction information to the server, and the transaction information may include the merchant who conducts the transaction with the user. The suspect mark of the transaction, the time of the transaction, etc. At this time, it is not certain whether the transaction was used to illegally apply funds for activities. It must be further determined whether the merchant has a large number of transactions similar to those described above, with suspected illegal application of activity funds. S104: Based on the transaction result information, the server calculates whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; After the server receives the transaction result information from each client, it accumulates the transaction result information under the corresponding merchant information, and counts the transaction information of different merchants to determine the number of risk transactions completed and completed by the merchant within the preset time period. Whether the ratio of the total number of transactions is greater than the first threshold. S105. The server determines whether the merchant to be tested is a risk merchant according to the calculation result. It can be understood that if the ratio of the number of risk transactions to the total number of transactions is greater than the first threshold, it means that the merchant has a large probability of completing a large number of non-face-to-face transactions with the user, and it can be judged that the merchant is likely to be involved in the acquisition of active funds . The embodiment of the present specification also provides a more specific method for discovering risk businesses. Referring to FIG. 4, the method may include the following steps: S401, the client monitors different scanning interface provided to the user for scanning payment; S402, after the user operates one of the different scanning interface, the client determines whether the scanning interface operated by the user is a face-to-face scanning interface, if it is a face-to-face scanning interface, step S403 is executed, and if it is not a face-to-face scanning interface, it does not operate ; S403, if the user-operated interface is an unauthorized scanning interface, record the user's interface operation time; S404. After the interface operation is completed, when the first scan code payment event occurs, record the time when the scan code payment event occurs; S405: Calculate the time difference between the interface operation time and the scan code payment event occurrence time; S406. Determine whether the time difference is greater than a preset time. If it is greater than the preset time, perform step S407. If it is not greater than the preset time, do not operate; Specifically, the scan code button suspected of cheating in the client may be uniquely identified by ID. Taking Figures 2 and 3 as examples, the keys that are suspected of cheating are the identification positions "Photo Album" and "Two-dimensional Code in the Identification Figure" as shown in Figures 2 and 3. After the user clicks on the identification case, the user's operation is recorded. The record contains the unique identification of the key and the time CTi of the click. When the scan code payment event is initiated, the time PT at which the scan code event occurs is recorded. And according to the time difference between the click and payment event ti=PT-CTi, if the time difference is less than the preset time, it can be judged that the click event is related to the transaction time. Referring to Figure 5, assuming that the transaction result is recorded as Y, let Y=1 represent the transaction as a risk transaction, and let Y=0 represent the transaction as a normal transaction. S407, after the payment is successful, mark the transaction as a risk transaction, and upload the transaction result to the server; S408, the server calculates whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold value according to the transaction result information; S409, if the ratio is greater than the first threshold, continue to determine whether the total number of transactions completed by the merchant under test within the preset time period is greater than the second threshold, if the total number of transactions is greater than the second threshold Value, step S410 is executed, and if the total number of transactions is not greater than the second threshold, no operation is performed; It is understandable that if the time is concentrated enough (within a preset time period) and there are enough samples (the total number of transactions is greater than the second threshold), if the number of risky transactions is sufficiently high in the total number of transactions (completed risk Whether the ratio of the number of transactions to the total number of completed transactions is greater than the first threshold), then the merchant is likely to carry out the withdrawal of active funds. S410. Determine that the merchant to be tested is a risk merchant. In order to more clearly explain the solutions of the embodiments of the present specification, the following describes the execution method from a one-sided perspective: Referring to FIG. 6, it is a risk merchant discovery method executed on a client according to an embodiment of the present specification. The method includes: S601: After receiving the scan code payment operation initiated by the user, determine whether the scan code interface selected by the user is an in-person scan interface, wherein different scan code interfaces are used to identify pictures from different sources, and the on-face scan interface is used To enable the client device to identify nearby pictures through the image capture module; S602, if the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the transaction is marked as a risk transaction; S603: Upload the transaction result to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant to be tested to the total number of transactions completed within a preset time period, and determines whether the ratio is greater than the first threshold Whether the business to be tested is a risk business. Referring to FIG. 7, it is a method for discovering a risky merchant executed on a server according to an embodiment of the present specification. The method includes: S701: Receive the transaction result information uploaded by the user terminal; S702, based on the transaction result information, calculating whether the ratio of the number of risk transactions completed by the merchant to be tested to the total number of transactions completed within a preset time period is greater than the first threshold; S703: Determine whether the merchant to be tested is a risk merchant according to the calculation result. Corresponding to the above method embodiment, the embodiment of the present specification also provides a risk merchant discovery device applied to the client. As shown in FIG. 8, the device may include: a scanning code detection module 810, a risk marking module 820, and result upload Module 830. Scan code detection module 810: used to receive the scan code payment operation initiated by the user, and determine whether the scan code interface selected by the user is an in-person scan interface, wherein different scan code interfaces are used to identify pictures from different sources , The face-to-face scanning interface is used to enable the client device to recognize nearby pictures through the image capturing module; Risk marking module 820: used to mark the transaction as a risk transaction after the payment is successful after the user-selected scanning interface is not the in-person scanning interface; Results upload module 830: used to upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of completed transactions within a preset time period, according to whether the ratio is greater than the first The threshold value determines whether the merchant to be tested is a risk merchant. Corresponding to the above method embodiment, the embodiment of the present specification also provides a risk merchant discovery device applied to a server. Referring to FIG. 9, the device may include: a result receiving module 910, a risk statistics module 920, and a risk judgment Module 930. Result receiving module 910: used to receive the transaction result information uploaded by the user terminal; Risk statistics module 920: used to calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold value based on the transaction result information; The risk determination module 930 is used to determine whether the merchant to be tested is a risk merchant according to the calculation result. The embodiments of the present specification also provide a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor realizes the foregoing risk merchant discovery method when the processor executes the program , The method is applied to the client, the method includes at least: After receiving the scan code payment operation initiated by the user, it is determined whether the scan code interface selected by the user is a face scan interface, wherein different scan code interfaces are used to identify pictures from different sources, and the face scan interface is used to enable The client device recognizes nearby pictures through the image capture module; If the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the transaction is marked as a risk transaction; Upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period, and determines the test to be tested according to whether the ratio is greater than the first threshold Whether the merchant is a risk merchant. The embodiments of the present specification also provide a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor realizes the foregoing risk merchant discovery method when the processor executes the program , The method is applied to a server, the method includes at least: Receive the transaction result information uploaded by the user terminal; According to the transaction result information, calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; According to the calculation result, it is determined whether the merchant to be tested is a risk merchant. 10 shows a schematic diagram of a more specific hardware structure of a computing device provided by an embodiment of the present specification. The device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050 . Among them, the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040 realize the communication connection among the devices through the bus 1050. The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit, central processing unit), a microprocessor, an application specific integrated circuit (ASIC), or one or more integrated circuits, etc., for Execute relevant programs to realize the technical solutions provided by the embodiments of this specification. The memory 1020 may be implemented in the form of ROM (Read Only Memory, read only memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc. The memory 1020 can store an operating system and other applications. When the technical solution provided by the embodiments of the present specification is implemented through software or firmware, the related program code is stored in the memory 1020 and is called and executed by the processor 1010. . The input/output interface 1030 is used to connect input/output modules to realize information input and output. The input/output/module can be configured as a component in the device (not shown in the figure), or can be externally connected to the device to provide corresponding functions. The input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output device may include a display, a speaker, a vibrator, and an indicator light. The communication interface 1040 is used to connect a communication module (not shown in the figure) to realize communication interaction between the device and other devices. The communication module can realize communication through wired methods (such as USB, network cable, etc.), and can also realize communication through wireless methods (such as mobile network, WIFI, Bluetooth, etc.). The bus 1050 includes a path for transmitting information between various components of the device (such as the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040). It should be noted that although the above device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040, and the bus 1050, in the specific implementation process, the device may also include Required other components. In addition, those skilled in the art may understand that the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of the present specification, rather than including all the components shown in the figures. The embodiments of the present specification also provide a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the aforementioned method for discovering a risky merchant is implemented. The method is applied to a client. The method at least includes: After receiving the scan code payment operation initiated by the user, it is determined whether the scan code interface selected by the user is a face scan interface, wherein different scan code interfaces are used to identify pictures from different sources, and the face scan interface is used to enable The client device recognizes nearby pictures through the image capture module; If the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the transaction is marked as a risk transaction; Upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period, and determines the test to be tested according to whether the ratio is greater than the first threshold Whether the merchant is a risk merchant. The embodiments of the present specification also provide a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the aforementioned method for discovering a risky merchant is implemented. The method is applied to a server. The method includes at least: Receive the transaction result information uploaded by the user terminal; According to the transaction result information, calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; According to the calculation result, it is determined whether the merchant to be tested is a risk merchant. Computer-readable media, including permanent and non-permanent, removable and non-removable media, can store information by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable and programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, magnetic tape storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves. This description also provides a risk merchant discovery system, which includes: Server, client; The client is used to determine whether the scan interface selected by the user is a face-to-face scanning interface after receiving the scan code payment operation initiated by the user, wherein different scan interfaces are used to identify pictures from different sources. The face-to-face scanning interface is used to enable the client device to recognize nearby pictures through the image capturing module; The client is used to mark the transaction as a risk transaction after the payment is successful after the code scanning interface selected by the user is not the in-person scanning interface; The client is used to upload the transaction result to the server; The server is used to receive the transaction result information uploaded by the user terminal; The server is used to calculate whether the ratio of the number of risk transactions completed by the merchant to be tested to the total number of transactions completed within a preset time period is greater than the first threshold according to the transaction result information; The server is used to determine whether the merchant to be tested is a risk merchant according to the calculation result. As for the device embodiments, since they basically correspond to the method embodiments, the relevant parts can be referred to the description of the method embodiments. The device embodiments described above are only schematic, wherein the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located One place, or it can be distributed to multiple network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement without paying creative labor. It can be known from the description of the above implementation manners that those skilled in the art can clearly understand that the embodiments of this specification can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solutions of the embodiments of this specification can be embodied in the form of software products in essence or part that contributes to the existing technology, and the computer software products can be stored in storage media, such as ROM/RAM, magnetic Discs, optical discs, etc., include several instructions to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in the various embodiments of the embodiments of this specification or some parts of the embodiments. The system, device, module or unit explained in the above embodiments may be implemented by a computer chip or entity, or by a product with a certain function. A typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game console , Tablet computers, wearable devices, or any combination of these devices. The embodiments in this specification are described in a progressive manner. The same or similar parts between the embodiments can be referred to each other. Each embodiment focuses on the differences from other embodiments. In particular, for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant part can be referred to the description of the method embodiment. The device embodiments described above are only schematic, wherein the modules described as separate components may or may not be physically separated, and the functions of each module can be Implemented in one or more software and/or hardware. Part or all of the modules may also be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art can understand and implement without paying creative labor. The above is only a specific implementation manner of the embodiments of this specification. It should be pointed out that for those of ordinary skill in the art, without departing from the principles of the embodiments of this specification, several improvements and retouches can be made. These Improvements and retouching should also be regarded as the scope of protection of the embodiments of this specification.

S101:步驟 S102:步驟 S103:步驟 S104:步驟 S105:步驟 S401:步驟 S402:步驟 S403:步驟 S404:步驟 S405:步驟 S406:步驟 S407:步驟 S408:步驟 S409:步驟 S410:步驟 S601:步驟 S602:步驟 S603:步驟 S701:步驟 S702:步驟 S703:步驟 810:掃碼檢測模組 820:風險標記模組 830:結果上傳模組 910:結果接收模組 920:風險統計模組 930:風險判斷模組 1010:處理器 1020:記憶體 1030:輸入/輸出介面 1040:通信介面 1050:匯流排S101: Step S102: Step S103: Step S104: Step S105: Step S401: Step S402: Step S403: Step S404: Step S405: Step S406: Step S407: Step S408: Step S409: Step S410: Step S601: Step S602: Step S603: Step S701: Step S702: Step S703: Step 810: Scan code detection module 820: Risk Marking Module 830: result upload module 910: result receiving module 920: Risk Statistics Module 930: Risk judgment module 1010: processor 1020: Memory 1030: input/output interface 1040: Communication interface 1050: busbar

為了更清楚地說明本說明書實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的附圖作簡單地介紹,顯而易見地,下面描述中的附圖僅僅是本說明書實施例中記載的一些實施例,對於本領域普通技術人員來講,還可以根據這些附圖獲得其他的附圖。 圖1是本說明書一示例性實施例示出的風險商家發現方法的一種流程圖; 圖2-3是本說明書一示例性實施例示出的非當面介面的示意圖; 圖4是本說明書一示例性實施例示出的風險商家發現方法的另一種流程圖; 圖5是本說明書一示例性實施例示出的風險商家發現方法的一種示意圖; 圖6是本說明書一示例性實施例示出的風險商家發現方法在客戶端執行的一種流程圖; 圖7是本說明書一示例性實施例示出的風險商家發現方法在伺服器執行的一種流程圖; 圖8是本說明書一示例性實施例示出的風險商家發現裝置在客戶端的一種示意圖; 圖9是本說明書一示例性實施例示出的風險商家發現裝置在伺服器的一種示意圖; 圖10是本說明書一示例性實施例示出的一種電腦設備的結構示意圖。In order to more clearly explain the embodiments of the present specification or the technical solutions in the prior art, the following will briefly introduce the drawings required in the embodiments or the description of the prior art. Obviously, the drawings in the following description are only For some embodiments described in the embodiments of the specification, those of ordinary skill in the art may also obtain other drawings based on these drawings. FIG. 1 is a flowchart of a method for discovering a risky merchant according to an exemplary embodiment of this specification; Figure 2-3 is a schematic diagram of an improper interface shown in an exemplary embodiment of this specification; 4 is another flowchart of a method for discovering a risky merchant shown in an exemplary embodiment of this specification; FIG. 5 is a schematic diagram of a risk merchant discovery method shown in an exemplary embodiment of this specification; 6 is a flow chart of a method for discovering a risky merchant executed on a client terminal according to an exemplary embodiment of this specification; 7 is a flowchart of a risk merchant discovery method performed on a server shown in an exemplary embodiment of this specification; 8 is a schematic diagram of a risk merchant discovery device at a client shown in an exemplary embodiment of this specification; 9 is a schematic diagram of a risk merchant discovery device on a server shown in an exemplary embodiment of this specification; 10 is a schematic structural diagram of a computer device shown in an exemplary embodiment of this specification.

Claims (16)

一種風險商家發現方法,所述方法包括: 客戶端接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,客戶端將本次交易標記為風險交易,並將交易結果上傳給伺服器; 伺服器根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 伺服器根據計算結果判定所述待測商家是否為風險商家。A method for discovering risky businesses, the method includes: After receiving the scan code payment operation initiated by the user, the client determines whether the scan code interface selected by the user is an in-person scan interface, wherein different scan code interfaces are used to identify pictures from different sources. To enable the client device to identify nearby pictures through the image capture module; If the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the client marks the transaction as a risk transaction and uploads the transaction result to the server; Based on the transaction result information, the server calculates whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; The server determines whether the merchant to be tested is a risk merchant according to the calculation result. 一種風險商家發現方法,應用於客戶端,所述方法包括: 接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 若所述用戶選擇的掃碼介面不為當面掃描介面,則在支付成功後,將本次交易標記為風險交易; 將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。A risk merchant discovery method, applied to the client, the method includes: After receiving the scan code payment operation initiated by the user, it is determined whether the scan code interface selected by the user is a face scan interface, wherein different scan code interfaces are used to identify pictures from different sources, and the face scan interface is used to enable The client device recognizes nearby pictures through the image capture module; If the scanning interface selected by the user is not the in-person scanning interface, after the payment is successful, the transaction is marked as a risk transaction; Upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period, and determines the test to be tested according to whether the ratio is greater than the first threshold Whether the merchant is a risk merchant. 如申請專利範圍第2項所述的方法,其中所述接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,包括: 對客戶端提供給用戶的,用於掃碼支付的不同掃碼介面進行監控; 當用戶對所述不同掃碼介面之一進行操作後,確定用戶操作的掃碼介面是否為當面掃描介面。The method according to item 2 of the patent application scope, wherein after receiving the scan code payment operation initiated by the user, determining whether the scan code interface selected by the user is an in-person scan interface includes: Monitor the different barcode scanning interfaces provided by the client to users for barcode scanning payment; After the user operates one of the different barcode scanning interfaces, it is determined whether the barcode scanning interface operated by the user is a local scanning interface. 如申請專利範圍第3項所述的方法,其中所述若所述用戶選擇的掃碼模式不為當面掃描,則在支付成功後,將本次交易標記為風險交易,包括: 若用戶操作的介面為非當面掃描介面,確定客戶端在操作結束後的預設時間內是否發生掃碼支付事件; 若發生掃碼支付事件,則在支付成功後,將本次交易標記為風險交易。The method as described in item 3 of the patent application scope, wherein if the scanning mode selected by the user is not face-to-face scanning, after the payment is successful, the transaction is marked as a risk transaction, including: If the user-operated interface is a non-face-to-face scanning interface, determine whether the scan code payment event occurs within the preset time after the operation is completed by the client; If a scan code payment event occurs, after the payment is successful, the transaction is marked as a risk transaction. 如申請專利範圍第3項所述的方法,其中所述若所述用戶選擇的掃碼模式不為當面掃描,則在支付成功後,將本次交易標記為風險交易,包括: 若用戶操作的介面為非當面掃描介面,則記錄用戶的介面操作時間; 介面操作結束後,發生首次掃碼支付事件時,記錄所述掃碼支付事件的發生時間; 計算所述介面操作時間與掃碼支付事件發生時間的時間差,若所述時間差不大於預設時間,則在支付成功後,將本次交易標記為風險交易。The method as described in item 3 of the patent application scope, wherein if the scanning mode selected by the user is not face-to-face scanning, after the payment is successful, the transaction is marked as a risk transaction, including: If the user-operated interface is an unauthorized scanning interface, the user's interface operation time is recorded; After the interface operation is completed, when the first scan code payment event occurs, record the occurrence time of the scan code payment event; Calculate the time difference between the interface operation time and the scan code payment event occurrence time. If the time difference is not greater than the preset time, the transaction is marked as a risk transaction after the payment is successful. 一種風險商家發現方法,應用於伺服器,所述方法包括: 接收用戶端上傳的交易結果信息; 根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 根據計算結果判定所述待測商家是否為風險商家。A risk merchant discovery method, applied to a server, the method includes: Receive the transaction result information uploaded by the user terminal; According to the transaction result information, calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within a preset time period is greater than the first threshold; According to the calculation result, it is determined whether the merchant to be tested is a risk merchant. 如申請專利範圍第6項所述的方法,其中所述根據計算結果判定所述待測商家是否為風險商家,包括 判斷所述比值是否大於第一臨限值; 若所述比值大於第一臨限值,繼續判斷待測商家在所述預設時間段內完成的總交易數是否大於第二臨限值; 若所述總交易數大於第二臨限值,則判定所述待測商家為風險商家。The method according to item 6 of the patent application scope, wherein the determining whether the merchant to be tested is a risk merchant according to the calculation result includes: Determine whether the ratio is greater than the first threshold; If the ratio is greater than the first threshold, continue to determine whether the total number of transactions completed by the merchant under test within the preset time period is greater than the second threshold; If the total number of transactions is greater than the second threshold, it is determined that the merchant to be tested is a risk merchant. 一種風險商家發現裝置,應用於客戶端,所述裝置包括: 掃碼檢測模組:用於接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 風險標記模組:用於當所述用戶選擇的掃碼介面不為當面掃描介面後,在支付成功後,將本次交易標記為風險交易; 結果上傳模組:用於將交易結果上傳給伺服器,以使伺服器計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值,根據所述比值是否大於第一臨限值確定所述待測商家是否為風險商家。A risk merchant discovery device, applied to a client, the device includes: Scanning code detection module: used to receive the scan code payment operation initiated by the user, and determine whether the scan code interface selected by the user is a face scan interface, wherein different scan code interfaces are used to identify pictures from different sources, The face-to-face scanning interface is used to enable the client device to recognize nearby pictures through the image capturing module; Risk marking module: used to mark the transaction as a risk transaction after the payment is successful after the user-selected scanning interface is not the in-person scanning interface; Results upload module: used to upload the transaction results to the server, so that the server calculates the ratio of the number of risk transactions completed by the merchant under test to the total number of completed transactions within a preset time period, according to whether the ratio is greater than the first The limit value determines whether the merchant to be tested is a risk merchant. 如申請專利範圍第8項所述的裝置,其中所述確定所述用戶選擇的掃碼介面是否為當面掃描介面,包括: 對客戶端提供給用戶的,用於掃碼支付的不同掃碼介面進行監控; 當用戶對所述不同掃碼介面之一進行操作後,確定用戶操作的掃碼介面是否為當面掃描介面。The device according to item 8 of the patent application scope, wherein the determining whether the user-selected scanning interface is a face-to-face scanning interface includes: Monitor the different barcode scanning interfaces provided by the client to users for barcode scanning payment; After the user operates one of the different barcode scanning interfaces, it is determined whether the barcode scanning interface operated by the user is a local scanning interface. 如申請專利範圍第9項所述的裝置,其中所述若所述用戶選擇的掃碼模式不為當面掃描,則在支付成功後,將本次交易標記為風險交易,包括: 若用戶操作的介面為非當面掃描介面,確定客戶端在操作結束後的預設時間內是否發生掃碼支付事件; 若發生掃碼支付事件,則在支付成功後,將本次交易標記為風險交易。The device as described in item 9 of the patent application scope, wherein if the scan mode selected by the user is not face-to-face scanning, after the payment is successful, the transaction is marked as a risk transaction, including: If the user-operated interface is a non-face-to-face scanning interface, determine whether the scan code payment event occurs within the preset time after the operation is completed by the client; If a scan code payment event occurs, after the payment is successful, the transaction is marked as a risk transaction. 如申請專利範圍第9項所述的裝置,其中所述若所述用戶選擇的掃碼模式不為當面掃描,則在支付成功後,將本次交易標記為風險交易,包括: 若用戶操作的介面為非當面掃描介面,則記錄用戶的介面操作時間; 介面操作結束後,發生首次掃碼支付事件時,記錄所述掃碼支付事件的發生時間; 計算所述介面操作時間與掃碼支付事件發生時間的時間差,若所述時間差不大於預設時間,則在支付成功後,將本次交易標記為風險交易。The device as described in item 9 of the patent application scope, wherein if the scan mode selected by the user is not face-to-face scanning, after the payment is successful, the transaction is marked as a risk transaction, including: If the user-operated interface is an unauthorized scanning interface, the user's interface operation time is recorded; After the interface operation is completed, when the first scan code payment event occurs, record the occurrence time of the scan code payment event; Calculate the time difference between the interface operation time and the scan code payment event occurrence time. If the time difference is not greater than the preset time, the transaction is marked as a risk transaction after the payment is successful. 一種風險商家發現裝置,應用於伺服器,所述裝置包括: 結果接收模組:用於接收用戶端上傳的交易結果信息; 風險統計模組:用於根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 風險判定模組:用於根據計算結果判定所述待測商家是否為風險商家。A risk merchant discovery device, applied to a server, the device includes: Result receiving module: used to receive the transaction result information uploaded by the client; Risk statistics module: used to calculate whether the ratio of the number of risk transactions completed by the merchant under test to the total number of transactions completed within the preset time period is greater than the first threshold according to the transaction result information; Risk judgment module: used to judge whether the merchant to be tested is a risk merchant according to the calculation result. 如申請專利範圍第12項所述的裝置,其中所述根據判斷結果,判定所述待測商家是否為風險商家,包括 判斷所述比值是否大於第一臨限值; 若所述比值大於第一臨限值,繼續判斷待測商家在所述預設時間段內完成的總交易數是否大於第二臨限值; 若所述總交易數大於第二臨限值,則判定所述待測商家為風險商家。The device as described in item 12 of the patent application scope, wherein the determining whether the merchant to be tested is a risk merchant based on the judgment result includes: Determine whether the ratio is greater than the first threshold; If the ratio is greater than the first threshold, continue to determine whether the total number of transactions completed by the merchant under test within the preset time period is greater than the second threshold; If the total number of transactions is greater than the second threshold, it is determined that the merchant to be tested is a risk merchant. 一種風險商家發現系統,所述系統包括: 伺服器、客戶端; 所述客戶端,用於接收用戶發起的掃碼支付操作後,確定所述用戶選擇的掃碼介面是否為當面掃描介面,其中,不同的掃碼介面用於對不同來源的圖片進行識別,所述當面掃描介面用於使客戶端設備透過影像擷取模組對附近圖片進行識別; 所述客戶端,用於當所述用戶選擇的掃碼介面不為當面掃描介面後,在支付成功後,將本次交易標記為風險交易; 所述客戶端,用於將交易結果上傳給伺服器; 所述伺服器,用於接收用戶端上傳的交易結果信息; 所述伺服器,用於根據所述交易結果信息,計算待測商家在預設時間段內完成風險交易數與完成總交易數的比值是否大於第一臨限值; 所述伺服器,用於根據計算結果判定所述待測商家是否為風險商家。A risk merchant discovery system, the system includes: Server, client; The client is used to determine whether the scan interface selected by the user is a face-to-face scanning interface after receiving the scan code payment operation initiated by the user, wherein different scan interfaces are used to identify pictures from different sources. The face-to-face scanning interface is used to enable the client device to recognize nearby pictures through the image capturing module; The client is used to mark the transaction as a risk transaction after the payment is successful after the code scanning interface selected by the user is not the in-person scanning interface; The client is used to upload the transaction result to the server; The server is used to receive the transaction result information uploaded by the user terminal; The server is used to calculate whether the ratio of the number of risk transactions completed by the merchant to be tested to the total number of transactions completed within a preset time period is greater than the first threshold according to the transaction result information; The server is used to determine whether the merchant to be tested is a risk merchant according to the calculation result. 一種電腦設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上執行的電腦程式,其中,所述處理器執行所述程式時實現如申請專利範圍第2項所述的方法。A computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein, when the processor executes the program, the method described in item 2 of the patent application scope is implemented . 一種電腦設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上執行的電腦程式,其中,所述處理器執行所述程式時實現如申請專利範圍第6項所述的方法。A computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein, when the processor executes the program, the method described in item 6 of the patent application scope is implemented .
TW108123915A 2018-09-20 2019-07-08 Method and device for identifying risky merchant TW202013282A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811099111.7A CN109272336A (en) 2018-09-20 2018-09-20 A kind of risk trade company discovery method and apparatus
CN201811099111.7 2018-09-20

Publications (1)

Publication Number Publication Date
TW202013282A true TW202013282A (en) 2020-04-01

Family

ID=65197701

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108123915A TW202013282A (en) 2018-09-20 2019-07-08 Method and device for identifying risky merchant

Country Status (3)

Country Link
CN (1) CN109272336A (en)
TW (1) TW202013282A (en)
WO (1) WO2020057305A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272336A (en) * 2018-09-20 2019-01-25 阿里巴巴集团控股有限公司 A kind of risk trade company discovery method and apparatus
CN110033092B (en) * 2019-01-31 2020-06-02 阿里巴巴集团控股有限公司 Data label generation method, data label training device, event recognition method and event recognition device
CN110659961A (en) * 2019-09-12 2020-01-07 阿里巴巴集团控股有限公司 Method and device for identifying off-line commercial tenant
CN110782143B (en) * 2019-10-15 2022-05-06 支付宝(杭州)信息技术有限公司 Data processing method and device
CN114758327A (en) * 2020-02-25 2022-07-15 支付宝(杭州)信息技术有限公司 Method, device and equipment for identifying risks in code image
CN114897533A (en) * 2022-02-15 2022-08-12 北京结慧科技有限公司 Risk control method, device, medium and computer equipment based on business behaviors

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2843611A1 (en) * 2013-08-26 2015-03-04 Aleksandra Kosatka-Pioro Computer implemented method for management of standing orders
CN105512563B (en) * 2014-09-25 2018-08-31 阿里巴巴集团控股有限公司 The method and apparatus and risk method for releasing and device of confirmation credible equipment
CN105590261A (en) * 2014-12-31 2016-05-18 中国银联股份有限公司 Merchant risk estimation method and system
CN112215683A (en) * 2016-03-25 2021-01-12 创新先进技术有限公司 Transaction processing method and device and server
CN107016538A (en) * 2017-04-11 2017-08-04 杭州纳戒科技有限公司 Carrying method of payment and system
CN107545422B (en) * 2017-08-02 2023-10-10 中国银联股份有限公司 Cashing detection method and device
CN107464169B (en) * 2017-08-10 2020-11-10 北京星选科技有限公司 Information output method and device
CN107517251B (en) * 2017-08-16 2020-12-15 北京星选科技有限公司 Information pushing method and device
CN109272336A (en) * 2018-09-20 2019-01-25 阿里巴巴集团控股有限公司 A kind of risk trade company discovery method and apparatus

Also Published As

Publication number Publication date
WO2020057305A1 (en) 2020-03-26
CN109272336A (en) 2019-01-25

Similar Documents

Publication Publication Date Title
TW202013282A (en) Method and device for identifying risky merchant
AU2014225973B2 (en) Predicting approval of transactions
CA2845817C (en) Method for transferring money using email
US10902406B1 (en) Verifying proximity during payment transactions
EP3261043A1 (en) A method and a device for displaying information, and a method and a device for pushing information
AU2014240248B2 (en) Identifying one or more peer devices in a peer-to-peer communication
RU2604433C2 (en) Method and system for processing electronic document management without using cards
US20120259776A1 (en) Dynamic pre-qualification
WO2019218745A1 (en) Tax refund method, system and device, mobile terminal and service server
CN110945552B (en) Product sales reporting method, payment method and terminal equipment
CN104580325A (en) User pairing method and device, as well as data exchange method, device and system
WO2019143979A2 (en) Method, apparatus, and electronic device for regulatory inspection
WO2020063114A1 (en) Method and apparatus for detecting security awareness of user
WO2020063115A1 (en) Graphic coding display method and apparatus
US20150317635A1 (en) Electronic gesture-based signatures
CN108446905B (en) Payment method and device and electronic equipment
US11221894B2 (en) Event execution method, device, and system
KR20150061539A (en) Providing method and system for preventing fraud trading
US11257066B2 (en) Automated digital method and system of providing or sharing access
CN110659975B (en) Resource transfer method, device, equipment and storage medium based on block chain
JP2017228296A (en) Dynamic transaction recording
CN108764861B (en) Information acquisition method and device and electronic equipment
KR102233559B1 (en) Electronic device for brokering membership by escrow system
AU2019101233A4 (en) Searchable system for registered items, and a method for searching a searchable system
US11887108B2 (en) System and user interface of a user device for managing tokens associated with a user